Mock Version: 4.1 Mock Version: 4.1 Mock Version: 4.1 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --noclean --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/dist-oc9-build-230424-81465/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=86400uid=991gid=135user='mockbuild'nspawn_args=[]unshare_net=FalseprintOutput=False) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --noclean --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'} and shell False Building target platforms: aarch64 Building for target aarch64 Wrote: /builddir/build/SRPMS/nss-3.112-2.oc9.src.rpm Child return code was: 0 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --noclean --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/dist-oc9-build-230424-81465/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=86400uid=991gid=135user='mockbuild'nspawn_args=[]unshare_net=FalseprintOutput=False) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --noclean --target aarch64 --nodeps /builddir/build/SPECS/nss.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'} and shell False Building target platforms: aarch64 Building for target aarch64 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.MHWnWA + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.112 + /usr/lib/rpm/rpmuncompress -x /builddir/build/SOURCES/nss-3.112.tar.gz + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.112 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + pushd nss ~/build/BUILD/nss-3.112/nss ~/build/BUILD/nss-3.112 + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/nss-signtool-format.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/nss-no-dbm-man-page.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/nss-3.112-big-endian-compression-fix.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/nss-3.112-fix-get-interface.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/nss-add-support-for-SM3-digest-algorithm.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + /usr/lib/rpm/rpmuncompress /builddir/build/SOURCES/nss-add-support-for-SM2-signature-algorithm.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch -f + popd ~/build/BUILD/nss-3.112 + find nss/lib/libpkix -perm /u+x -type f -exec chmod -x '{}' ';' + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.tlg31r + umask 022 + cd /builddir/build/BUILD + CFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection' + export CFLAGS + CXXFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection' + export CXXFLAGS + FFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -I/usr/lib64/gfortran/modules' + export FFLAGS + FCFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -I/usr/lib64/gfortran/modules' + export FCFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib64: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd nss-3.112 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export BUILD_OPT=1 + BUILD_OPT=1 + export 'XCFLAGS=-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter' + XCFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter' + export 'LDFLAGS=-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + export 'DSO_LDOPTS=-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + DSO_LDOPTS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + export PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + export NSPR_INCLUDE_DIR=/usr/include/nspr4 + NSPR_INCLUDE_DIR=/usr/include/nspr4 + export NSS_USE_SYSTEM_SQLITE=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + export NSS_SEED_ONLY_DEV_URANDOM=1 + NSS_SEED_ONLY_DEV_URANDOM=1 + export NSS_DISABLE_DBM=1 + NSS_DISABLE_DBM=1 + export USE_64=1 + USE_64=1 + export POLICY_FILE=nss.config + POLICY_FILE=nss.config + export POLICY_PATH=/etc/crypto-policies/back-ends + POLICY_PATH=/etc/crypto-policies/back-ends + /usr/bin/make -C ./nss all make: Entering directory '/builddir/build/BUILD/nss-3.112/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 # no real way to encode these in any sensible way /usr/bin/make -C coreconf/nsinstall program make[1]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nsinstall.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pathsub.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pathsub.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pathsub.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -lpthread -ldl -lc true -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[1]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/coreconf/nsinstall' /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.112/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/coreconf/nsinstall' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/coreconf' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 baset.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbaset.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbase.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/base' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 genname.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 xconst.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certxutl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certdb.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/certdb' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocsp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspt.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/certhigh' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptohi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptoht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 key.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyhi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keythi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sechash.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/cryptohi' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckhelper.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 dev.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssdevt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssdev.h ../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/dev' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_errorstrings.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_results.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkixt.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_params.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revchecker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certstore.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pki.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_sample_modules.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_checker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_system.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_util.h ../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/include' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcertselparams.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlselector.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certchainchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_ekuchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_expirationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_namechainingchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_nameconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_ocspchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_policychecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revocationmethod.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revocationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_signaturechecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_targetcertchecker.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/checker' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_trustanchor.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_valparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_resourcelimits.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/params' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_policynode.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_valresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_verifynode.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/results' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/store' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_validate.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/top' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_error.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_logger.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_list.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/util' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_cert.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyinfo.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicymap.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyqualifier.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crl.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crldp.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crlentry.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_date.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_generalname.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_infoaccess.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nameconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocsprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_publickey.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_x500name.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mem.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_object.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_string.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_primhash.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bigint.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mutex.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bytearray.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_oid.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_hashtable.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_rwlock.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_monitorlock.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_colcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapt.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldaprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nsscontext.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pk11certstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_socket.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 dev3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmod.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secpkcs5.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11func.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11hpke.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11pub.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11priv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11sdr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11pqg.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pk11wrap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkistore.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkitm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkim.h ../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pki' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 verref.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base64.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ciferfam.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 eccutil.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 hasht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 kyber.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssb64.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssb64t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsshash.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsslocks.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssilock.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssilckt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrwlk.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrwlkt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssutil.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11f.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11p.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11n.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11u.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs1sig.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 portreg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secasn1.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secasn1t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 seccomon.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secder.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secdert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secdig.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secdigt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secitem.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secoid.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secoidt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secport.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 utilmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 utilrename.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 utilpars.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 utilparst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11uri.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssoptions.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/nss' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ck.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfw.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfwm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfwtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckmd.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssck.api ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckepv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfw.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfwc.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfwt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckmdt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckt.h ../../../dist/public/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Nothing to be done for 'export'. make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins/testlib' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmft.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/crmf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar-ds.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jarfile.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/jar' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12plcy.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12t.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs12' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p7local.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secpkcs7.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs7t.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs7' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmslocal.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cms.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 smime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmsreclist.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/smime' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ssl.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslexp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslproto.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 preenc.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ssl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/sysinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmac.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 alghmac.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blake2b.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 chacha20poly1305.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 hmacct.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmpi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secrng.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ec.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ecl/ecl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ecl/ecl-curve.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ecl/eclt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 blapit.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 shsign.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ecl/ecl-exp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsslowhash.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/softoken' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs11ni.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 softoken.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 softoknt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 softkver.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sdb.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sftkdbt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lowkeyi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 lowkeyti.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/softoken' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 basicutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11table.h ../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lib' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/bltest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/bltest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ecperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ecperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fbectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fbectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fipstest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fipstest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lowhashtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lowhashtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 Makefile:77: warning: overriding recipe for target 'libs' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'libs' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for 'export'. make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/mangle' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/addbuiltin' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/atob' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/btoa' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/certutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/chktest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crlutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crmftest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/derdump' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/digest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/httpserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/listsuites' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/makepqg' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/multinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nss-policy-check' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nssdefaults' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nssdefaults' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspresp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/oidcalc' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7content' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7env' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7verify' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk12util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11importtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11ectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11gcmtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11mode' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk1sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pwdecrypt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsaperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsapoptst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdbthreadtst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdrtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/selfserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signver' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target 'install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'install' make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/smimetools' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ssltap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/strsclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/symkeyutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tests' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tstclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/validation' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfychain' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfyserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/modutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pkix-errcodes' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cpputil' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cpputil' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/google_test' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/google_test' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/common' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/common' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/util_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/util_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/base_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/base_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certdb_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certdb_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certhigh_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certhigh_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/cryptohi_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/cryptohi_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/der_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/der_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/freebl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/freebl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pkcs11testmodule' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pkcs11testmodule' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pk11_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pk11_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/smime_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/smime_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/softoken_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/softoken_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/ssl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/ssl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/sysinit_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/sysinit_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/nss_bogo_shim' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/nss_bogo_shim' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss' /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.112/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 true -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/coreconf/nsinstall' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/coreconf' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/arena.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter arena.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter error.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/errorval.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter errorval.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hashops.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter hashops.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter libc.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tracker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tracker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/item.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter item.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter utf8.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter list.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter hash.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssb.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/arena.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/error.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/errorval.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hashops.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libc.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tracker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/item.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/list.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hash.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/base' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/alg1485.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter alg1485.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certdb.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certv3.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certv3.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certxutl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certxutl.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crl.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/genname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter genname.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter stanpcertdb.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/polcyxtn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter polcyxtn.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secname.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xauthkid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter xauthkid.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xbsconst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter xbsconst.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xconst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter xconst.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcertdb.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/alg1485.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdb.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certv3.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certxutl.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crl.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/genname.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/polcyxtn.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secname.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xauthkid.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xbsconst.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xconst.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/certdb' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhtml.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certhtml.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certreq.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certreq.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlv2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crlv2.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocsp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ocsp.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspsig.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ocspsig.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certhigh.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certvfy.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certvfypkix.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certvfypkix.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xcrldist.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter xcrldist.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcerthi.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhtml.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certreq.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlv2.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocsp.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspsig.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certvfy.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certvfypkix.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xcrldist.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/certhigh' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sechash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sechash.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/seckey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter seckey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secsign.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secvfy.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dsautil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dsautil.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sechash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/seckey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secsign.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secvfy.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dsautil.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/cryptohi' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter devslot.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devtoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter devtoken.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter devutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckhelper.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ckhelper.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssdev.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devslot.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devtoken.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckhelper.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/dev' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for 'libs'. make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/include' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_certselector.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_comcertselparams.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_crlselector.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_comcrlselparams.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_basicconstraintschecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_certchainchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_crlchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_ekuchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_expirationchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_namechainingchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_nameconstraintschecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_ocspchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_revocationmethod.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_revocationchecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_policychecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_signaturechecker.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_targetcertchecker.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/checker' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_trustanchor.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_procparams.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_valparams.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_resourcelimits.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/params' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_buildresult.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_policynode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_valresult.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_verifynode.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/results' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_store.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_store.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_store.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/store' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_validate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_validate.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_lifecycle.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_build.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_build.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_validate.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_build.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/top' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_tools.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_tools.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_error.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_logger.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_logger.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_list.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_errpaths.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_tools.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_error.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_logger.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_list.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix/util' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_basicconstraints.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_cert.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_certpolicyinfo.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_certpolicymap.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_certpolicyqualifier.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_crl.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_crldp.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_crlentry.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_date.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_generalname.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_infoaccess.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_nameconstraints.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ocsprequest.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ocspresponse.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_publickey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_x500name.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ocspcertid.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_bigint.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_bytearray.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_common.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_error.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_hashtable.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_lifecycle.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_mem.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_monitorlock.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_mutex.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_object.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_oid.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_primhash.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_rwlock.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_string.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_aiamgr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_colcertstore.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_httpcertstore.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_httpdefaultclient.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ldaptemplates.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ldapcertstore.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ldapresponse.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ldaprequest.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_ldapdefaultclient.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_nsscontext.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_pk11certstore.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix_pl_socket.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/libpkix' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dev3hack.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dev3hack.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11akey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11akey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11auth.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11auth.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11cert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11cert.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11cxt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11cxt.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11err.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11err.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11hpke.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11hpke.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11kea.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11kea.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11list.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11load.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11load.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mech.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11mech.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11merge.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11merge.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11nobj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11nobj.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11obj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11obj.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pars.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11pars.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pbe.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11pbe.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pk12.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11pk12.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11pqg.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11sdr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11sdr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11skey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11skey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11slot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11slot.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11util.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dev3hack.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11akey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11auth.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11cert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11cxt.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11err.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11hpke.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11kea.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11list.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11load.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mech.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11merge.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11nobj.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11obj.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pars.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pbe.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pk12.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pqg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11sdr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11skey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11slot.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11util.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pk11wrap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/asymmkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter asymmkey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certificate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certificate.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptocontext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cryptocontext.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symmkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter symmkey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/trustdomain.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter trustdomain.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tdcache.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tdcache.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certdecode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkistore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkistore.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkibase.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkibase.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pki3hack.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pki3hack.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsspki.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/asymmkey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certificate.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptocontext.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symmkey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/trustdomain.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tdcache.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdecode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkistore.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkibase.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pki3hack.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pki' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/quickder.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter quickder.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secdig.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secdig.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter derdec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derenc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter derenc.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dersubr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dersubr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertime.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dertime.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/errstrs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter errstrs.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssb64d.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssb64d.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssb64e.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssb64e.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsshash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nsshash.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssrwlk.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssrwlk.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssilock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssilock.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidstring.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter oidstring.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs1sig.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkcs1sig.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/portreg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter portreg.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secalgid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secalgid.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1d.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secasn1d.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1e.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secasn1e.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1u.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secasn1u.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secitem.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secitem.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secload.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secload.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secoid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secoid.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sectime.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sectime.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secport.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secport.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/templates.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter templates.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter utf8.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilmod.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter utilmod.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilpars.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter utilpars.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11uri.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkcs11uri.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/quickder.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secdig.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derenc.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dersubr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertime.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/errstrs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssb64d.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssb64e.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsshash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssrwlk.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssilock.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidstring.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs1sig.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/portreg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secalgid.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1d.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1e.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1u.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secitem.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secload.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secoid.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sectime.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secport.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/templates.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilmod.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilpars.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11uri.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil.a grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssutil.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssutil.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/quickder.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secdig.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derenc.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dersubr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertime.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/errstrs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssb64d.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssb64e.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsshash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssrwlk.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssilock.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidstring.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs1sig.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/portreg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secalgid.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1d.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1e.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secasn1u.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secitem.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secload.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secoid.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sectime.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secport.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/templates.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilmod.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilpars.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11uri.o -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssutil3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssinit.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssoptions.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssoptions.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilwrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter utilwrap.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssoptions.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilwrap.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssoptions.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utilwrap.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhtml.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certreq.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlv2.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocsp.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspsig.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certvfy.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certvfypkix.o ../certhigh/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xcrldist.o ../cryptohi/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sechash.o ../cryptohi/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/seckey.o ../cryptohi/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secsign.o ../cryptohi/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secvfy.o ../cryptohi/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dsautil.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dev3hack.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11akey.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11auth.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11cert.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11err.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11hpke.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11kea.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11list.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11load.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mech.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11merge.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11obj.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pars.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11skey.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11slot.o ../pk11wrap/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11util.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/alg1485.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdb.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certv3.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certxutl.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crl.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/genname.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/polcyxtn.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secname.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xauthkid.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xbsconst.o ../certdb/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/xconst.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/asymmkey.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certificate.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptocontext.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symmkey.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/trustdomain.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tdcache.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdecode.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkistore.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkibase.o ../pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pki3hack.o ../dev/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devslot.o ../dev/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devtoken.o ../dev/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/devutil.o ../dev/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckhelper.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/arena.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/error.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/errorval.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hashops.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libc.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tracker.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/item.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/list.o ../base/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/nss' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crypto.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crypto.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/find.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter find.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter hash.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/instance.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter instance.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mutex.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/object.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter object.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/session.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter session.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sessobj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sessobj.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/slot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter slot.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/token.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter token.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/wrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter wrap.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mechanism.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mechanism.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crypto.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/find.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/hash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/instance.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mutex.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/object.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/session.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sessobj.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/slot.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/token.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/wrap.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mechanism.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter anchor.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter constants.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter bfind.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter binst.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter bobject.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter bsession.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter bslot.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter btoken.c perl certdata.perl certdata.txt Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssckbi.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssckbi.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/anchor.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/constants.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bfind.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/binst.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bobject.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bsession.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bslot.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoken.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckbiver.o ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' make[5]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../anchor.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bfind.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../binst.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bobject.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bsession.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bslot.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../btoken.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../ckbiver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../constants.c perl ../certdata.perl certdata-testlib.txt Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata-testlib.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata-testlib.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata-testlib.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libnssckbi-testlib.so -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/anchor.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bfind.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/binst.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bobject.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bsession.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bslot.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoken.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ckbiver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/constants.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdata-testlib.o ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so ../../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so ../../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins/testlib' ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ckfw' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfenc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmfenc.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmftmpl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmftmpl.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfreq.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmfreq.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfpop.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmfpop.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfdec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmfdec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfget.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmfget.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfcont.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crmfcont.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmmfasn1.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfresp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmmfresp.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfrec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmmfrec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfchal.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmmfchal.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/servget.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter servget.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter encutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/respcli.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter respcli.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/respcmn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter respcmn.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/challcli.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter challcli.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/asn1cmn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter asn1cmn.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcrmf.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfenc.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmftmpl.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfreq.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfpop.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfdec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfget.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmfcont.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfresp.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfrec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmmfchal.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/servget.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/respcli.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/respcmn.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/challcli.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/asn1cmn.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/crmf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jarver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jarsign.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jar.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jar.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jar-ds.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jar-ds.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarfile.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jarfile.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jarint.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libjar.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libjar.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarsign.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jar.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jar-ds.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarfile.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jarint.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libjar.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libjar.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/jar' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12local.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12local.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12creat.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12creat.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12dec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12dec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12plcy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12plcy.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12tmpl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12tmpl.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12e.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12e.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12d.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p12d.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12local.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12creat.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12dec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12plcy.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12tmpl.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12e.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12d.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs12' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certread.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certread.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7common.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7common.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7create.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7create.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7decode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7decode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7encode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7encode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7local.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7local.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmime.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secmime.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certread.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7common.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7create.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7decode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7encode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7local.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmime.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/pkcs7' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsarray.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsarray.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsasn1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsasn1.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsattr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsattr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmscinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmscinfo.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmscipher.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmscipher.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsdecode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsdigdata.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdigest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsdigest.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsencdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsencdata.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsencode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsencode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsenvdata.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsmessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsmessage.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmspubkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmspubkey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsrecinfo.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsreclist.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsreclist.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmssigdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmssigdata.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmssiginfo.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsudf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsudf.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimemessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter smimemessage.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimeutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter smimeutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimever.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter smimever.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimever.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smimever.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12local.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12creat.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12dec.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12plcy.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12tmpl.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12e.o ../pkcs12/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12d.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certread.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7common.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7create.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7decode.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7encode.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7local.o ../pkcs7/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmime.o -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/smime' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/authcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter authcert.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmpcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmpcert.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dtls13con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dtls13con.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dtlscon.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dtlscon.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/prelib.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter prelib.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfencrypt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter selfencrypt.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssl3con.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssl3ecc.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3ext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssl3ext.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssl3exthandle.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssl3gthr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslauth.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslauth.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslbloom.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslbloom.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslcert.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslcon.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslcon.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssldef.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssldef.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslencode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslencode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslenum.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslenum.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslerr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslerr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslerrstrs.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslgrp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslgrp.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslinfo.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslinit.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslmutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslmutex.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslnonce.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslnonce.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslprimitive.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslprimitive.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslreveal.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslreveal.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsecur.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslsecur.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsnce.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslsnce.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslsock.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslspec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslspec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltrace.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssltrace.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sslver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13con.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13ech.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13ech.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13echv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13echv.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13exthandle.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13hashstate.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13hkdf.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13psk.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13psk.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13replay.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13replay.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tls13subcerts.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/unix_err.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter unix_err.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/authcert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dtls13con.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/prelib.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfencrypt.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslbloom.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslcert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslencode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslgrp.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslprimitive.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslspec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13con.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13ech.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13echv.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13psk.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13replay.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/unix_err.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/authcert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dtls13con.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/prelib.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfencrypt.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslbloom.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslcert.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslencode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslgrp.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslprimitive.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslspec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sslver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13con.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13ech.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13echv.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13psk.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13replay.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/unix_err.o -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/ssl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nsssysinit.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsssysinit.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a grep -v ';-' nsssysinit.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsssysinit.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsssysinit.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/sysinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/loader.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter loader.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libfreebl.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libfreebl.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/loader.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libfreebl.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libfreebl.a /usr/bin/make FREEBL_CHILD_BUILD=1 NEEDED_DUMMY=1 OBJDIR=Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter freeblver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ldvector.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sysrand.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sha_fast.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter md2.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter md5.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sha512.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha3.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sha3.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sm3.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sm3.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sm2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sm2.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shake.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter shake.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cmac.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmac.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter alghmac.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rawhash.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter arcfour.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter arcfive.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/crypto_primitives.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crypto_primitives.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/blake2b.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter blake2b.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -fno-strict-aliasing desblapi.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter des.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter drbg.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter chacha20poly1305.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cts.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ctr.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/blinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter blinit.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter fipsfreebl.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter gcm.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter hmacct.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rijndael.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter aeskeywrap.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter camellia.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dh.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecdecode.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pqg.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dsa.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rsa.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa_blind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rsa_blind.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rsapkcs.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter shvfy.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tlsprfalg.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jpake.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/secmpi.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secmpi.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/kyber.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter kyber.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/kyber-pqcrystals-ref.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter kyber-pqcrystals-ref.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mpi/mpprime.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mpi/mpmontg.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mpi/mplogic.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mpi/mpi.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mpi/mp_gf2m.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mpi/mpcpucache.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_25519.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecl/ecp_25519.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp256r1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecl/ecp_secp256r1.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp384r1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecl/ecp_secp384r1.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp521r1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecl/ecp_secp521r1.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/curve25519_64.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecl/curve25519_64.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Poly1305_32.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_Poly1305_32.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_Chacha20.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20Poly1305_32.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_Chacha20Poly1305_32.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Hash_SHA3.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_Hash_SHA3.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P256.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_P256.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P384.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_P384.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P521.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_P521.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libcrux_mlkem768_portable.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/libcrux_mlkem768_portable.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libcrux_mlkem_portable.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/libcrux_mlkem_portable.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libcrux_core.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/libcrux_core.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Ed25519.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_Ed25519.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Curve25519_51.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verified/Hacl_Curve25519_51.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter stubs.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nsslowhash.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aes-armv8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -march=armv8-a+crypto aes-armv8.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm-aarch64.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -march=armv8-a+crypto gcm-aarch64.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha1-armv8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -march=armv8-a+crypto sha1-armv8.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha256-armv8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -march=armv8-a+crypto sha256-armv8.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/seed.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter deprecated/seed.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/alg2268.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter deprecated/alg2268.c grep -v ';-' freebl_hash_vector.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libfreeblpriv3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def -Wl,-Bsymbolic -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha3.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sm3.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sm2.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shake.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cmac.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/crypto_primitives.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/blake2b.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/blinit.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsa_blind.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/secmpi.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/kyber.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/kyber-pqcrystals-ref.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_25519.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp256r1.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp384r1.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp521r1.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/curve25519_64.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Poly1305_32.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20Poly1305_32.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Hash_SHA3.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P256.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P384.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P521.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libcrux_mlkem768_portable.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libcrux_mlkem_portable.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libcrux_core.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Ed25519.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Curve25519_51.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/aes-armv8.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/gcm-aarch64.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha1-armv8.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/sha256-armv8.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/seed.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/alg2268.o -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' /usr/bin/make FREEBL_CHILD_BUILD=1 USE_STUB_BUILD=1 OBJDIR=Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_64 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DUSE_HW_AES -DUSE_HW_SHA1 -DUSE_HW_SHA2 -DHAVE_INT128_SUPPORT -DKRML_MUSTINLINE=inline -DMP_API_COMPATIBLE -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Iverified/eurydice -Ideprecated -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter lowhash_vector.c grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/freebl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/lib/softoken' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipsaudt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter fipsaudt.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter fipstest.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstokn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter fipstokn.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/kbkdf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter kbkdf.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/kem.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter kem.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter lowkey.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowpbe.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter lowpbe.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/padbuf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter padbuf.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkcs11.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11c.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkcs11c.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11u.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkcs11u.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sdb.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkdb.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkdhverify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkdhverify.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkhmac.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkhmac.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkike.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkike.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkmessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkmessage.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkpars.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkpars.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkpwd.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sftkpwd.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softkver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter softkver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tlsprf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tlsprf.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jpakesftk.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter jpakesftk.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipsaudt.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstokn.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/kbkdf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/kem.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowkey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowpbe.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/padbuf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11c.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11u.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdb.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkdb.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkdhverify.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkhmac.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkike.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkmessage.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkpars.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkpwd.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softkver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tlsprf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jpakesftk.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn.a grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softokn.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softokn.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipsaudt.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstokn.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/kbkdf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/kem.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowkey.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowpbe.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/padbuf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11c.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11u.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdb.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkdb.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkdhverify.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkhmac.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkike.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkmessage.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkpars.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sftkpwd.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softkver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tlsprf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/jpakesftk.o ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib/softoken' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/lib' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/basicutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter basicutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secpwd.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secpwd.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derprint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter derprint.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/moreoids.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter moreoids.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pppolicy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pppolicy.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ffs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ffs.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11table.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11table.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsectool.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/basicutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secpwd.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derprint.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/moreoids.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pppolicy.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ffs.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11table.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lib' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/bltest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/blapitest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter blapitest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bltest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bltest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/blapitest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bltest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/bltest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtool.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dbtool.c cp ../../lib/softoken/sdb.c sdb.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sdb.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtool gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtool -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtool.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdb.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtool ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ecperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecperf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ecperf.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecperf gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecperf -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecperf.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecperf ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ecperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fbectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fbectest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter fbectest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fbectest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fbectest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fbectest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fbectest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fbectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fipstest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter fipstest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/fipstest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/fipstest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lowhashtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowhashtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter lowhashtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowhashtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowhashtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowhashtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lfreebl3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lowhashtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/lowhashtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 Makefile:77: warning: overriding recipe for target 'libs' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'libs' make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mangle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter mangle.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mangle gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mangle -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mangle.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -L../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/mangle ../../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/mangle' gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter shlibsign.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin /usr/bin/make ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.chk make[4]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 Makefile:77: warning: overriding recipe for target 'libs' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'libs' cd Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ ; sh '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/.'/sign.sh '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ' \ '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ' Linux \ '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib' '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so' /builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so Library File: ../../../nss/lib/softoken/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn3.so Check File: ../../../nss/lib/softoken/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libsoftokn3.chk Link: libsoftokn3.chk Library File Size: 1756808 bytes key: 32 bytes a1 5c b9 a6 5a 9c d4 ff 41 9d 87 3f 8a 07 8f 09 76 2c 36 9a a3 b8 c2 da be 60 43 9d 24 33 2a dd signature: 32 bytes 90 11 89 4c 65 bb d2 e5 74 59 36 42 93 b8 7a ca 41 63 2f f8 80 5f 91 e5 d6 63 88 55 80 3c 2a e8 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate an HMAC key ... cd Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ ; sh '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/.'/sign.sh '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ' \ '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ' Linux \ '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib' '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so' /builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so Library File: ../../../nss/lib/freebl/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Check File: ../../../nss/lib/freebl/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk Library File Size: 241928 bytes key: 32 bytes 59 4b 26 24 ce 8f 87 12 a7 13 96 17 72 08 e1 42 3a 72 fd 6e 0c c0 19 f3 5b 8c 5a 68 d0 f8 a0 72 signature: 32 bytes 46 48 33 f7 78 07 ad ba 04 20 50 a7 5b 83 4f a9 35 ea aa 07 fb 43 e4 14 59 e1 19 af 7c bb 37 aa moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate an HMAC key ... cd Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ ; sh '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/.'/sign.sh '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ' \ '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ' Linux \ '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib' '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.so' /builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign/../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.so Library File: ../../../nss/lib/freebl/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Check File: ../../../nss/lib/freebl/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.chk Link: libfreeblpriv3.chk Library File Size: 4764624 bytes key: 32 bytes 6c f2 61 41 5d 16 1e 29 34 e9 81 db bb 9f 0b 09 2c 56 b0 a6 59 3a 58 6e 21 dc 53 92 5c 47 fa 4c signature: 32 bytes 70 e9 8a a2 21 19 8e 0f 26 fd e3 1e 28 48 d2 62 c8 72 9a fe 83 87 76 5a 8b 97 74 10 78 05 1e 90 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate an HMAC key ... make[4]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/shlibsign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter addbuiltin.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/addbuiltin gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/addbuiltin -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/addbuiltin ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/addbuiltin' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/atob.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter atob.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/atob gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/atob -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/atob.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/atob ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/atob' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoa.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter btoa.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoa gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoa -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoa.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/btoa ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/btoa' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certext.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/keystuff.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter keystuff.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certutil gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certext.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/keystuff.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certutil ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/certutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/chktest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter chktest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/chktest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/chktest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/chktest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/chktest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/chktest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crlgen_lex.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlgen.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crlgen.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter crlutil.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlutil gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlgen.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crlutil ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crlutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/testcrmf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter testcrmf.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmftest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmftest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/testcrmf.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/crmftest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/crmftest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dbtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dbtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/dbtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdump.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter derdump.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdump gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdump -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdump.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/derdump ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/derdump' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/digest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter digest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/digest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/digest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/digest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/digest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/digest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/httpserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter httpserv.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/httpserv gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/httpserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/httpserv.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/httpserv ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/httpserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/listsuites.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter listsuites.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/listsuites gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/listsuites -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/listsuites.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/listsuites ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/listsuites' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/makepqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter makepqg.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/makepqg gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/makepqg -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/makepqg.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/makepqg ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/makepqg' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/multinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter multinit.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/multinit gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/multinit -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/multinit.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/multinit ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/multinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss-policy-check.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nss-policy-check.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss-policy-check gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss-policy-check -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss-policy-check.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss-policy-check ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nss-policy-check' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nssdefaults' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssdefaults.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nssdefaults.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssdefaults gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssdefaults -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssdefaults.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nssdefaults ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/nssdefaults' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ocspclnt.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspclnt gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspclnt ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspresp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ocspresp.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspresp gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspresp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspresp.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ocspresp ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ocspresp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidcalc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter oidcalc.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidcalc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidcalc -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidcalc.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/oidcalc ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/oidcalc' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7content.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7content.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7content gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7content -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7content.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7content ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7content' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7env.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7env.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7env gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7env -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7env.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7env ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7env' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7sign.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7sign gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7sign.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7sign ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7verify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter p7verify.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7verify gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7verify -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7verify.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p7verify ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/p7verify' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk12util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk12util.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk12util gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk12util -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk12util.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk12util ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk12util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11importtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11importtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11importtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11importtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11importtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11importtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11importtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11ectest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11ectest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11ectest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11ectest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11ectest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11ectest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11ectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11gcmtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11gcmtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11gcmtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11gcmtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11gcmtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11gcmtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11mode.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mode gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mode -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mode.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11mode ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk11mode' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk1sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk1sign.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk1sign gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk1sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk1sign.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk1sign ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pk1sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pp.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pp gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pp.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pp ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pwdecrypt.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pwdecrypt gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pwdecrypt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pwdecrypt ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pwdecrypt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsaperf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rsaperf.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/defkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter defkey.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsaperf gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsaperf -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsaperf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/defkey.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsaperf ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsaperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsapoptst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter rsapoptst.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsapoptst gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsapoptst -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsapoptst.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsapoptst ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/rsapoptst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdbthreadtst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sdbthreadtst.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdbthreadtst gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdbthreadtst -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdbthreadtst.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdbthreadtst ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdbthreadtst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdrtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sdrtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdrtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdrtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdrtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sdrtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/sdrtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter selfserv.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfserv gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfserv.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfserv ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/selfserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signtool.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter signtool.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certgen.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter certgen.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/javascript.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter javascript.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter list.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter sign.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter util.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/verify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter verify.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/zip.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter zip.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signtool gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signtool -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signtool.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certgen.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/javascript.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/list.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sign.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/verify.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/zip.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signtool ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter signver.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk7print.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk7print.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signver gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signver -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signver.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk7print.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/signver ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/signver' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target 'install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'install' gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter cmsutil.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmsutil ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/smimetools' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter ssltap.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltap gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltap -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltap.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssltap ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/ssltap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/strsclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter strsclnt.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/strsclnt gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/strsclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/strsclnt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/strsclnt ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/strsclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter symkeyutil.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symkeyutil gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symkeyutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/symkeyutil ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/symkeyutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/baddbdir.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter baddbdir.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/baddbdir gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/baddbdir -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/baddbdir.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/conflict.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter conflict.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/conflict gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/conflict -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/conflict.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertimetest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter dertimetest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertimetest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertimetest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertimetest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter encodeinttest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encodeinttest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encodeinttest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nonspr10.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter nonspr10.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nonspr10 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nonspr10 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nonspr10.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/remtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter remtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/remtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/remtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/remtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmodtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter secmodtest.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmodtest gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmodtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmodtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/baddbdir Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/conflict Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dertimetest Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/encodeinttest Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nonspr10 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/remtest Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/secmodtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tests' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tstclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter tstclnt.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tstclnt gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tstclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tstclnt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tstclnt ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/tstclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/validation.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter validation.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/validation gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/validation -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/validation.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/validation ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/validation' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfychain.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter vfychain.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfychain gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfychain -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfychain.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfychain ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfychain' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter vfyserv.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter vfyutil.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyserv gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyserv.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/vfyserv ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/vfyserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/modutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter modutil.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pk11.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/instsec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter instsec.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/install.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter install.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/installparse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter installparse.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/install-ds.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter install-ds.c gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter lex.Pk11Install_yy.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/modutil gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/modutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/modutil.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/instsec.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/install.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/installparse.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/install-ds.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/modutil ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/modutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter pkix-errcodes.c rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix-errcodes gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix-errcodes -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkix-errcodes ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd/pkix-errcodes' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cmd' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/cpputil' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/databuffer.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x databuffer.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dummy_io.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x dummy_io.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dummy_io_fwd.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x dummy_io_fwd.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_parser.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_parser.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcpputil.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcpputil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/databuffer.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dummy_io.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dummy_io_fwd.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_parser.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcpputil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcpputil.a ../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libcpputil.a ../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/cpputil' make[2]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/google_test' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/gtest/src/gtest-all.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/gtest -I../../../dist/private/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x gtest/src/gtest-all.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtest.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtest.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/gtest/src/gtest-all.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtest.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtest.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/google_test' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/common' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/gtests.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x gtests.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtestutil.a ar cr Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtestutil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/gtests.o echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtestutil.a Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtestutil.a ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/common' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/util_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_aligned_malloc_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_aligned_malloc_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_b64_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_b64_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_gtests.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_gtests.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_memcmpzero_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_memcmpzero_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_pkcs11uri_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_pkcs11uri_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_secasn1d_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_secasn1d_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_select_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_select_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_utf8_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x util_utf8_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_aligned_malloc_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_b64_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_gtests.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_memcmpzero_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_pkcs11uri_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_secasn1d_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_select_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_utf8_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/util_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/util_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/base_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x utf8_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/base_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/base_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/utf8_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/base_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/base_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certdb_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/alg1485_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x alg1485_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cert_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x cert_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/decode_certs_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x decode_certs_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdb_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdb_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/alg1485_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cert_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/decode_certs_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certdb_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certdb_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certhigh_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x certhigh_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/certhigh_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/certhigh_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/cryptohi_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptohi_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x cryptohi_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptohi_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptohi_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptohi_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cryptohi_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/cryptohi_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/der_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_getint_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x der_getint_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_quickder_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x der_quickder_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12_import_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x p12_import_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_getint_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_quickder_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/p12_import_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/der_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/der_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/freebl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dh_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x dh_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecl_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ecl_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsa_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x rsa_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmac_unittests.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x cmac_unittests.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/freebl_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/freebl_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/dh_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ecl_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/rsa_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/cmac_unittests.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/freebl_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/freebl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pkcs11testmodule' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11testmodule.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection pkcs11testmodule.cpp grep -v ';-' pkcs11testmodule.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11testmodule.def rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs11testmodule.so gcc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-soname -Wl,libpkcs11testmodule.so -Wl,--version-script,Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11testmodule.def -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs11testmodule.so Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pkcs11testmodule.o ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a -lpthread -ldl -lc chmod +x Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs11testmodule.so ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libpkcs11testmodule.so ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pkcs11testmodule' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pk11_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/json_reader.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x json_reader.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aes_gcm_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_aes_gcm_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aeskeywrap_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_aeskeywrap_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aeskeywrapkwp_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_aeskeywrapkwp_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aeskeywrappad_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_aeskeywrappad_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_cbc_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_cbc_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_chacha20poly1305_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_chacha20poly1305_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_curve25519_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_curve25519_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_der_private_key_import_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_der_private_key_import_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_des_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_des_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_dsa_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_dsa_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_ecdsa_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_ecdsa_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_eddsa_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_eddsa_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_ecdh_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_ecdh_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_encrypt_derive_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_encrypt_derive_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_export_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_export_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_find_certs_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_find_certs_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_hkdf_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_hkdf_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_hmac_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_hmac_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_hpke_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_hpke_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_ike_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_ike_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_import_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_import_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_kbkdf.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_kbkdf.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_kem_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_kem_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_keygen.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_keygen.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_key_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_key_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_module_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_module_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_pbe_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_pbe_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_pbkdf2_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_pbkdf2_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_prf_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_prf_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_prng_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_prng_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsaencrypt_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_rsaencrypt_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsaoaep_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_rsaoaep_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsapkcs1_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_rsapkcs1_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsapss_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_rsapss_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_signature_test.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_signature_test.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_seed_cbc_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_seed_cbc_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_symkey_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x pk11_symkey_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/json_reader.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aes_gcm_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aeskeywrapkwp_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_aeskeywrappad_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_cbc_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_curve25519_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_der_private_key_import_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_des_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_dsa_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_ecdsa_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_eddsa_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_ecdh_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_encrypt_derive_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_export_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_find_certs_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_hkdf_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_hmac_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_hpke_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_ike_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_import_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_kbkdf.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_kem_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_keygen.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_key_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_module_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_pbe_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_pbkdf2_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_prf_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_prng_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsaencrypt_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsaoaep_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsapkcs1_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_rsapss_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_signature_test.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_seed_cbc_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_symkey_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/pk11_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/pk11_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/smime_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x smime_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/smime_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/smime_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/softoken_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_gtest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_SUFFIX=\"so\" -DDLL_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x softoken_gtest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_nssckbi_testlib_gtest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_SUFFIX=\"so\" -DDLL_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x softoken_nssckbi_testlib_gtest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_SUFFIX=\"so\" -DDLL_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/util Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_gtest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_nssckbi_testlib_gtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/softoken_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/softoken_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/ssl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 gcc -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl_internals.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl libssl_internals.c g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bloomfilter_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x bloomfilter_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfencrypt_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x selfencrypt_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_0rtt_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_0rtt_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_aead_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_aead_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_agent_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_agent_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_auth_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_auth_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_cert_ext_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_cert_ext_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_certificate_compression_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_certificate_compression_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_cipherorder_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_cipherorder_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_ciphersuite_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_ciphersuite_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_custext_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_custext_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_damage_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_damage_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_debug_env_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_debug_env_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_dhe_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_dhe_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_drop_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_drop_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_ecdh_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_ecdh_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_ems_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_ems_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_exporter_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_exporter_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_extension_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_extension_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_fragment_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_fragment_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_fuzz_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_fuzz_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gather_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_gather_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gtest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_gtest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_hrr_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_hrr_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_keyupdate_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_keyupdate_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_loopback_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_loopback_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_masking_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_masking_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_misc_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_misc_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_option_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_option_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_record_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_record_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_recordsep_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_recordsep_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_recordsize_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_recordsize_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_renegotiation_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_renegotiation_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_resumption_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_resumption_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_skip_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_skip_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_staticrsa_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_staticrsa_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_tls13compat_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_tls13compat_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_v2_client_hello_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_v2_client_hello_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_version_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_version_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_versionpolicy_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_versionpolicy_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/test_io.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x test_io.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_agent.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_agent.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_connect.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_connect.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_ech_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_ech_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_filter.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_filter.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_hkdf_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_hkdf_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_mlkem_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_mlkem_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_protect.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_protect.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_psk_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_psk_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_subcerts_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_subcerts_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_xyber_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x tls_xyber_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_keylog_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x ssl_keylog_unittest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/libssl_internals.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bloomfilter_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/selfencrypt_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_0rtt_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_aead_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_agent_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_auth_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_cert_ext_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_certificate_compression_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_cipherorder_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_ciphersuite_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_custext_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_damage_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_debug_env_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_dhe_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_drop_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_ecdh_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_ems_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_exporter_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_extension_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_fragment_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_fuzz_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gather_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gtest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_hrr_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_keyupdate_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_loopback_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_masking_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_misc_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_option_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_record_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_recordsep_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_recordsize_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_renegotiation_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_resumption_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_skip_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_staticrsa_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_tls13compat_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_version_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_versionpolicy_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/test_io.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_agent.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_connect.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_ech_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_filter.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_hkdf_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_mlkem_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_protect.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_psk_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_subcerts_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/tls_xyber_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_keylog_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/ssl_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/ssl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/sysinit_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/getUserDB_unittest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x getUserDB_unittest.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sysinit_gtest.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x sysinit_gtest.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sysinit_gtest g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sysinit_gtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/getUserDB_unittest.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sysinit_gtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/sysinit_gtest ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/sysinit_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/gtests/nss_bogo_shim' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/config.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x -std=c++0x config.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsskeys.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x -std=c++0x nsskeys.cc g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss_bogo_shim.o -c -std=c++11 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -std=c++0x -std=c++0x nss_bogo_shim.cc rm -f Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss_bogo_shim g++ -o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss_bogo_shim -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/usr/include/nspr4 -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -Wno-array-parameter -I../../lib/ssl Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/config.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsskeys.o Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss_bogo_shim.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lnssutil3 -L../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/nss_bogo_shim ../../../dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests/nss_bogo_shim' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/gtests' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss' make: Leaving directory '/builddir/build/BUILD/nss-3.112/nss' + /usr/bin/make -C ./nss latest make: Entering directory '/builddir/build/BUILD/nss-3.112/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 echo Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ > ./../dist/latest make: Leaving directory '/builddir/build/BUILD/nss-3.112/nss' ~/build/BUILD/nss-3.112/nss ~/build/BUILD/nss-3.112 + pushd ./nss + /usr/bin/make clean_docs build_docs coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 /usr/bin/make -C ./doc clean make[1]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory '/builddir/build/BUILD/nss-3.112/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff xmlto -o nroff man certutil.xml Note: Writing certutil.1 xmlto -o nroff man pk12util.xml Note: Writing pk12util.1 xmlto -o nroff man modutil.xml Note: Writing modutil.1 xmlto -o nroff man signver.xml Note: Writing signver.1 xmlto -o nroff man nss-policy-check.xml Note: Writing nss-policy-check.1 xmlto -o html html certutil.xml Writing index.html for refentry(certutil) mv html/index.html html/certutil.html xmlto -o html html pk12util.xml Writing index.html for refentry(pk12util) mv html/index.html html/pk12util.html xmlto -o html html modutil.xml Writing index.html for refentry(modutil) mv html/index.html html/modutil.html xmlto -o html html signver.xml Writing index.html for refentry(signver) mv html/index.html html/signver.html xmlto -o html html nss-policy-check.xml Writing index.html for refentry(nss-policy-check) mv html/index.html html/nss-policy-check.html make[1]: Leaving directory '/builddir/build/BUILD/nss-3.112/nss/doc' + popd ~/build/BUILD/nss-3.112 + mkdir -p ./dist/docs/nroff + cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/nss-policy-check.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/docs/nroff + mkdir -p ./dist/pkgconfig + cat /builddir/build/SOURCES/nss-util.pc.in + sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSPR_VERSION%,4.36,g -e s,%NSSUTIL_VERSION%,3.112,g ++ cat nss/lib/util/nssutil.h ++ awk '{print $3}' ++ grep '#define.*NSSUTIL_VMAJOR' + NSSUTIL_VMAJOR=3 ++ cat nss/lib/util/nssutil.h ++ grep '#define.*NSSUTIL_VMINOR' ++ awk '{print $3}' + NSSUTIL_VMINOR=112 ++ cat nss/lib/util/nssutil.h ++ grep '#define.*NSSUTIL_VPATCH' ++ awk '{print $3}' + NSSUTIL_VPATCH=0 + cat /builddir/build/SOURCES/nss-util-config.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,112,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-util-config + sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSPR_VERSION%,4.36,g -e s,%NSSUTIL_VERSION%,3.112,g -e s,%SOFTOKEN_VERSION%,3.112,g + cat /builddir/build/SOURCES/nss-softokn.pc.in ++ cat nss/lib/softoken/softkver.h ++ grep '#define.*SOFTOKEN_VMAJOR' ++ awk '{print $3}' + SOFTOKEN_VMAJOR=3 ++ cat nss/lib/softoken/softkver.h ++ grep '#define.*SOFTOKEN_VMINOR' ++ awk '{print $3}' + SOFTOKEN_VMINOR=112 ++ cat nss/lib/softoken/softkver.h ++ grep '#define.*SOFTOKEN_VPATCH' ++ awk '{print $3}' + SOFTOKEN_VPATCH=0 + cat /builddir/build/SOURCES/nss-softokn-config.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,112,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-softokn-config + cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.112,g -e s,%NSPR_VERSION%,4.36,g -e s,%NSSUTIL_VERSION%,3.112,g -e s,%SOFTOKEN_VERSION%,3.112,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=112 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,112,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + tr -d '\n' + date '+%e %B %Y' + echo -n 3.112 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in nss-config setup-nsssysinit cert9.db key4.db pkcs11.txt + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config setup-nsssysinit cert9.db key4.db pkcs11.txt + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config setup-nsssysinit cert9.db key4.db pkcs11.txt + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in nss-config setup-nsssysinit cert9.db key4.db pkcs11.txt + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in nss-config setup-nsssysinit cert9.db key4.db pkcs11.txt + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + RPM_EC=0 ++ jobs -p + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.DMmsuJ + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64 ++ dirname /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64 + cd nss-3.112 + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3/templates + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/saved + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib/dracut/modules.d/05nss-softokn/ + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib/dracut/dracut.conf.d + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//etc/crypto-policies/local.d + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/doc/nss-tools + install -m 755 /builddir/build/SOURCES/nss-softokn-dracut-module-setup.sh /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib/dracut/modules.d/05nss-softokn//module-setup.sh + install -m 644 /builddir/build/SOURCES/nss-softokn-dracut.conf /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib/dracut/dracut.conf.d/50-nss-softokn.conf + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man5 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//etc/pki/nssdb + install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//etc/pki/nssdb/cert9.db + install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//etc/pki/nssdb/key4.db + install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + install -p -m 644 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + install -p -m 644 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + install -p -m 644 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/nss-policy-check /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/bltest /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/ecperf /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/fbectest /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/fipstest /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/shlibsign /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in bltest ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain + install -p -m 755 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/base64.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/blapit.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ciferfam.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/eccutil.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ecl-exp.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/hasht.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/kyber.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/lowkeyi.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/lowkeyti.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssb64.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssb64t.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nsshash.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssilckt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssilock.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nsslocks.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nsslowhash.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssrwlk.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssrwlkt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssutil.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11hpke.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11f.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11n.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11p.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11t.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11u.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11uri.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs1sig.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/portreg.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secasn1.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secasn1t.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/seccomon.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secder.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secdert.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secdig.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secdigt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secerr.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secitem.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secoid.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secoidt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secport.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/shsign.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslexp.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilmodt.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilpars.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilparst.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilrename.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in blapi.h alghmac.h cmac.h + install -p -m 644 dist/private/nss/blapi.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in blapi.h alghmac.h cmac.h + install -p -m 644 dist/private/nss/alghmac.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in blapi.h alghmac.h cmac.h + install -p -m 644 dist/private/nss/cmac.h /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3 + for file in libfreebl.a + install -p -m 644 dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64 + for file in dist/private/nss/templates.c dist/private/nss/nssck.api + install -p -m 644 dist/private/nss/templates.c /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3/templates + for file in dist/private/nss/templates.c dist/private/nss/nssck.api + install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/include/nss3/templates + install -p -m 644 ./dist/pkgconfig/nss-util.pc /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/pkgconfig/nss-util.pc + install -p -m 755 ./dist/pkgconfig/nss-util-config /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin/nss-util-config + install -p -m 644 ./dist/pkgconfig/nss-softokn.pc /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/pkgconfig/nss-softokn.pc + install -p -m 755 ./dist/pkgconfig/nss-softokn-config /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin/nss-softokn-config + install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/pkgconfig/nss.pc + install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin/nss-config + install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/setup-nsssysinit.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/certutil.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/cmsutil.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/crlutil.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/derdump.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/modutil.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/pk12util.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/signtool.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/signver.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/ssltap.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/vfychain.1 + for f in certutil cmsutil crlutil derdump modutil pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man1/vfyserv.1 + install -c -m 644 ./dist/docs/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/doc/nss-tools/pp.1 + for f in cert9.db key4.db pkcs11.txt + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man5/cert9.db.5 + for f in cert9.db key4.db pkcs11.txt + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man5/key4.db.5 + for f in cert9.db key4.db pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/man/man5/pkcs11.txt.5 + install -p -m 644 /builddir/build/SOURCES/nss-p11-kit.config /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//etc/crypto-policies/local.d + /usr/bin/find-debuginfo -j8 --strict-build-id -m -i --build-id-seed 3.112-2.oc9 --unique-debug-suffix -3.112-2.oc9.aarch64 --unique-debug-src-base nss-3.112-2.oc9.aarch64 -S debugsourcefiles.list /builddir/build/BUILD/nss-3.112 extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/nss-policy-check extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libfreebl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libfreeblpriv3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libnssutil3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libsoftokn3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/bltest extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/ecperf extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/fipstest extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/fbectest extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/shlibsign extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/lib64/nss/unsupported-tools/vfyserv cpio: nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 35664 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/OpenCloudOS/brp-ldconfig + /usr/lib/rpm/brp-compress + /usr/lib/rpm/OpenCloudOS/brp-strip-lto /usr/bin/strip + /usr/lib/rpm/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/check-rpaths + /usr/lib/rpm/OpenCloudOS/brp-mangle-shebangs mangling shebang in /usr/bin/setup-nsssysinit.sh from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/nss-softokn-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/nss-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/nss-util-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/lib/dracut/modules.d/05nss-softokn/module-setup.sh from /bin/bash to #!/usr/bin/bash + /usr/lib/rpm/OpenCloudOS/brp-python-bytecompile '' 1 0 + /usr/lib/rpm/OpenCloudOS/brp-python-hardlink + /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools/shlibsign -i /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/libsoftokn3.so + /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools/shlibsign -i /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/libfreeblpriv3.so + /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/nss/unsupported-tools/shlibsign -i /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64//usr/lib64/libfreebl3.so Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.Qz52dw + umask 022 + cd /builddir/build/BUILD + CFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection' + export CFLAGS + CXXFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection' + export CXXFLAGS + FFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -I/usr/lib64/gfortran/modules' + export FFLAGS + FCFLAGS='-O2 -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-cc1 -fstack-protector-strong -mbranch-protection=standard -fasynchronous-unwind-tables -fstack-clash-protection -I/usr/lib64/gfortran/modules' + export FCFLAGS + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/OpenCloudOS/OpenCloudOS-hardened-ld -Wl,--build-id=sha1' + export LDFLAGS + LT_SYS_LIBRARY_PATH=/usr/lib64: + export LT_SYS_LIBRARY_PATH + CC=gcc + export CC + CXX=g++ + export CXX + cd nss-3.112 + export FREEBL_NO_DEPEND=1 + FREEBL_NO_DEPEND=1 + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_DISABLE_PPC_GHASH=1 + NSS_DISABLE_PPC_GHASH=1 + export USE_64=1 + USE_64=1 + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9351 + echo 9351 9351 selfserv_9351 + RANDSERV=selfserv_9351 + echo selfserv_9351 ++ ls -d ./dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin + DISTBINDIR=./dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin + echo ./dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin ./dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin ~/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin ~/build/BUILD/nss-3.112 + pushd ./dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin + ln -s selfserv selfserv_9351 + popd ~/build/BUILD/nss-3.112 + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -v '\.crt$' + xargs grep -lw selfserv + grep -vw CVS + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9351/g' + killall selfserv_9351 selfserv_9351: no process found + : + rm -rf ./tests_results with network_tests + echo 'with network_tests' + pushd nss/tests + HOST=localhost + DOMSUF=localdomain + PORT=9351 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh ~/build/BUILD/nss-3.112/nss/tests ~/build/BUILD/nss-3.112 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /builddir/build/BUILD/nss-3.112/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.112/tests_results/security ******************************************** Platform: Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin against LIB /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib: Running test cycle: STANDARD ---------------------- List of tests that will be executed: libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec Running tests for cert TIMESTAMP cert BEGIN: Fri Nov 28 18:46:11 CST 2025 rm: cannot remove '/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.STANDARD.cert.cache.tar.gz': No such file or directory cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #80: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #82: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #110: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #111: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 734ffd19bab63ab13205ff4022e9289a765e81ad -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 25e81f1436d4971bc8e1cb9e060184c45cfbf99e -s CN=orphan -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1f:46:b5:78:d8:a3:c8:51:1f:ed:d2:ea:76:e6:f8: 2f:73:b5:de:4e:25:98:91:9d:5a:61:d5:cf:5c:9d:f2: a0:79:87:b6:7c:ad:94:18:0e:2a:9f:43:a0:81:13:f6: 40:aa:e5:10:bf:e6:16:b3:0c:98:8e:04:5c:2f:0c:19: fd:35:1f:a9:25:b3:a5:94:67:2f:89:45:6b:87:0e:8e: 32:b5:c8:9d:0b:6c:29:bd:78:31:df:6a:f0:22:e9:58: b4:0d:85:a1:0b:f9:bd:46:16:dc:9c:2d:a3:2d:fd:76: 2a:73:bd:1a:54:ba:81:54:42:41:09:db:62:6c:d3:a7: ea:1a:36:aa:63:61:00:68:cc:7d:52:66:0d:ac:08:e7: 4f:9b:92:b2:3a:06:ff:6d:38:6e:02:81:50:aa:7b:ed: a0:5c:7d:11:a3:fe:39:52:17:02:e9:dc:74:55:3c:55: 5d:72:38:17:b1:e8:b0:a2:ee:d1:88:71:1f:01:41:a0: ef:f9:b9:3e:0d:b8:60:ad:f1:7b:9f:68:1b:a4:a4:7e: cc:4e:61:a6:fc:ff:6a:ab:1c:e6:fe:db:61:ce:4b:93: 5c:92:26:67:eb:95:09:c1:4d:c9:37:01:94:4f:63:e3: 0d:7f:29:15:a5:25:5f:bf:8d:50:16:a2:59:47:2c:8f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:d8:80:b1:17:b0:1e:f7:80:dd:a1:f2:7e:10:9b:2e: 6e:b4:63:e5:30:88:80:1a:ca:18:45:0c:47:7e:05:6a: 41:8a:1e:76:5f:1c:1a:82:c4:e4:92:78:59:c4:f1:cf: 0f:41:19:76:88:72:93:1b:f9:59:e3:ef:83:25:a5:90: 8a:f9:6a:04:0f:0e:5d:20:29:6c:52:41:57:f4:f6:56: fc:f9:73:fe:ff:07:23:18:fb:be:c3:74:c8:c4:f3:6a: b5:78:1c:da:43:dd:82:14:02:da:4a:96:78:ba:98:d8: 7a:67:94:27:1f:e7:d0:8a:fa:37:a5:cc:0f:27:6a:9f: 46:d1:07:29:de:1e:d1:80:e3:8d:69:d4:7b:ef:45:62: 85:92:e1:2f:53:02:f1:a0:b3:cb:3f:d3:7f:48:bc:22: a8:ec:1f:19:f0:5c:34:3c:51:0e:dd:b1:97:6c:c0:ed: 62:ed:ab:4c:21:5d:f9:1c:45:d1:48:c6:76:94:84:1f: 13:44:d9:21:28:88:1c:af:e0:ea:70:0e:40:e4:2d:38: 18:2d:80:b9:34:34:79:d5:bb:c5:c9:f9:d6:f3:e8:b3: 5b:bd:36:c4:8c:95:50:2a:f3:9d:51:d9:c7:e0:c3:0f: 17:fa:c8:f2:eb:7c:8e:bf:ce:af:bf:4b:7d:2b:7a:0c Fingerprint (SHA-256): 49:D3:C0:40:EB:CC:02:A7:8D:36:5E:DE:38:5C:D5:F1:B6:25:09:A7:A6:20:3F:A7:E9:17:2B:30:33:45:A3:88 Fingerprint (SHA1): 0F:3B:BC:6E:60:F4:0E:9F:E4:B1:AD:DB:0D:6D:6A:61:A9:39:26:66 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:1b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:51 2025 Not After : Sat Feb 28 10:46:51 2026 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c9:a6:b4:90:55:a3:bc:5b:fb:00:fe:28:91:ac:2a: dd:98:f2:b6:b6:53:71:06:5b:df:f2:27:2f:eb:22:bb: 8e:e6:bf:46:ee:1f:a4:8a:ed:9b:48:14:65:fc:b5:7e: f2:39:87:07:1f:91:f9:db:de:65:2e:9e:86:79:3a:56: 59:5b:4d:5e:fa:be:12:e4:d3:bf:e5:d4:d7:2a:6a:06: 18:18:a2:57:a6:34:bc:21:1c:45:8c:fe:2e:58:94:8d: a8:96:04:67:63:bd:64:fa:00:6b:c8:e6:d7:25:f2:a6: ae:f6:9a:9f:af:8c:a4:87:75:86:f3:80:d3:d8:67:5b: d2:d2:ef:04:a2:ae:79:24:4f:a9:cc:2b:6f:18:22:c2: 1d:d0:25:8b:86:14:52:69:fb:5c:b9:b9:7b:82:a2:9a: c1:a0:21:d8:e3:bd:6b:1c:cf:54:b2:ce:ba:e8:a9:a4: e3:39:c1:69:6a:d2:8f:30:33:53:6b:4e:da:6c:29:04: b2:8f:1b:e2:55:d4:77:47:b6:e4:a9:6a:a6:0d:53:eb: ca:b4:3c:ea:3e:43:0e:0f:85:1c:65:d9:5d:a5:e0:89: 76:a5:81:25:68:9f:29:7e:e3:ab:89:b4:43:66:9e:47: 65:be:65:05:80:f5:49:14:bb:22:ef:2e:1e:7e:e3:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:6f:f8:2c:17:a2:fd:e0:28:66:e2:5c:7b:c9:24:7a: 16:3f:45:b2:b5:ed:6c:72:20:97:5b:24:8a:88:61:37: 26:dc:33:ef:05:c7:85:f1:41:59:c1:2e:bb:ec:6e:11: c2:f1:df:bd:5e:a5:1f:b3:bd:58:7f:6c:da:1e:f2:d8: 54:a2:9d:3e:75:2b:c7:ef:f1:e3:96:cc:a4:13:2e:5b: 3d:1e:97:75:5f:9a:34:b3:56:e5:83:ab:71:01:ec:35: 8f:f0:ac:89:c2:3e:8b:50:d5:31:04:25:da:95:de:82: 82:f6:6b:ed:c8:d4:c8:33:3c:26:63:f0:9c:2c:5b:5c: 70:65:cc:fa:4a:e1:cc:f1:7c:19:c8:53:66:22:dd:0a: 04:48:e5:64:7e:5e:91:e3:15:f9:87:08:34:33:cf:42: ab:8e:7c:33:22:40:eb:06:ae:b5:ac:27:4b:7a:51:e0: 39:4b:69:74:c8:cb:43:7e:14:be:5b:e6:b4:11:15:66: b0:b4:65:3d:47:7d:5d:be:23:5a:88:6b:5d:10:9f:ec: 59:18:3b:b1:4a:2b:dc:a0:48:6c:8a:3f:95:2b:cb:40: b4:fd:df:67:61:2d:d1:7e:04:e8:9a:1c:73:28:2c:8e: 61:b4:e4:65:2e:e0:b8:c2:5a:32:cb:25:3c:70:c2:78 Fingerprint (SHA-256): A4:79:66:D1:E4:29:51:B7:87:56:2E:D3:E9:C5:14:60:B0:0F:22:A3:2A:2A:9E:CF:7B:C1:E6:E0:75:15:10:DB Fingerprint (SHA1): 52:20:F0:FA:9B:9D:36:34:BF:0A:C9:88:C0:3A:92:48:17:6C:B0:6C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:1c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:52 2025 Not After : Sat Feb 28 10:46:52 2026 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:9b:fd:b7:00:e2:6c:57:ae:5e:8b:49:db:32:e4:b5: 60:9d:cf:ab:b1:2f:ad:f0:8c:4c:61:ab:79:b2:70:f5: 8f:c3:f3:2b:da:a2:3e:18:07:5c:e3:31:9f:bf:8f:e6: 53:60:91:9a:5f:6d:c2:1d:b0:f1:fd:80:4a:0b:dc:c6: 1d:a4:31:f3:72:ca:f1:8a:3c:14:f4:3c:25:67:59:48: 04:52:fc:f9:db:dc:d9:55:ae:18:01:df:18:58:a1:b7: e0:b0:f7:a6:3c:20:89:91:1a:69:0d:4a:56:b7:f3:f4: d3:77:34:a3:50:c2:7b:34:ae:f3:d2:92:a8:3d:1f:4e: c1:21:ca:0c:1b:6b:16:24:3e:45:bb:2f:52:7c:c4:f9: b2:53:6c:58:64:46:c4:13:b6:b3:09:d7:65:ce:84:e5: fe:21:fe:e0:fb:95:42:0d:e9:c0:f7:fa:33:14:16:14: b8:97:21:fd:27:9b:8f:db:14:7e:4b:f9:0c:0f:66:e2: 1e:8c:da:1f:39:e6:8f:95:69:30:bc:9b:46:e7:84:4e: ef:ee:c9:b7:c9:0f:1d:71:90:92:fe:af:1d:d1:24:05: 78:03:f7:74:b8:05:e0:51:54:4d:7c:c2:dc:de:b4:63: d2:e1:18:f6:5f:82:c5:61:99:9b:58:f2:e7:95:dd:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:50:bc:e3:03:25:ad:dc:24:c4:54:64:bf:cc:c1:2e: f1:65:f0:93:81:35:7a:be:eb:f2:19:8c:8e:7e:51:1d: 8e:6c:f4:63:e3:df:d9:2a:eb:8a:72:eb:a6:f6:60:94: a5:18:d2:50:fb:7d:87:39:d0:68:01:00:5d:0f:37:e5: e7:d1:be:9c:b8:08:fa:a4:64:64:12:bc:8e:b6:1d:c1: 49:e6:4a:73:1d:c2:99:84:36:f1:b6:36:ff:aa:63:4b: c1:ee:b0:14:9f:23:f7:af:57:a3:16:3b:2c:bc:e6:76: 44:84:2a:23:68:ee:78:a9:03:f6:6e:88:4e:73:2b:9f: 03:01:1a:b4:9c:db:46:9e:22:d8:82:49:ed:e5:84:b0: 50:52:ec:c3:a6:80:25:bf:73:53:55:2d:d1:e6:0f:cd: d0:8d:d8:86:dd:00:27:56:4a:f1:80:03:e0:42:21:c0: 21:af:49:b3:3e:02:a3:b0:bf:2a:97:f0:4c:04:a8:91: fe:d9:49:12:5a:2c:d5:4f:7d:7f:cf:76:c3:23:53:65: 89:44:76:a8:22:b5:d2:f2:7e:1e:4f:45:70:43:6f:cb: e0:8f:0d:9a:69:0a:14:b5:00:74:0a:0b:86:ff:6f:73: 14:97:75:98:a6:15:7b:bd:c9:3c:4e:5a:ac:90:af:5b Fingerprint (SHA-256): 5A:FA:15:30:61:B6:C1:01:43:0B:63:56:47:5B:65:BB:40:50:47:CB:E3:D8:AC:BD:7D:7F:0C:DB:8A:B9:AF:33 Fingerprint (SHA1): 98:A2:E2:D8:EE:58:9A:D1:63:F7:8B:F7:61:46:03:45:AE:EE:A1:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:1d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:52 2025 Not After : Sat Feb 28 10:46:52 2026 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:5f:65:fe:17:5b:cc:04:f3:89:29:d3:c6:18:58:0a: b3:8d:d5:32:33:a3:06:a0:97:04:81:a1:ac:fb:4d:d6: cf:bf:f6:82:e4:c4:f5:27:fc:99:f0:f5:3e:e5:f3:1f: b5:c0:7f:53:7f:6f:03:a3:1c:3a:94:ab:ff:5b:7f:c7: b3:10:a0:c4:63:8b:2a:82:ea:7b:20:f4:32:2a:4a:ea: 2a:61:28:a2:26:3a:6f:a6:fd:b1:13:e5:04:0e:01:55: 14:82:bb:78:21:ba:b2:ad:89:22:a9:13:0a:07:d9:c8: ee:15:ea:87:f1:5d:aa:3c:4d:b5:73:1a:dc:9a:a7:e1: 83:52:03:95:07:8a:2d:63:e9:66:86:8e:2e:ce:87:bb: 7d:7c:ae:f3:76:aa:03:95:39:f9:ad:7b:6a:d9:78:74: 00:28:e6:5f:25:50:b7:e1:d9:54:79:bf:6f:22:12:ca: 0e:fa:45:e2:2d:fc:0c:dc:7a:f4:e3:d5:3f:98:93:6b: fe:d7:d8:4a:cf:e4:8d:8c:c9:cc:ce:f4:50:40:9a:7b: d0:c5:25:71:6a:90:c3:53:c4:a6:62:db:ed:e9:17:30: 08:1c:cc:93:3c:6b:5b:86:ba:32:50:6b:2a:a0:73:4e: e9:06:2d:b2:a4:04:8a:64:9c:b9:9e:ca:83:dc:0e:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:d6:15:2a:56:50:e9:6b:ae:89:40:67:9a:2f:3f:2f: dd:f7:9b:83:6e:b7:ad:16:b7:5c:7c:7e:63:26:a4:35: 5b:0f:a2:e2:da:5e:28:47:19:ab:36:32:03:25:9a:47: 0e:62:a8:b6:1b:9f:d1:03:e7:c9:be:ad:7b:9c:c4:1b: 4f:43:09:0f:3a:9c:c2:72:7e:83:4a:f5:dd:f2:f4:8c: 50:2e:8e:3e:60:6c:86:6c:0b:6f:f0:ba:f2:4d:cf:50: b1:b5:27:55:7a:4d:40:64:3a:48:a9:9f:d3:b7:d5:c3: cd:5b:da:10:d9:83:35:17:b2:84:66:fd:05:13:70:5a: 4a:13:0b:17:23:68:05:06:b8:23:16:ae:9f:68:73:ba: 10:cc:4a:3b:14:f3:db:f6:e2:10:b0:56:ef:37:dd:5c: 0a:c6:7a:21:9f:ab:ca:1e:ee:36:58:d1:a2:b3:58:27: fe:2e:c1:91:e8:18:16:fd:b5:a4:d4:d4:28:21:f3:b3: c5:8c:68:5d:a6:fd:64:3d:53:c7:2d:34:fc:27:07:5b: de:36:58:f5:5e:2b:19:9d:2c:f3:e7:6d:d0:91:9a:0f: 9b:77:85:57:b3:09:1f:7a:72:87:c7:2e:87:68:49:a5: 7c:63:d6:dc:f3:87:05:6c:43:aa:9c:ad:be:09:03:0a Fingerprint (SHA-256): 96:5D:5E:5C:96:A6:91:F3:FB:68:DB:A9:1D:0B:CD:57:AE:20:C9:89:27:55:39:3A:6C:F0:BB:2B:ED:AC:58:52 Fingerprint (SHA1): 5E:48:D9:B9:D8:9B:66:70:EA:81:2B:2C:40:B3:6F:B7:C4:68:B9:4E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:1e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:53 2025 Not After : Sat Feb 28 10:46:53 2026 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:fa:4a:17:dd:db:df:c6:9c:ea:d2:cf:40:43:b8:02: 30:43:e5:7b:92:b3:71:cc:ca:c1:57:d6:5f:44:13:37: 03:41:df:56:1d:3b:fa:dc:38:18:50:28:0b:4d:a9:90: 61:26:24:41:26:dd:28:9a:42:9d:b3:08:52:d5:2f:f0: 17:05:11:35:71:da:25:ea:e7:37:27:b9:d3:47:9f:93: 01:72:94:fa:ff:84:1d:63:1e:d5:c9:a4:ac:98:e8:f4: 0f:84:ec:0e:32:9d:63:de:1c:6c:0d:f6:73:89:21:30: 33:b9:7f:62:81:0a:76:f6:bd:71:f3:75:16:dd:ed:8b: ca:8d:86:22:a8:d2:7a:ba:95:f1:8d:68:61:39:59:63: ba:54:34:c9:a5:cf:43:7a:08:21:de:af:3e:50:bf:a2: 46:89:98:fe:15:51:8b:bc:8c:21:08:0c:3e:22:c7:aa: 02:69:93:b6:5d:20:00:08:5d:ed:c6:eb:1b:3a:9c:9f: 5d:39:6d:30:03:ed:fa:37:cd:12:b5:a5:a1:06:3e:f9: f4:27:10:73:51:cf:ec:0d:f9:d6:6a:a7:97:df:c0:85: 85:ba:9e:68:98:d6:27:f7:f1:4f:6b:e4:df:e5:3c:99: af:0b:98:e7:07:98:09:42:68:98:93:0d:f1:08:dc:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:63:fe:44:76:37:99:01:29:10:d2:44:36:38:bd:88: 86:14:44:c8:41:d2:16:c9:55:a0:16:fe:ff:88:0b:8e: 53:15:10:9f:1d:f1:47:c1:90:21:42:6f:bb:fd:2f:54: 48:cf:55:1d:b6:43:fd:9f:65:26:a0:db:d3:59:f1:43: 52:ae:1f:6d:ea:f7:77:a3:de:4a:17:21:73:4c:63:c5: 78:31:cf:ce:d8:61:65:a7:52:7c:30:68:8d:93:50:35: 2e:ee:0a:65:81:0d:b2:5a:fe:e3:d1:2b:5b:78:5b:91: 82:4e:4a:d4:38:59:91:70:bb:aa:a5:3a:10:cd:ac:bd: 08:ff:07:6f:b6:26:2f:4c:2b:5e:cc:82:c7:d9:3f:5c: db:09:60:68:38:aa:b1:94:64:76:14:4e:8f:ab:04:74: 11:dc:35:32:91:9e:50:a1:c9:67:a2:84:29:b8:01:9e: b3:8c:d2:0b:7a:24:3f:00:e7:27:cc:78:f7:9e:18:5a: 0c:73:39:f8:09:08:82:3c:23:03:6f:22:49:07:12:0e: 4b:b1:35:3b:03:32:8d:27:4d:ef:5b:6c:e3:07:f1:aa: 7c:06:73:d3:8c:8e:c1:73:23:04:b9:ae:99:1f:62:35: 7c:12:1b:1e:b5:83:a7:5e:75:4e:c6:28:ef:b8:1f:b9 Fingerprint (SHA-256): 90:AD:58:60:01:B2:E1:DB:74:B5:B9:46:34:77:7B:ED:7F:49:78:D5:C7:8F:30:3A:45:F7:FD:48:2D:FB:AC:1B Fingerprint (SHA1): 7B:61:00:84:62:88:3B:AC:DA:F9:04:9D:A6:62:66:66:B8:81:69:DE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:1f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:54 2025 Not After : Sat Feb 28 10:46:54 2026 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:66:af:09:a7:06:93:59:3a:62:95:ec:6b:93:e6:17: 9e:1f:b0:8a:9a:bc:ef:88:94:0e:d4:82:fc:47:ae:f9: e5:b9:ad:e3:ba:1f:8e:5b:71:99:2e:a9:ed:6b:06:d1: 5f:1e:a9:1f:5b:28:42:f1:08:56:57:3b:3f:2c:92:77: c6:19:6d:ac:7f:1a:b9:75:84:e4:cb:37:f4:b0:10:70: a9:c3:18:9b:3c:d4:76:65:fe:c5:f7:ba:92:22:f9:37: f1:6b:b4:7f:11:72:e7:bf:5d:06:03:d8:aa:31:6c:e6: f9:fb:e9:c8:68:c5:43:32:a9:47:65:62:7c:30:a8:b0: b2:a5:ab:dc:5a:d7:49:fb:ec:5a:11:c4:5c:d4:12:90: 45:50:da:18:bd:81:e4:22:1c:29:48:90:db:bf:17:24: 33:b6:51:95:ed:8e:c4:a6:0f:14:57:e8:b2:42:a4:ac: f1:45:95:60:06:b5:f9:c0:4c:23:9b:46:a3:8d:90:fa: 03:8d:d4:29:2c:23:2b:ca:c9:73:6a:25:67:10:4d:11: 97:ff:82:6c:76:8a:f1:3f:aa:c3:5e:e8:86:bb:a9:95: b5:be:49:b7:4d:09:b0:c2:7f:61:4f:46:6b:2c:3e:db: aa:05:6e:13:2d:00:c4:af:e5:77:a9:aa:6d:90:25:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:73:d1:0b:c0:42:99:26:8e:b1:e6:b9:21:f0:8c:01: 96:89:93:5d:2d:ed:64:70:84:62:e7:44:b1:b1:16:06: 75:39:d8:12:2b:2f:7e:8f:54:0f:48:db:bd:4d:cf:74: c5:5e:75:0a:63:e0:96:15:7c:76:7b:4b:6c:75:d4:da: c3:60:78:ae:ea:16:70:02:48:2e:4e:54:6d:de:e0:66: 31:0d:4f:6b:c9:0a:99:54:32:60:c8:53:25:34:b8:cc: d1:23:5f:d2:67:0b:4a:d6:5f:8f:a1:d2:0b:f1:cb:ee: f6:1c:61:db:06:81:15:b5:bf:2e:86:15:a7:49:e3:f8: ea:ba:bd:00:e7:57:ea:2d:a1:f1:4b:ce:78:02:96:c1: 06:e1:3d:ba:7c:f1:62:ff:43:a9:3b:50:25:f3:cc:98: df:e7:bd:34:81:3b:32:11:02:49:c5:34:74:a2:0c:14: 53:e7:8b:55:d6:83:1c:27:f1:84:bb:28:d9:93:24:ad: 8f:62:de:d3:2f:e5:28:e4:1b:37:30:01:ef:7e:87:88: 2e:9c:90:c4:86:9a:19:d5:19:dc:8a:f4:ba:67:73:4a: f8:20:b1:d2:4b:5f:46:dc:ce:73:9e:68:97:ee:e7:58: f2:1c:12:ed:ab:58:ff:f6:ef:23:10:a5:85:7c:ba:93 Fingerprint (SHA-256): 78:89:BA:12:F8:74:95:F9:F9:14:D9:71:AA:CE:E3:22:EE:15:6E:5D:E8:27:93:64:C2:CC:DC:D8:0E:76:57:3F Fingerprint (SHA1): 51:3D:0B:E0:D5:AA:20:61:77:CA:78:10:EF:29:A5:C6:64:B1:56:8C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:21 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:54 2025 Not After : Sat Feb 28 10:46:54 2026 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:99:2a:4c:0e:9f:93:7e:d6:32:9a:fd:90:09:33:e9: 92:7b:49:d8:14:a6:c2:70:fa:ac:b5:cc:26:a0:51:c8: e3:74:7b:08:6f:73:bd:51:e9:c9:87:ab:33:6a:e7:f5: c0:b4:81:8c:fa:70:76:f0:3b:1b:22:1c:91:96:ed:f5: e7:93:c2:e8:0e:d0:bc:5d:7d:a0:e3:af:b4:af:fa:a7: ba:83:59:24:fa:7c:a3:28:18:fa:4d:e6:d3:8b:fd:e3: 1a:76:7c:6b:e5:f0:8b:d8:c5:30:5e:77:51:1a:e0:3a: 85:ec:01:8f:61:4b:37:3c:62:bd:63:93:81:f7:7a:39: 90:10:e6:e2:fd:05:cf:62:4b:e4:a7:a6:78:87:b3:b9: e7:a0:d4:bb:cb:3e:6f:b8:04:88:1f:12:7c:36:0b:cd: 9b:96:ba:3b:d6:d4:97:db:0b:e0:fe:d6:30:d5:4f:79: 51:be:39:7c:19:b7:ec:d3:fb:e4:5c:1b:6e:42:dd:aa: 03:1a:d1:46:1e:f8:18:f7:71:20:2a:37:95:d9:93:d9: 76:96:1e:6f:9b:fc:d2:7e:f0:15:38:ff:e1:f2:02:e3: 76:fd:21:61:a3:8a:1c:27:ca:b4:dc:c3:91:d6:60:e2: 4c:29:ce:d0:30:8f:ba:47:12:de:58:7a:39:88:96:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ff:dd:30:fc:b8:17:47:5e:69:6f:53:02:51:3f:ad: 31:6b:59:a3:f7:48:46:3c:00:d7:a2:10:9e:4d:5c:e9: 52:f3:80:f8:11:80:19:cc:ef:04:fe:2c:73:08:e3:8b: 6f:ee:5b:10:7d:0a:7e:09:98:4e:a0:b2:a0:04:30:2a: bf:39:5f:56:8c:2d:14:3b:1a:8d:6d:69:40:87:b0:a9: d1:d1:3f:99:e6:52:3e:10:2a:b5:7c:19:a3:16:ed:3b: 66:d3:dc:d1:d7:67:23:d8:df:ce:da:bc:6f:0d:cc:f2: 92:23:8a:d0:85:ea:85:35:35:e1:4b:1f:07:08:f5:6d: 75:50:18:a9:00:66:ec:c6:f1:10:bf:99:fc:6d:b4:f7: 92:e7:0d:c5:af:b3:35:f7:d7:0a:46:d0:29:00:f8:cf: 21:b6:2c:0f:75:73:0d:5e:02:60:08:ad:67:66:22:d8: a1:7e:1d:f1:79:06:07:b5:21:bd:68:5e:aa:7f:30:a7: 98:6e:1c:57:39:16:75:d5:4e:90:05:bc:1c:16:ca:fc: a4:11:a3:ac:a5:66:8b:31:b5:d6:b3:e9:94:c1:0a:8e: 5c:f2:1b:bb:4d:1c:b6:5e:ec:72:b6:7e:23:d5:5d:4c: a0:5b:a0:19:17:a1:76:4c:49:c7:61:33:d3:51:0e:24 Fingerprint (SHA-256): 44:C0:9E:89:AE:FE:3E:0B:10:BB:C0:FD:05:52:82:E7:A1:5D:A5:DE:ED:62:7F:0C:14:00:F7:FB:97:D3:7B:71 Fingerprint (SHA1): 06:2A:9C:0A:4E:1E:0A:A6:82:10:A6:7A:FB:66:55:8E:4A:98:6F:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:55 2025 Not After : Sat Feb 28 10:46:55 2026 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:55:fe:eb:e8:82:2e:aa:72:75:74:90:61:02:ee:08: 5c:be:3c:98:c4:8a:5a:8d:fd:d5:5e:97:de:d8:1c:72: 3a:c4:98:3e:96:0e:78:c9:8b:c1:c0:da:9b:f9:53:17: f4:9a:dd:11:ec:0d:98:a3:22:fc:55:bc:58:5a:8c:48: bf:6a:2f:b9:34:c0:3f:7d:56:07:90:d2:89:92:b0:db: 67:53:b0:a0:a9:70:e6:d8:22:21:f2:3b:a3:ca:17:5e: bf:cd:ca:c5:d8:4b:2c:24:50:58:c2:b6:c9:8a:ba:88: 75:2e:02:af:05:77:f7:e9:88:88:7e:1f:b6:6f:16:8f: 25:9e:5e:90:9e:79:de:d6:96:2d:78:67:43:e9:04:ab: ec:6f:4d:00:11:80:16:42:92:a9:af:bf:e5:ce:54:6a: 3a:be:8f:8e:d5:c3:af:17:c4:13:df:6f:21:c4:b7:a7: 83:82:2c:2a:39:f0:89:7a:d8:67:c7:40:8a:73:4b:95: 26:cb:4a:58:23:29:d8:fc:60:af:c8:c4:87:8f:1a:27: 78:a5:31:d1:9b:7b:7e:9c:14:8c:8b:d0:37:94:74:66: 4b:be:32:74:3c:d9:30:6e:b6:19:84:5d:d4:ef:7d:f5: 88:d7:6c:04:2d:e7:20:5f:e8:d0:78:7d:bd:98:ac:ad Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:4b:53:c1:bc:e5:34:09:bd:5a:ae:de:95:cc:49:d8: ca:2d:61:1e:ff:cc:3a:b4:e8:c8:bb:8e:d7:85:ac:21: f5:bb:87:05:c7:76:98:ca:d4:66:f2:c7:b8:e5:f3:89: f6:d2:29:6d:da:2f:93:1e:11:c6:ee:1b:49:2b:d4:68: e9:f2:8b:5e:bc:a4:4a:3e:e6:8f:e3:dc:db:cb:89:bf: 26:06:66:26:da:48:23:08:40:83:f7:09:5b:e8:f6:dd: 0c:a1:32:08:fc:65:6e:ef:16:8a:a4:34:c9:20:2c:2b: f0:48:a3:57:16:5b:e4:70:f3:4f:35:d4:a2:1e:65:eb: 96:f4:74:37:84:02:c7:ff:49:b4:40:e2:55:92:d0:5f: d6:c3:cf:05:c5:f5:bc:87:a6:77:c5:30:da:e2:ad:81: 10:86:b8:f9:ea:69:e8:ba:ed:57:94:3d:b2:f7:20:d9: 59:cd:fe:c7:64:e2:12:65:63:45:3d:ca:15:11:48:a0: 72:38:ea:3c:a8:9d:9a:7e:37:5d:3d:2c:9d:f0:d4:d2: 2d:7e:ee:d2:d0:c3:70:e6:29:34:9e:ee:0c:09:20:bf: b1:cd:5e:66:37:99:4b:a6:da:fa:2d:cc:c0:0c:87:bf: 77:47:92:0a:9c:ee:b0:3e:40:24:02:a1:31:a9:64:ab Fingerprint (SHA-256): 9D:3E:08:24:A5:37:8A:A6:68:C6:AC:2C:C6:8D:B5:EC:FF:CE:AB:5F:99:F1:06:DD:36:FE:71:D8:D1:0F:1F:9E Fingerprint (SHA1): E9:E1:03:8D:02:57:51:1E:42:C5:68:D5:2D:3A:85:3C:C3:2C:4D:F9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:23 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:55 2025 Not After : Sat Feb 28 10:46:55 2026 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:8a:2c:b9:b5:29:09:ca:30:16:20:10:d9:e5:02:c7: f1:b2:7c:4a:e2:57:ba:3b:d7:8f:cc:5c:f6:93:7c:23: c7:64:fa:b8:d0:12:08:ac:df:83:c3:8c:ae:ee:37:f9: 7f:4e:20:11:f0:9a:d9:86:7d:05:26:db:5b:bf:a7:d4: 4f:c3:88:54:86:6f:03:c1:ba:d7:56:55:de:ef:1d:63: 00:82:c3:31:76:aa:42:79:90:52:74:35:b6:90:1d:79: 75:ed:71:c0:4b:6e:e0:39:db:ed:25:fb:a9:49:d5:52: 20:a5:03:60:8d:af:66:2c:09:a9:bc:be:db:07:ea:54: 8b:1c:c1:7b:20:43:d7:9f:09:56:25:26:ec:f6:3e:e3: 6b:6c:e5:03:67:d7:03:42:bf:90:3a:1a:e6:a1:48:df: a0:cc:da:05:cd:7d:9d:59:85:bc:ff:1f:c4:c4:bc:cc: 28:f3:55:94:99:4d:b9:f4:ab:c4:34:af:71:87:b6:0d: 82:f8:d1:19:46:0f:1e:24:0a:52:47:db:b6:db:45:f0: 06:53:1f:31:51:63:17:a6:47:3c:15:ba:27:91:e1:27: 4b:ac:e6:a1:ab:66:a1:ed:e3:2a:16:f8:42:46:c9:11: a5:58:a3:d7:c5:e9:2b:e6:30:46:0d:af:38:3f:29:95 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:c7:16:65:4b:da:73:bc:52:5b:2c:55:55:5e:f8:b9: 39:56:c3:55:26:66:bf:98:0e:4f:13:79:b4:b0:b7:c6: bb:8c:57:1a:b5:ac:d2:24:52:52:2a:65:e8:17:e7:16: d6:59:ec:61:86:82:26:ff:75:47:4b:6d:14:d8:9d:0c: 88:65:ba:af:81:f0:9d:3d:7e:2e:f8:4e:8b:ea:17:9e: 89:fc:87:e7:bc:64:03:ba:e9:c2:8b:97:d8:47:9a:d7: a0:64:49:1e:80:60:b9:13:7e:f3:a1:98:1a:14:26:7b: 71:e8:3f:42:63:7a:d7:b3:b4:72:07:1e:98:f7:40:2a: dd:99:d8:04:ac:c2:41:34:f3:a0:72:a2:49:c0:f8:9b: 9f:81:5f:b3:a6:0a:fc:e9:f8:b9:15:e7:8b:cb:1d:1d: d5:57:a6:a4:22:31:b4:80:b2:12:43:5f:da:d8:49:15: 03:e0:5f:54:d2:33:cf:42:37:f3:cb:6c:9a:de:2d:25: 16:45:de:05:12:0e:af:2e:fc:47:a9:05:17:68:63:fc: cf:24:81:d5:2e:49:14:4f:85:ae:29:28:38:7d:72:47: 60:d0:99:25:2e:8b:e3:1c:83:16:50:fd:ca:48:0b:80: 1f:23:5a:80:b5:39:4b:df:67:13:17:bb:68:4f:d1:d7 Fingerprint (SHA-256): A0:81:52:4E:A6:B9:12:69:8B:06:D9:49:E5:49:CD:5F:9B:E6:46:16:33:1D:74:6C:67:CF:C0:5E:A8:5A:76:63 Fingerprint (SHA1): 47:AF:55:5E:CE:EB:43:15:2D:1A:B1:2A:C0:4C:C3:0B:39:7D:9D:2C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:24 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:56 2025 Not After : Sat Feb 28 10:46:56 2026 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:47:28:d6:19:43:54:c8:81:a2:d4:2a:43:67:f6:61: c4:73:cd:47:c5:a3:f4:da:2b:b4:55:b7:36:c2:13:ad: d8:af:a9:5b:7f:9d:5b:b9:fc:2d:85:42:c1:97:67:f4: 31:a1:79:c0:31:3f:76:bf:87:50:1f:e7:60:89:51:b2: da:3f:80:00:69:69:ee:1c:a1:c2:35:bd:6a:ff:14:83: c8:b5:07:50:1e:d5:67:b5:ff:b0:12:35:5f:4a:18:fd: 30:2f:d4:0f:a5:9c:8a:8a:87:bd:50:4d:81:cf:f9:2c: ef:b1:63:10:67:93:9c:66:d7:28:b2:8b:c5:ab:81:08: 92:d3:30:c7:a9:5e:18:5f:97:1e:79:7b:d2:cc:40:6f: dd:53:0a:f6:cc:c9:17:91:48:1f:14:27:5f:7a:36:29: b0:10:fc:26:4e:50:f4:c9:09:78:a5:9a:a0:a2:d5:74: d9:f1:77:f1:32:c9:05:ed:b4:03:6b:9a:0b:8a:d9:8e: b3:ae:9a:83:72:23:06:65:d2:27:28:11:65:a4:a5:70: 0a:06:fd:9e:53:72:ab:7a:97:16:5c:ca:d5:4d:b6:12: 47:2c:0b:89:c8:54:60:21:c1:94:25:94:c2:d8:70:ef: 60:55:9d:22:6d:49:25:0c:11:9e:c8:35:60:df:ac:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:15:b5:79:be:38:98:5c:ef:fa:35:29:b7:22:9e:00: 5a:43:ed:78:56:83:b3:cf:ec:3c:78:29:cf:66:c9:79: 51:e8:38:3b:f1:8d:1e:09:87:99:a6:d7:d1:81:ea:78: 13:aa:9d:08:44:c8:09:c7:82:4c:82:8e:b8:e7:27:94: e9:ec:57:ab:4b:68:04:9e:28:9f:2a:c7:c7:46:a0:3d: 8b:72:5d:19:23:bc:1b:f0:7f:cb:dc:f7:22:ec:5d:04: 77:a2:76:0d:7a:f8:48:ff:0e:a5:23:66:23:2f:2f:24: 02:3a:58:e1:e7:6f:bd:dc:6f:18:0c:92:53:b2:ba:45: e5:ad:d6:08:d2:0f:07:e7:7a:61:a0:4b:fe:cf:3b:86: 83:19:19:e1:b4:9f:bc:8b:05:77:41:5e:e5:92:2f:81: 3d:fb:b1:c0:ff:79:36:7c:e8:b3:ba:e2:78:3c:79:9f: 6e:14:7b:af:4d:9b:cc:5f:dd:30:54:89:d8:a0:a0:f0: a1:80:7a:82:ee:37:67:e9:ff:a4:60:e6:86:4c:8e:b6: 7f:48:3d:3d:d6:b4:36:4d:a7:99:bc:ee:c4:7d:78:c6: 8c:6e:57:f0:93:d5:32:9f:40:31:f5:f3:a6:82:e5:54: 87:0a:24:af:8c:80:59:77:bb:74:3d:c9:69:d9:c9:b9 Fingerprint (SHA-256): 3C:2A:D5:9C:1C:79:88:08:B6:F0:AB:A6:20:BB:EB:36:DD:24:60:0A:A0:00:B4:3C:96:E8:65:E8:E6:4E:D5:47 Fingerprint (SHA1): C4:CB:65:85:CA:51:8C:BB:73:BC:0F:9D:28:98:38:D9:F1:21:8E:1D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:25 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:56 2025 Not After : Sat Feb 28 10:46:56 2026 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:ab:11:db:b5:6e:4e:8c:59:6c:74:b9:18:9a:70:fe: 11:e5:38:9c:2b:04:b4:0d:67:04:a3:c3:6c:28:94:94: 3f:93:99:c1:4b:35:cf:f1:5e:c8:77:4f:a1:8f:ba:56: fa:0a:40:38:af:0e:64:9a:b7:41:2b:ee:33:4d:2e:cb: 65:0d:1e:69:15:7f:6e:c9:60:33:f7:7e:4c:b5:45:f5: 1f:7a:1a:f0:01:e3:7a:15:e7:29:e2:7d:d1:4c:e4:da: a6:bf:d5:eb:6f:74:46:b6:0e:c2:8e:f1:d6:1c:21:18: 96:d1:5b:c8:9e:51:05:e3:e0:9b:15:fd:ff:f8:3c:77: 22:04:fe:f1:04:8c:69:c6:77:a4:0c:3b:99:c9:d5:26: 60:b1:32:de:c3:12:b6:c2:bf:9c:fa:5a:0d:5a:e9:ed: 2a:ff:37:aa:4a:57:e4:e8:14:c4:4a:55:31:08:fa:ad: df:87:75:cc:09:f8:77:f3:eb:a1:67:8f:e8:cb:5f:93: 8c:3c:7c:c6:63:2d:30:c6:49:7e:7e:86:96:ef:4f:7b: 7f:59:aa:59:31:85:d9:a1:5e:30:61:5f:3b:76:72:5a: 62:3a:cc:de:57:92:aa:60:66:d1:ac:d1:6e:6d:25:e1: b7:10:c3:51:1d:31:28:8b:f5:e4:fb:c1:09:11:db:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:75:6f:28:de:67:31:73:d8:5b:3f:94:ed:91:8d:fe: 13:52:b9:cd:40:d7:d7:64:13:3d:f8:a1:26:9a:a3:d2: cd:d5:a3:d9:fd:b3:91:1a:06:49:26:c3:cf:73:17:6d: 3a:78:3c:69:5d:ec:ec:21:e8:39:af:d9:52:be:75:8f: 7e:29:cd:a0:3b:31:5c:f3:a0:23:04:13:12:84:21:ff: 07:f9:4f:00:00:a8:cb:e2:7f:28:69:4f:ce:0f:18:7d: 20:73:62:72:cf:6a:77:2e:33:35:30:d7:f3:f9:2c:5c: 8d:24:b7:ea:8e:69:4d:2f:91:99:65:39:b1:c9:f2:c4: 4e:c4:94:c2:ad:14:f1:7c:9f:ab:1c:eb:03:07:5e:74: dd:f7:a0:18:31:f3:0c:67:3f:65:38:9f:62:ed:4c:4f: 89:0a:54:de:80:1b:67:7c:19:fc:36:26:72:89:7f:50: d2:f6:e9:36:98:6f:db:43:18:be:c3:38:bf:63:3c:31: ff:42:6c:a1:bb:ff:aa:b1:1f:99:17:67:a3:74:b0:d3: f1:ef:a4:cc:e2:f3:c4:e6:92:af:80:99:a1:ef:4c:7b: a5:8c:b9:be:2e:7c:59:03:d4:01:c3:dc:55:3c:68:a1: 45:42:6a:06:00:a0:96:5c:b9:7f:98:dc:31:af:cf:40 Fingerprint (SHA-256): E0:6D:47:DC:AC:2A:55:10:D2:0A:2D:05:59:CE:8A:0F:BD:B4:CC:A4:70:C5:18:94:71:EB:C8:8C:D9:76:9F:06 Fingerprint (SHA1): E3:A6:D5:B7:10:57:35:08:C4:E4:6B:B4:2C:E7:14:24:D6:18:F2:93 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:26 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Fri Nov 28 10:46:57 2025 Not After : Sat Feb 28 10:46:57 2026 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:e3:bf:3f:0e:67:41:2e:8b:d6:d5:1f:aa:d5:81:46: d4:aa:22:b3:6d:a9:a1:0e:7f:ce:09:bd:97:6a:4a:0b: 07:8f:00:3c:a5:49:56:f1:71:e1:8a:6d:1d:e7:c1:96: 64:70:09:68:30:6b:ea:64:39:9a:38:ff:97:62:e7:8d: 7b:38:92:06:8f:a8:1d:94:52:ee:4b:84:16:87:76:26: c3:a0:ad:a5:39:4a:2b:3b:ef:e6:ac:b1:c5:3e:d1:60: 83:1c:ff:57:1d:6e:e9:61:8f:ef:e9:07:e4:c5:89:b5: 1a:f7:9f:3b:27:91:3b:9c:cf:76:16:98:bd:d6:ab:c3: cc:6d:7c:fe:1a:b3:3f:cc:0b:f5:96:f6:83:19:84:18: 41:72:14:68:3b:f7:cc:c2:9d:a1:6a:25:ce:17:36:76: 5e:73:1e:60:54:28:ed:74:05:71:ad:ba:71:fe:8a:d2: a0:14:e8:f7:c1:83:6c:c7:92:0e:1a:3d:ce:e3:e6:87: 03:26:58:b6:f0:fa:43:b0:c3:ff:45:d6:b5:45:55:dd: 46:3b:b1:a8:d5:8d:e4:40:82:ea:c2:9f:ee:50:04:91: fa:87:36:13:e0:3c:e9:55:a8:e4:3d:38:59:40:97:43: 38:07:92:40:84:31:d7:e5:b9:42:52:8e:ca:79:fc:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ab:49:1d:2b:27:12:59:a3:13:a5:1a:b2:be:a6:d0: 98:fa:1f:bb:a3:01:0d:07:ac:75:df:a0:e0:2e:f5:8c: 06:a6:b5:05:f9:1b:de:1c:65:e0:e4:23:d7:2d:47:6a: 69:e6:39:b9:81:87:01:f9:fb:04:35:1c:48:ae:cc:41: 2e:e3:21:fd:3b:8e:31:b2:f7:82:3e:2d:82:2f:32:93: 77:17:e8:d3:8e:36:15:27:93:e8:19:19:8a:25:8f:7e: 9d:51:ac:7d:be:91:16:90:25:3a:b6:c2:36:95:3f:0d: b8:37:16:a7:bd:18:fa:c7:47:7e:15:cc:d1:30:54:dc: 28:10:fb:2a:2a:b3:bb:73:41:ba:72:6b:0a:50:cc:b4: 8b:1d:7b:bd:5f:18:56:00:86:ef:47:d7:c3:d8:3b:c9: da:06:80:5e:67:f7:f8:b7:8c:4a:30:d0:63:20:7b:a4: 11:30:b8:72:93:bf:ad:4a:47:52:0d:8e:73:a6:32:01: 83:70:04:19:93:8c:6c:94:5a:7d:0b:4c:33:be:29:96: ff:66:e9:78:a6:74:b4:46:0a:3a:48:14:d3:ff:1d:d6: aa:f8:03:1a:4e:c2:ae:bc:8b:b8:21:ab:10:91:d1:b5: 33:02:7e:97:d4:90:85:4a:92:4e:96:67:9b:3b:20:35 Fingerprint (SHA-256): 62:25:9B:47:AB:86:90:2D:50:63:03:1A:77:CC:8C:A1:19:69:1F:B2:AB:81:5C:0F:3A:53:58:0E:16:74:09:09 Fingerprint (SHA1): 5E:08:4E:77:10:46:37:4E:CA:DE:0B:84:91:12:29:BC:4F:4E:C2:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Nov 28 10:46:58 2025 Not After : Sat Feb 28 10:46:58 2026 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:9c:4f:65:11:b8:c2:cc:6b:ef:92:85:f3:37:30:db: 46:11:35:b7:49:fb:ce:39:2a:af:b6:6a:30:30:99:d8: 75:86:c9:4b:65:1e:94:67:0e:bd:72:f6:e5:8d:e6:c5: d6:c0:4f:7a:16:35:2e:ef:7c:8d:9a:b3:0e:e6:34:e6: e1:90:06:05:af:03:50:b3:6f:0d:72:79:16:25:f5:a4: 74:c5:86:fe:1b:f4:ba:98:76:26:ae:da:96:62:37:8f: 91:93:01:e8:e2:7c:cb:ba:17:49:d7:ce:93:a6:e3:8d: 28:20:c1:34:3e:6f:43:e4:6c:75:49:f4:cf:e0:c2:78: 65:1b:c2:4d:88:bd:7d:48:85:5b:a5:fb:b2:93:2e:c5: 86:8a:40:6d:01:56:db:0a:c3:15:c5:29:bb:53:18:21: f5:f7:2b:2c:81:62:2b:54:55:b4:f8:36:3b:a8:b8:60: 0a:15:04:3c:d4:64:d5:c0:9e:e1:ce:30:7c:53:d6:56: f0:76:fb:68:48:44:a9:f4:91:c4:f2:e0:15:70:e5:fd: 69:0b:e3:09:4b:74:b2:57:5e:aa:f2:93:00:ed:f8:56: 2c:4c:2a:e5:b4:84:6a:cf:cd:b2:12:91:c5:d3:92:f2: 79:24:0b:5a:fb:af:b6:8c:90:67:07:27:1c:69:4b:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:13:55:89:74:b9:13:8f:eb:02:79:3d:a0:fc:5c:99: 6a:56:52:f2:7f:17:bf:e4:17:bb:0e:52:f3:76:6a:db: 73:e2:81:17:c5:45:5a:e6:ee:6f:ca:42:38:04:7e:71: 14:f5:cd:de:62:1a:c4:ab:3a:51:c3:b9:a4:ce:7e:55: 90:c1:26:00:bd:08:92:90:c1:97:2e:7f:66:42:46:ba: 53:7f:d3:70:1f:4a:c0:7f:60:0c:88:13:89:75:ff:37: 1a:95:b7:f7:9b:c9:5d:29:1d:87:b3:ec:24:65:8d:4a: f7:bd:40:21:c7:bc:f8:19:89:b2:86:64:7b:ed:66:a4: 8e:dd:28:f7:1f:16:a2:8f:61:13:24:52:f8:a8:67:25: f9:bf:77:63:50:2b:b3:d4:a9:a7:e8:98:74:28:6e:be: e2:d1:4f:4f:48:9a:e7:dc:69:60:0f:90:3d:2f:54:40: 73:3f:cb:67:19:68:46:3f:a9:04:a4:d1:51:28:18:47: 81:e4:86:4a:ad:2f:5e:10:bc:72:91:e8:08:a2:3b:84: c7:9c:4d:bd:33:8a:ba:e4:55:54:cd:7d:c8:d3:97:61: f4:c5:73:61:b4:e7:49:4a:fe:0a:97:1b:e8:51:70:ae: 8f:b1:b9:35:e0:55:89:b4:b6:d8:17:f7:f9:3c:e1:9e Fingerprint (SHA-256): 3B:3F:71:1A:DB:86:F5:40:EA:36:D8:C9:DE:B9:DF:71:0D:D5:CD:8F:DA:A4:C3:10:25:2C:B1:05:69:A8:19:8F Fingerprint (SHA1): D7:57:43:C6:F6:30:24:F1:F2:2F:F6:EF:C3:0A:00:F0:09:20:6B:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to sanext.der cert.sh: #346: dump extension 2.5.29.17 to file sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:sanext.der,2.5.29.17:critical:sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:sanext.der,2.5.29.17:critical:sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ab:2d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Nov 28 10:47:01 2025 Not After : Sat Feb 28 10:47:01 2026 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:78:bc:94:3c:32:d3:67:d0:dc:43:3e:1c:bb:5f:fc: 97:43:08:3d:c0:d9:31:7e:bc:82:d4:e7:21:3f:42:7a: 3f:2a:0f:ef:5a:a9:58:22:e5:24:cb:46:64:ec:2f:f1: b3:c2:7b:79:42:d1:27:72:9a:e0:2e:ad:da:4a:84:d5: 19:8e:4d:bb:da:54:d5:f5:f0:b8:1f:9c:8c:f9:06:c9: a0:d1:44:96:ef:42:09:21:b0:4d:91:0a:dc:04:5e:9a: 58:81:62:d5:9e:c3:ae:68:2e:8b:91:43:aa:13:5d:ba: bd:d7:be:5b:ee:0e:09:94:1d:fc:04:8a:8f:56:db:2c: 01:c6:f2:fd:c5:51:15:27:21:46:4d:92:1f:1c:71:25: e0:fa:4b:b8:ec:fb:bd:89:4c:20:b8:92:7d:70:49:ad: 55:48:c7:c2:da:69:50:08:58:df:71:da:9d:87:c4:76: a8:d7:82:31:23:e3:7e:0f:a2:d8:2e:b5:a0:6f:e6:39: 59:5b:68:08:d3:e2:b1:0d:36:4a:ce:e8:f9:77:4e:23: 1a:ea:3d:4e:fb:7a:61:b1:f1:a7:77:f9:35:06:ac:a3: 9e:ef:65:c2:f2:b4:8f:57:33:c3:20:3a:56:c6:03:ea: 91:30:bb:45:40:34:f1:4c:36:ad:b8:4b:5b:e4:18:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:ea:0a:e2:7e:0c:27:cf:9b:26:0b:d0:e2:bf:de:f1: dd:6f:65:93:55:25:d4:6a:0b:7e:c7:81:1f:83:b0:5e: 65:fc:2f:84:13:7e:4d:bc:06:0f:4a:e0:97:4a:cf:bf: 4c:d0:85:1a:8b:0e:d0:89:17:bc:8a:89:60:9e:09:9b: 04:6c:83:b7:83:2b:03:33:f1:8f:4d:65:7f:9d:ca:53: e6:61:d8:7a:47:38:74:56:bb:2e:47:b3:34:62:5b:44: 38:b2:4b:8c:6a:a9:29:0f:a3:fc:bf:38:16:42:74:2d: 5a:36:b0:88:bd:c4:e9:49:01:db:e3:6f:dd:76:33:2e: 44:c7:df:21:a6:4d:81:6d:1f:cf:19:3c:bb:79:b8:fb: cd:5a:f9:3d:ab:df:40:dd:6d:1c:66:aa:89:7d:c0:b3: db:2c:38:ca:d4:66:6b:1b:7d:55:14:86:c9:ab:1b:c7: bb:b8:0b:f4:47:23:e5:f2:da:ad:14:b2:32:93:c7:48: 98:0d:6c:f4:79:ee:be:9a:4d:ba:76:51:af:e1:3e:e9: 23:67:ea:04:c9:9b:10:0c:cf:b2:88:c8:09:c6:65:31: 62:c1:3e:17:ee:2f:2f:f1:36:7a:3b:c6:9b:c0:27:67: 55:7f:30:f8:19:e1:11:f7:dc:60:2f:35:2c:47:32:67 Fingerprint (SHA-256): 81:D6:7D:90:40:E3:72:55:99:E7:03:D5:DC:6C:46:33:07:3A:F3:C9:FF:3C:E1:F4:39:40:06:02:C8:07:5A:DF Fingerprint (SHA1): 45:19:14:B2:AC:EF:1B:4C:AB:1F:BE:F8:E8:7C:C3:DB:82:21:33:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 430e35f623686b95d8c89d48ef74e034e7c0d855 NSS Certificate DB:localhost.localdomain < 1> dsa 27e4dc90b752f7eaf8b4408bb084fe79e1de312c NSS Certificate DB:localhost.localdomain-dsa < 2> dsa f33020dc9b460e9ae0c1c085cf323ce6df07f45f NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 8362a60d8b26504ce6d8087ead2acf300cdec2b8 NSS Certificate DB:localhost.localdomain-ec < 4> ec e20683362ac8d6144c0f3b92e5e83bbe3f5f2f40 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa 0218eaea257ad3daa972ff21f47d54e1678f5d8f NSS Certificate DB:localhost-sni.localdomain < 7> dsa 6ef38d5224e07a5cd959019593d4114f8c9454a8 NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 3de44c6ccc7bf367525835278d6c50cf709052c1 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 48f7d9434b629035fd5f0c1f343e5b9c63b6c7b4 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 27c87d2fc1ec9309d83f6a9b5cfc7e7e9310a606 NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 25e81f1436d4971bc8e1cb9e060184c45cfbf99e (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Nov 28 18:47:59 CST 2025 Running tests for dbtests TIMESTAMP dbtests BEGIN: Fri Nov 28 18:47:59 CST 2025 ./dbtests.sh: line 362: syntax error near unexpected token `(' ./dbtests.sh: line 362: ` dtime=$(time -p (certutil -K -d ${BIG_DIR} -f ${R_PWFILE}) 2>&1 1>/dev/null)' TIMESTAMP dbtests END: Fri Nov 28 18:47:59 CST 2025 Running tests for tools TIMESTAMP tools BEGIN: Fri Nov 28 18:47:59 CST 2025 tools.sh: Tools Tests =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.112/nss/tests/tools/corrupted_cert_bag.p12': No such file or directory tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f1:ca:b5:ff:54:48:2e:9a:c8:58:ef:ef:bd:ca:90:a0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:4f:d5:db:a7:a1:8d:9e:08:55:35:9c:4c:2e:3f: ac:8d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw certutil: could not authenticate to token NSS Certificate DB.: SEC_ERROR_IO: An I/O error occurred during security authorization. pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: bb:60:f5:5d:ee:a5:d3:f8:f1:57:c9:a9:fb:25:a5:25 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:42:fe:99:d3:e4:18:bc:60:a8:50:b6:cd:36:7f: a7:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 10:46:19 2025 Not After : Thu Nov 28 10:46:19 2075 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:f0:a4:d3:d7:46:90:fc:79:b7:6b:dc:c9:d7:03: 3c:18:08:0b:25:62:b0:8d:05:52:b7:4c:cd:89:93:fd: 57:bb:ea:e5:f4:71:3c:9a:73:f0:80:ea:80:3e:23:0b: 36:53:bc:dc:62:be:d6:44:35:e6:4a:0f:ea:3a:f1:f9: 15:5a:91:00:7c:d6:cb:d7:02:ab:70:ab:7d:0f:56:c4: 95:12:81:86:96:7e:24:79:4b:b9:7c:63:e6:df:04:ba: f0:ee:c3:74:c7:22:32:8a:54:06:0e:a3:ba:6a:2b:d5: 6c:3e:d2:21:20:d6:3d:9b:20:eb:69:d6:1d:5f:f2:df: d2:5e:ac:f7:59 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:ad:82:22:af:d0:5a:b8:5a:f6:c6: 19:30:05:e4:5d:ee:17:e2:d6:d6:b7:7b:bc:f6:eb:06: d6:27:09:9d:6d:78:35:df:51:39:59:cc:64:f4:d7:c2: 73:85:8d:a9:d2:63:29:bf:04:5d:b9:ed:e5:84:77:08: 06:a8:f9:04:54:6b:8a:02:42:01:3b:1c:8a:a7:e6:47: 07:41:ac:fd:88:1a:64:b3:71:e1:77:1a:c5:7e:ca:7d: 1c:8d:e6:34:a5:42:8b:e3:99:5b:84:41:50:d0:9b:2e: 62:3a:72:a9:3c:d3:c9:45:d5:5b:19:6b:5f:e4:b4:95: f1:4d:fd:7e:7d:66:ac:63:56:77:28 Fingerprint (SHA-256): 19:04:13:0B:2A:82:51:B1:DB:F6:5E:18:E7:4E:00:56:69:BA:63:97:0B:07:02:D8:EF:08:ED:41:B2:79:17:84 Fingerprint (SHA1): 30:AD:22:16:C9:D3:D8:14:6B:E2:69:60:4F:C3:A0:25:29:C1:43:A9 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:8a:13:3a:5e:b2:0a:4e:9e:64:35:a0:0a:84:0d:0e: 43:3d:ed:f7:be:d2:f5:83:84:6e:77:7d:a9:9f:b5:bb: 53:12:5f:a0:02:21:5d:1c:82:f3:14:03:d2:7d:8f:e8: ce:03:55:38:27:ac:3f:dc:34:bd:ee:fc:aa:e7:29:44: 71:42:d9:c1:44:53:c4:18:ed:08:d8:f1:14:d2:1a:e6: 26:57:56:ca:77:af:b0:b1:20:85:c4:61:4c:eb:26:7e: 10 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:af:9e:74:c2:6e:ac:68:c7:22:b5: a9:5f:21:34:c8:0e:0d:fe:d1:fb:33:c6:3e:15:0e:66: f7:2c:ad:47:c2:f7:5a:48:fa:12:29:f3:bf:bf:02:7b: e7:c4:ab:c1:b8:e6:19:f0:ff:fc:b1:ba:c3:78:48:8c: cd:a2:d9:c3:c9:21:3b:02:42:00:9f:f5:4b:9a:b1:30: 3b:d6:d0:74:a6:be:41:22:6b:dc:5d:70:20:35:9b:d3: 50:ad:e8:00:f1:43:73:db:14:8a:79:d6:1d:10:57:dc: ef:ff:16:ac:36:c4:37:04:58:da:dd:d5:5a:4d:38:aa: eb:ab:b8:e9:48:79:04:fa:0c:91:a4 Fingerprint (SHA-256): 17:84:1C:87:18:34:FD:18:54:E2:66:F3:76:3C:3C:F7:A2:5C:2C:B3:21:1B:74:55:D8:3D:B6:01:DA:91:D3:FA Fingerprint (SHA1): AA:3D:0B:8C:EE:4C:93:E4:67:BF:2B:A6:BA:AA:71:17:F1:20:8B:91 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 60:bc:37:cf:fa:1b:6b:4b:1d:25:c0:f4:e3:34:ab:e7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:d1:22:e5:06:af:1d:aa:fd:b0:02:10:e5:89:d2: 9b:8b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 10:46:19 2025 Not After : Thu Nov 28 10:46:19 2075 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:f0:a4:d3:d7:46:90:fc:79:b7:6b:dc:c9:d7:03: 3c:18:08:0b:25:62:b0:8d:05:52:b7:4c:cd:89:93:fd: 57:bb:ea:e5:f4:71:3c:9a:73:f0:80:ea:80:3e:23:0b: 36:53:bc:dc:62:be:d6:44:35:e6:4a:0f:ea:3a:f1:f9: 15:5a:91:00:7c:d6:cb:d7:02:ab:70:ab:7d:0f:56:c4: 95:12:81:86:96:7e:24:79:4b:b9:7c:63:e6:df:04:ba: f0:ee:c3:74:c7:22:32:8a:54:06:0e:a3:ba:6a:2b:d5: 6c:3e:d2:21:20:d6:3d:9b:20:eb:69:d6:1d:5f:f2:df: d2:5e:ac:f7:59 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:ad:82:22:af:d0:5a:b8:5a:f6:c6: 19:30:05:e4:5d:ee:17:e2:d6:d6:b7:7b:bc:f6:eb:06: d6:27:09:9d:6d:78:35:df:51:39:59:cc:64:f4:d7:c2: 73:85:8d:a9:d2:63:29:bf:04:5d:b9:ed:e5:84:77:08: 06:a8:f9:04:54:6b:8a:02:42:01:3b:1c:8a:a7:e6:47: 07:41:ac:fd:88:1a:64:b3:71:e1:77:1a:c5:7e:ca:7d: 1c:8d:e6:34:a5:42:8b:e3:99:5b:84:41:50:d0:9b:2e: 62:3a:72:a9:3c:d3:c9:45:d5:5b:19:6b:5f:e4:b4:95: f1:4d:fd:7e:7d:66:ac:63:56:77:28 Fingerprint (SHA-256): 19:04:13:0B:2A:82:51:B1:DB:F6:5E:18:E7:4E:00:56:69:BA:63:97:0B:07:02:D8:EF:08:ED:41:B2:79:17:84 Fingerprint (SHA1): 30:AD:22:16:C9:D3:D8:14:6B:E2:69:60:4F:C3:A0:25:29:C1:43:A9 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:8a:13:3a:5e:b2:0a:4e:9e:64:35:a0:0a:84:0d:0e: 43:3d:ed:f7:be:d2:f5:83:84:6e:77:7d:a9:9f:b5:bb: 53:12:5f:a0:02:21:5d:1c:82:f3:14:03:d2:7d:8f:e8: ce:03:55:38:27:ac:3f:dc:34:bd:ee:fc:aa:e7:29:44: 71:42:d9:c1:44:53:c4:18:ed:08:d8:f1:14:d2:1a:e6: 26:57:56:ca:77:af:b0:b1:20:85:c4:61:4c:eb:26:7e: 10 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:af:9e:74:c2:6e:ac:68:c7:22:b5: a9:5f:21:34:c8:0e:0d:fe:d1:fb:33:c6:3e:15:0e:66: f7:2c:ad:47:c2:f7:5a:48:fa:12:29:f3:bf:bf:02:7b: e7:c4:ab:c1:b8:e6:19:f0:ff:fc:b1:ba:c3:78:48:8c: cd:a2:d9:c3:c9:21:3b:02:42:00:9f:f5:4b:9a:b1:30: 3b:d6:d0:74:a6:be:41:22:6b:dc:5d:70:20:35:9b:d3: 50:ad:e8:00:f1:43:73:db:14:8a:79:d6:1d:10:57:dc: ef:ff:16:ac:36:c4:37:04:58:da:dd:d5:5a:4d:38:aa: eb:ab:b8:e9:48:79:04:fa:0c:91:a4 Fingerprint (SHA-256): 17:84:1C:87:18:34:FD:18:54:E2:66:F3:76:3C:3C:F7:A2:5C:2C:B3:21:1B:74:55:D8:3D:B6:01:DA:91:D3:FA Fingerprint (SHA1): AA:3D:0B:8C:EE:4C:93:E4:67:BF:2B:A6:BA:AA:71:17:F1:20:8B:91 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3a:d4:6b:8a:b3:e7:c6:50:b1:53:91:1c:5c:b2:c6:8c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ef:f4:72:71:d1:0a:7c:be:02:2c:d1:fc:42:93:12:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9c:c8:0f:b3:14:3b:e3:65:7f:3c:af:bb:e5:91:7b:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 25:d6:5b:4a:3d:74:24:c3:ec:a9:74:e5:a9:9d:24:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ae:fa:35:26:db:c2:56:62:2f:24:53:5f:ad:0c:7c:35 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:fa:26:1c:bf:e0:61:49:53:74:cf:70:26:ff:39: 90:55 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1f:b0:a9:81:1c:51:53:94:58:f2:44:1b:51:68:be:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 02:12:b1:ab:3b:0e:d5:11:1a:6a:f1:2e:92:c6:49:95 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:07:cc:65:4d:07:09:2f:5f:f3:37:11:1e:69:c7: d2:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 7f:11:30:79:3a:20:fe:81:a9:f7:fe:c8:f5:a0:c9:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 63:8f:5d:41:c9:03:aa:82:38:6c:45:74:78:ec:89:68 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d7:5c:7a:55:89:33:b9:ac:a2:bf:29:1b:0b:ca:56:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a8:d0:eb:15:2e:39:43:58:b9:5f:cc:0c:66:31:1f:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: bf:9b:44:02:9e:53:ee:b9:e7:59:1b:85:ca:5a:41:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:0a:75:8b:50:0a:1b:12:44:59:e2:d5:46:0b:d7:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 50:c7:5f:84:5d:cc:a1:a4:0d:1f:d5:56:90:ad:54:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 6c:eb:d1:0d:5f:b8:73:87:6f:dc:96:97:8c:3f:6d:c8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:95:45:89:b2:d7:28:c3:0e:c5:a0:ed:f6:b9:65: 05:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b8:fa:40:f2:60:cd:43:41:81:c4:47:25:02:b0:03:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 5a:82:08:83:82:4c:d2:f4:bb:85:f6:9f:47:82:f4:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ba:12:9c:86:f5:39:b3:f5:39:a2:ad:c0:08:91: 38:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 89:33:80:bd:c7:c7:2f:64:cb:14:fd:83:c9:8b:69:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5e:24:f0:58:ff:14:1c:5b:db:cd:88:11:1f:0d:6a:90 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 19:4c:f4:42:e1:0b:33:38:db:6b:1b:74:6b:fa:0b:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 17:ba:74:e2:bc:a8:94:10:55:e9:86:53:ba:d7:e4:4a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 03:6f:3e:5d:c2:c9:11:5a:6c:b9:8a:e5:c1:eb:c0:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b8:23:43:9f:65:3f:6a:f4:dd:57:58:73:25:45:ab:a6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7b:ab:24:92:81:c4:4e:d5:63:af:6d:83:7e:28: 21:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8f:2e:d1:b0:4d:dd:eb:a1:ed:03:07:02:fc:ab:df:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c4:ce:5b:8f:50:be:e8:e2:25:fd:93:ef:36:bc:fd:97 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:19:93:d5:ca:67:13:a8:23:d7:f6:69:75:69:b4: dc:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8f:22:02:78:92:ff:5b:01:41:34:b9:db:75:59:eb:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 60:fc:25:76:77:be:e1:96:1e:80:f2:fb:ae:ee:6d:8c Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:e6:0b:b1:b6:34:b6:85:c1:0a:d9:24:a1:a8:0e:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f1:b1:42:2a:ba:19:d9:e1:f0:6f:ac:6b:a6:c5:13:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: be:ed:36:64:43:7c:d8:42:af:0e:ff:1b:20:64:03:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:c0:95:ee:37:9a:6d:bd:ab:de:1a:95:7f:2b:d7:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: fd:10:e4:2d:e5:9c:7b:28:20:a1:80:fb:b9:64:ee:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 0a:84:33:9d:55:7c:24:2c:6f:23:29:67:0b:bf:57:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c1:97:55:f8:96:d0:a0:d1:1d:2b:9c:12:35:63: 1c:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 6b:c8:fb:63:ef:4d:ff:cb:24:30:54:81:ce:d0:9d:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 87:e0:79:79:12:ae:ae:58:7c:4b:2c:48:37:3f:90:6d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:13:e6:ba:c8:54:f6:33:be:fd:95:25:7f:f1:45: 3a:7f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: f1:7e:4a:16:b1:2b:61:ca:05:68:87:9a:12:1c:f5:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 5d:1e:8d:2e:18:7b:7d:35:b8:a4:72:c4:76:8e:c8:88 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e7:e5:0a:7d:4a:ed:07:d2:a3:39:7a:08:45:d4:9b:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 69:50:43:67:06:5d:eb:96:c3:dc:8e:61:dc:29:73:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 21:48:f9:49:b6:40:cb:2a:35:39:b5:6a:55:28:32:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c6:5c:63:7c:19:fa:45:2c:1c:09:63:68:66:fd:56:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 6e:ab:24:d7:31:d1:1a:92:a7:c4:1c:66:8a:f0:b9:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: be:49:b6:34:56:e3:ce:2d:17:33:99:e2:b9:fc:4f:83 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:db:76:b2:34:04:15:c8:3a:3c:58:cb:fe:dd:e6: d0:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 83:1f:57:da:13:62:41:ec:27:5b:bc:83:b2:43:1d:98 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ac:43:4b:fc:99:e5:08:97:43:9d:99:0c:88:eb:03:a1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:76:db:de:7b:5c:8d:ef:eb:e3:45:79:ff:7d:c2: 1f:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 37:e4:d6:7d:d9:ab:bb:04:53:02:4f:da:01:d3:49:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 3d:9e:dd:85:c2:a7:2a:79:08:48:60:83:aa:8f:e5:06 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 7d:01:19:25:4c:d1:bd:33:f6:84:a1:2e:66:55:38:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 62:fe:46:ff:da:55:34:92:7a:e7:25:51:95:23:c3:53 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 88:8e:0e:29:34:d9:ac:c4:ae:b8:25:6b:07:c5:69:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 45:a1:b1:9b:bb:f9:f1:23:a9:d1:9d:3e:e8:39:35:18 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3d:8a:70:cc:ad:38:8f:4b:54:b6:c5:e5:95:73: 09:21 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:bb:db:6d:f9:e7:4d:19:ac:d2:b3:4f:5c:49:be:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 58:7b:65:0c:6b:66:57:21:34:6b:5d:b4:7f:f3:35:d5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ca:79:41:46:b0:42:17:a5:36:a1:94:a4:82:bd: e9:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0b:a8:60:ac:fe:f7:4a:8d:91:60:8d:f8:71:6f:b7:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ec:48:9b:17:0e:f0:56:31:88:1d:3e:46:a6:b7:2e:aa Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fc:a5:e4:4a:f9:6a:30:26:b5:78:5c:27:80:8d:2f:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 98:f7:92:c9:36:bb:d7:bf:55:6f:f8:7c:b2:28:10:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 28:3f:4b:ae:8c:14:f0:50:86:0c:83:a6:d9:95:3e:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:29:46:b5:e1:a3:30:a4:a6:85:b1:13:e0:a8:b6:77 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e0:a6:ed:0c:94:e1:70:3c:0c:0b:6d:92:e2:d1:41:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 37:78:a5:d5:95:a1:f0:6c:86:9a:a0:bf:6d:d0:7c:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d5:a4:56:5a:a7:12:d9:4f:6a:9f:53:61:ae:f3: 14:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 88:5c:b4:c4:62:da:45:d0:4b:43:9c:c5:4b:33:52:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 32:a3:cb:71:de:45:14:c0:c6:26:f5:23:1a:35:09:76 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e3:94:cf:46:eb:0d:f4:3c:96:a0:ea:f1:96:8a: 4a:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7b:b9:28:12:3f:46:4e:a8:e3:42:f0:84:0b:61:bc:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bc:8c:65:5b:d2:63:e6:5b:c7:8a:a8:96:83:2c:d3:0e Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 43:05:87:1a:5a:cd:b5:39:bd:d9:fd:2a:45:ae:3f:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fa:47:61:76:06:42:60:de:a1:b7:20:d1:5d:f8:a1:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c7:7c:24:59:5e:10:1d:c9:27:c0:b0:01:a0:0c:77:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:30:87:3e:fe:f3:56:cb:35:79:e2:39:f1:28:4d:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 59:09:01:d6:8c:34:e9:38:40:82:96:2e:99:59:7a:94 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 17:7e:52:0e:73:4d:0a:f0:b4:75:37:9f:2b:b9:6e:f9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2c:9e:48:a2:35:ab:ed:d9:88:7c:86:9b:25:39: 33:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 77:93:12:1a:a7:dc:92:67:08:3c:48:4d:b9:50:05:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 13:52:da:aa:92:aa:c0:10:a9:2c:5f:5d:64:bb:4d:76 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7d:43:ac:03:62:b0:88:dc:55:c0:a1:ef:b0:71: fe:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8f:9f:10:6b:9c:75:ff:67:b1:3b:d8:be:e1:d7:de:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 4b:3e:44:26:10:3b:07:50:a2:d3:88:4c:af:44:c3:f9 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: cd:93:2f:aa:8a:eb:6e:fd:ff:3f:f4:c4:c0:a3:23:f7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:a5:f2:2a:7c:ba:d8:4e:6c:2f:eb:20:35:fb:c5:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 66:34:5e:0e:3c:68:d6:cd:49:87:cb:84:11:93:b3:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:06:57:cd:97:65:c4:56:0f:31:17:45:4d:97:75:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 80:db:87:d4:81:d0:8e:8b:c9:1f:80:f9:3e:a7:25:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a4:10:eb:42:b8:e5:c2:44:b4:50:c5:fb:ea:e1:22:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ad:c6:ef:f6:3d:2a:95:9e:36:44:ce:69:69:c2: 33:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9c:66:4a:81:f2:83:30:6d:59:b0:33:67:be:a4:98:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b3:53:c1:85:99:8a:22:45:ec:2a:ea:ee:91:2a:30:f2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:62:41:6a:aa:52:2b:6f:5e:ce:6d:fd:72:33:7b: 8e:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 60:20:1d:0d:b2:37:e7:95:21:a3:53:31:85:5e:53:05 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: eb:09:98:43:90:09:53:b0:f4:73:2c:20:20:93:eb:94 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 67:fa:ba:b5:0f:db:19:45:b8:ab:78:3b:90:35:9d:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7a:a2:9e:d6:30:93:f4:6d:01:f6:81:7c:91:4b:63:f0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b3:8c:38:f5:2f:03:ba:f5:30:96:75:00:7a:67:94:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0f:1e:40:b0:c1:ca:4b:ee:7d:c4:bd:5f:f8:e4:2b:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e3:8e:e4:70:5a:bf:4f:38:8e:98:c0:5a:c3:6a:0c:7b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: bc:a1:dc:38:39:89:d5:8c:30:85:ce:72:45:5b:f8:6e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e1:fc:d3:ae:f3:74:f0:07:8d:e5:f3:07:f7:a2: aa:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:9c:e0:06:e1:21:c8:55:57:c1:a5:2f:ef:3b:6c:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: fd:2f:76:38:b5:63:77:24:22:0e:4e:46:fb:eb:d3:87 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ea:5a:c8:5a:92:78:16:b2:6f:c0:3c:9c:6d:87: 93:1e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:b7:e9:b4:d8:d5:b4:9a:a2:6b:8f:17:79:99:a1:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:d9:49:18:92:08:9f:5c:23:7f:bf:36:80:ce:a4:3c Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:19:ac:19:df:2d:ca:81:b7:40:03:9a:b9:cc:c9:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e0:d3:1d:ac:9a:b0:26:89:71:09:d3:ce:23:0a:64:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 85:22:ab:e5:04:be:8c:06:04:2b:23:8e:d4:7c:08:f4 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:b4:9c:4d:f4:44:b8:03:cb:18:b0:83:34:12:a8: f0:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:9c:31:5f:d3:c3:e7:fa:45:49:94:0a:09:b7:28:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 2b:42:43:be:f1:1d:82:25:99:14:78:36:f3:d7:0a:33 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:91:ff:b6:93:9b:52:45:1c:40:29:c6:8f:52:81: 97:15 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: dc:7e:04:0e:60:52:5e:92:59:30:35:82:01:8c:da:7b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b0:19:02:e5:e6:8f:8b:e6:19:07:1c:a6:d5:4a: 98:79 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ec:01:cb:c4:d4:a5:1a:ab:66:b4:5a:e8:4e:b0:99:b1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:42:11:3d:96:43:d0:91:46:ca:68:58:56:6f:a6: f1:bc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: fd:68:74:65:c5:27:2b:12:d3:0f:c5:1c:c2:85:f1:c2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f9:56:8d:7a:43:e3:59:31:6d:d8:51:23:22:96: 17:66 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 9b:a8:d0:8b:a9:f8:78:12:e9:58:7d:51:97:6c:be:b1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:4d:f7:1d:ac:19:62:82:87:bc:00:c8:37:28:5d: ed:4f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 86:25:91:c9:78:1f:7b:0c:eb:93:64:a1:5f:90:df:5f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:83:39:48:df:2d:6b:c0:4e:9c:8c:dd:38:f9:5e: 16:b9 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f9:09:1a:94:49:8c:94:d3:c7:3f:38:f4:e9:c0:f9:d0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-512 Cipher: AES-128-CBC Args: 04:10:fb:aa:d9:14:8f:e7:75:e9:8d:bb:b4:dc:97:96: ed:0b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bc:67:03:ad:6f:a7:f2:80:6e:51:b7:06:fe:dd:6f:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b4:f7:e1:8c:1a:d1:6d:a5:d2:3c:1c:7a:c8:88:d3:6f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:d5:7f:05:15:30:8f:17:e0:3c:86:4d:aa:e5:4d: cf:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:20:54:8b:4c:c2:7b:35:db:e8:65:18:b8:a0:7d:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b6:48:62:4f:ae:7e:65:93:8f:bd:52:f6:cc:4f:1e:76 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:2d:2d:bd:33:8c:a4:bd:97:8e:4b:fa:85:61:8c: c3:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 8f:8b:02:2d:3c:71:64:13:f4:90:45:ff:36:6d:b0:3f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d9:64:3b:4a:2e:ee:e1:bc:a7:d7:73:25:e7:e9: ea:eb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: de:3f:73:41:19:81:3b:7f:98:e7:48:4b:07:a1:18:b7 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:54:37:74:f5:db:9a:34:2d:d9:a0:88:72:e7:31: 82:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b4:8a:46:a8:37:8a:1d:e6:d8:d4:8d:99:f5:1d:c6:a2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1f:57:29:98:56:18:6d:50:de:14:9d:93:fa:af: 99:fd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c3:61:93:5f:96:54:f5:73:71:db:15:cc:bf:b0:b0:69 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:1f:08:dd:32:ba:2d:cd:1d:e7:48:86:84:37:d2: 5a:2b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 7d:22:65:80:8d:07:35:b2:0f:54:22:81:7b:37:ab:20 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:aa:1e:d7:2d:75:2e:7d:6f:41:23:ab:85:19:3d: 17:83 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 60:1c:fd:de:fd:20:43:b8:71:2d:b8:ca:83:b8:20:31 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-512 Cipher: AES-192-CBC Args: 04:10:f3:8a:9a:5b:51:d9:ad:02:da:cc:70:7d:8f:93: 90:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 46:c4:f8:3f:73:f3:69:d0:21:5b:1d:41:1e:b1:4b:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 38:58:11:2b:64:05:13:53:83:80:a2:3b:e5:72:7d:57 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:35:9e:4d:74:bb:11:8f:49:ed:9a:a3:e6:66:e8: d6:13 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:f3:79:68:0f:6c:64:a4:8f:7b:01:0f:5c:00:40:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 7b:81:ae:2b:ef:29:13:77:43:66:dc:41:4d:26:35:a3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:50:76:df:b7:62:5a:42:f1:73:53:8b:74:0d:d7: ec:2e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: bf:56:45:ab:ed:f2:cb:ab:20:d8:f8:8d:7b:03:32:ed Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3d:36:1e:c1:36:8c:2c:aa:d6:7f:33:50:90:e7: 46:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d5:00:d4:53:8f:2a:4c:c9:24:61:e4:6c:c5:ae:43:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:b1:6f:e0:a2:ad:20:8a:3e:32:3f:40:c6:eb:c6: 7b:18 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 1c:3f:ee:3c:06:c6:71:80:4d:68:46:89:67:25:a3:c0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:79:bb:e5:62:72:bb:c6:ff:f1:bc:1c:56:b6:51: 17:af tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a5:6c:95:f8:56:1d:29:df:f4:6f:73:6d:66:20:ac:cc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:23:9d:27:da:9c:38:48:92:36:a4:4e:48:d1:e2: ae:4f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9f:37:b6:7d:a8:87:d3:4a:ab:bf:39:ee:86:c6:d5:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a7:36:32:7b:09:9b:0d:45:90:fc:e1:db:68:97:b4:28 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:f7:29:67:2d:51:07:b0:ee:06:c0:cb:88:26:ce: c0:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:f0:45:bb:da:9a:e2:90:1f:8f:7d:ab:60:21:1d:74 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 8d:6f:b3:74:1c:04:42:4e:b8:e8:6d:65:1b:38:9f:57 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:a6:39:5b:e4:db:79:0f:85:ec:28:53:3a:40:f1: e6:79 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 77:7a:26:f4:a1:44:9d:08:ab:37:b9:61:c9:5f:9b:81 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e2:80:7a:4c:d5:c5:3e:af:9c:81:00:d9:17:87: 45:ef Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b5:56:c7:96:ec:2a:10:66:72:89:ae:f2:f9:42:b4:b9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:7f:3e:a3:03:41:e0:57:19:62:49:cb:55:76:5c: c9:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 67:0c:1c:87:99:51:30:1c:4c:b0:50:6e:d9:74:b1:48 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6d:84:f6:8e:dd:ee:1b:7b:82:a2:90:d1:de:d4: 2b:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 92:96:5d:9d:55:30:25:8c:90:60:23:b4:d6:f2:bb:68 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:48:7d:bd:e2:ec:6d:6c:df:26:59:91:0b:0c:99: 16:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 8f:3e:97:e9:55:18:4e:bb:00:74:2f:72:9d:3d:c1:fe Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:83:84:68:ea:a0:ce:54:a8:d7:26:6e:49:ca:7c: d5:37 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 5f:62:68:e0:e6:64:4b:fe:e3:e3:67:b1:a2:f0:bd:17 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-128-CBC Args: 04:10:47:e7:23:be:53:04:37:3b:1f:11:9a:8d:ec:2e: 92:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f0:c1:69:39:fd:92:d0:3f:23:70:73:3c:04:74:22:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b9:b9:30:47:e5:d1:8f:4d:9d:46:e9:a4:a9:42:bd:af Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:5d:d0:07:69:7a:5c:d1:72:b0:14:0a:42:74:e0: a2:5c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 71:8a:2f:a2:c7:95:9b:5a:80:30:08:34:0a:fd:5c:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 6b:e2:12:dc:40:a7:8a:47:89:c7:f8:ff:f9:63:d8:71 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:77:34:10:9b:39:4c:5f:df:c8:ce:43:34:6c:c1: 91:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 1b:53:ed:79:14:8d:5a:c3:59:b7:4f:ea:0f:06:d9:6a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c4:8a:3d:f9:4b:14:39:c9:ad:cd:a1:71:39:4e: 9b:fd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c1:56:f0:a1:77:c0:66:49:f0:1e:b5:4c:2d:dc:b3:35 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:de:d5:63:2a:24:95:37:c1:d6:3e:db:d6:f2:37: 81:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 8d:e4:6c:c6:30:5d:4b:be:74:33:60:29:52:38:e9:05 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:72:3a:1e:8c:5a:97:5c:85:1d:d9:b4:58:04:11: 4f:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a6:1b:8c:1e:7a:26:f0:ff:cc:42:2a:04:f7:78:91:89 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:d0:c6:a4:93:3c:6d:79:82:e2:6f:88:21:ab:fa: b4:55 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b7:77:7f:c5:e6:df:84:89:ab:c5:8e:6e:d2:2b:58:b8 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:ee:dc:42:31:89:ef:81:45:3e:4f:b8:ba:99:ea: 2e:d2 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 3b:09:3a:27:7a:8d:56:78:01:fd:da:47:5f:0d:e7:1d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-192-CBC Args: 04:10:1e:0d:49:0f:37:37:88:2b:37:ee:95:82:c1:5d: 03:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f1:d8:14:d0:ad:71:d9:ac:d6:9d:09:1c:bf:e4:db:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e6:9e:b0:c6:61:29:48:67:06:7e:f9:43:28:32:d1:e0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:6a:b0:58:7a:62:96:82:1c:6e:ed:3c:62:7e:e5: 1b:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:94:8c:fb:14:f2:7d:c2:c2:70:03:15:96:50:74:6f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 9c:a1:e3:8e:52:41:9b:f4:49:3b:cf:b1:86:0d:cc:c6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:33:e5:64:2c:98:e1:5a:f3:c3:0e:e0:83:de:0c: b6:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 0f:89:0d:13:13:84:7c:43:f4:76:ac:fb:2a:f5:8b:10 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:23:c1:43:a6:63:35:66:59:81:dc:f9:36:4c:e7: 49:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ab:21:89:04:86:93:31:e7:05:51:72:a5:b4:17:1a:7a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:18:62:28:2d:17:1c:5d:b4:5a:07:59:35:c3:e3: 45:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 96:ea:df:43:b2:77:1e:09:d8:0e:d4:88:61:a8:e2:fa Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8f:9a:36:62:eb:ed:5a:c3:bb:a3:8a:6d:57:b4: b0:7c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: df:03:bb:ca:c8:cb:c2:79:ab:20:7d:d9:3e:21:22:3b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:b1:7f:6f:90:3f:39:60:1a:49:6e:da:2c:f9:76: 05:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 67:51:a2:0f:0f:56:a7:13:8a:7d:7f:9f:52:e5:5f:b2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:3d:7b:3c:58:fb:0e:15:38:c7:80:90:84:c0:12: d4:f4 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 98:e5:5c:03:c9:0d:ed:cf:cf:45:d0:f3:ec:36:7b:29 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-256-CBC Args: 04:10:2b:83:f7:35:81:07:f7:7b:78:1f:e0:86:6b:63: df:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d1:7b:5c:45:7c:0a:e4:53:af:a7:46:29:f9:d5:d7:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 88:6a:9c:0d:21:c3:e3:76:a2:6c:17:f0:36:27:eb:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e3:fd:68:d2:60:0d:02:97:2d:3c:3d:0a:26:31:85:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 65:4d:76:ed:49:f6:98:37:d7:b8:d1:51:56:32:9c:5f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 07:68:6b:80:98:55:d3:4c:f3:bb:55:89:60:bd:41:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #649: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:ae:ef:12:a0:3d:34:c3:b2:98:b0:93:d3:ef:40:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:2c:85:fd:73:86:24:39:c3:47:dc:84:51:81:f3:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:f5:14:63:1c:76:39:62:f5:89:0f:8e:98:04:c1:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:8c:e1:57:7c:2b:4b:3d:ee:39:8f:f1:9c:71:d9:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:88:a8:bc:09:fa:86:ed:15:40:2a:61:80:6d:a0:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #669: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 63:f2:57:95:f9:33:b1:37:02:67:c6:68:60:bb:3b:fb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:be:6d:36:c3:a7:38:77:d0:9d:99:a7:69:97:2d: 47:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #673: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 76:49:c4:84:13:a0:3f:dc:44:14:c8:8b:e5:e3:0a:c1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:46:2b:38:23:30:a5:41:d5:53:a0:09:ef:93:83: 5a:53 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: fd:53:ac:17:96:6c:a7:79:2e:c1:61:fa:b1:bd:eb:66 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:89:83:18:3f:b3:0b:0d:50:fc:62:b0:f9:ea:cb: e9:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 85:c5:0a:1b:3f:c5:4c:98:ab:43:1d:cd:ee:aa:3a:76 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:2d:15:a3:b4:30:2d:9f:f6:6f:9e:30:29:00:07: 84:e2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ea:f7:dd:cb:23:00:92:c2:ee:96:b9:3f:d0:f7:01:a5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:33:43:91:ec:2a:8b:ad:fc:ff:96:25:25:86:2e: 26:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #689: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 0c:3e:26:26:19:96:f6:82:c0:c8:2e:75:83:4d:30:cf Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2d:c6:2b:0f:29:82:29:80:08:14:3e:ee:f4:86: ec:ff Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #693: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c7:f9:4c:3e:75:39:44:94:82:f0:47:eb:30:0c:5f:e9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:a7:4b:22:e8:e6:72:ed:d3:30:4e:27:dd:c5:84: c9:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #697: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a5:19:5e:46:10:9a:23:ae:8e:9d:84:99:4d:1a:74:01 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:6e:83:46:92:03:23:e2:23:81:23:bc:3f:3c:48: 2b:a3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #701: Exporting with [default:default:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e1:ba:7b:b8:bc:09:53:8b:fe:f9:fe:d5:4c:75:b1:fc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:c3:02:4e:18:b8:5a:ab:42:ec:ae:39:14:bc:84: 61:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #705: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a7:52:dc:38:55:22:5b:77:7a:4d:78:56:ec:c9:35:8c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:f5:c5:43:5d:28:ed:18:58:18:a9:82:f1:21:7a: c8:24 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:12 2025 Not After : Thu Nov 28 10:46:12 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:06:14:a3:52:bc:56:6c:96:22:8c:70:de:ba:1a:b9: 0f:48:09:a0:45:87:7f:0b:11:b0:cf:57:2d:ef:dd:58: 25:f6:e9:19:46:8b:98:9f:43:88:b7:51:09:d9:30:a5: 6b:a3:53:27:27:c2:ef:34:9e:41:1c:5b:b9:e5:64:3d: 66:47:23:eb:42:0f:1e:71:a6:30:95:95:cb:9e:9c:ae: 6a:12:6d:91:18:88:59:de:4b:b3:1a:ff:4b:87:a5:00: ea:55:3a:0b:10:a2:f2:bd:df:59:46:39:1a:60:61:ef: 8b:49:b6:1a:3f:df:c3:95:3c:c2:5a:65:5b:a5:05:3e: 77:ce:3f:14:77:98:de:92:54:56:8f:67:76:ea:d7:85: 3c:af:4a:64:58:00:6b:90:c9:78:80:ac:de:23:01:84: 59:7c:6b:26:3a:e1:a9:62:b4:ee:05:7b:15:8b:23:12: b0:34:a7:5f:44:df:be:84:0f:1e:ee:c0:b5:53:b2:dd: 5c:46:ff:3b:fd:ee:4c:6e:59:f1:9f:3b:03:44:a4:e8: 9b:d7:3d:c7:cf:4c:2a:14:13:0f:76:fa:83:19:ed:e1: 8e:d9:a0:f9:db:75:1e:9c:7f:31:7d:37:a8:08:c2:bc: 9a:64:89:6c:14:e2:ed:f1:b9:8c:04:ce:50:cb:9e:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:2a:2d:b0:a6:75:8f:66:01:1f:dd:ce:ff:f8:20:5b: 11:6c:7e:c1:a9:9f:df:0e:f1:6a:cf:54:b8:b8:78:a1: 1a:5c:af:e4:57:cf:89:70:9b:fc:8d:f7:a0:a3:e2:7a: b7:16:f8:e4:59:ac:f5:68:66:9f:55:fe:c7:fe:ec:72: 48:b5:99:6e:22:c6:64:2b:c3:c7:01:af:b5:c1:fe:6b: 6f:92:79:dc:f2:a6:06:a4:ff:6e:3c:c3:d3:bf:77:89: 33:34:89:87:01:63:33:9b:d8:74:ac:6d:58:e7:7e:8d: f9:78:01:00:6b:1e:cc:11:f6:9f:68:7f:ec:d7:5a:d3: 3a:93:7e:74:a6:2f:0d:2a:56:22:bc:99:75:ad:96:50: d4:11:e2:d0:98:98:e0:86:85:6d:d6:a2:c9:42:be:75: 51:79:69:8d:be:78:d8:6b:03:e5:6d:00:a4:8c:91:65: 7b:c3:18:48:98:24:e2:9d:37:81:23:b4:8f:5b:da:59: 83:3a:02:3e:24:f4:fd:0e:d9:47:b5:68:99:81:d6:c0: 4d:f1:b8:44:9c:cf:de:0f:28:88:5f:f4:d0:45:95:89: b8:a3:74:28:be:81:51:c1:00:43:54:f8:11:81:41:57: df:d7:84:38:e6:db:de:03:85:ed:b3:15:56:6d:ec:02 Fingerprint (SHA-256): A2:0B:03:F2:D3:02:DE:81:6A:70:C9:5D:AE:F7:D9:84:7E:64:46:FC:09:02:37:99:3A:DD:7B:5A:82:AB:DE:3E Fingerprint (SHA1): DB:13:5C:7E:C3:16:DB:EF:EA:11:53:2D:5A:D3:E6:D3:59:46:23:EE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 10:46:38 2025 Not After : Thu Nov 28 10:46:38 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:64:42:d7:04:33:30:65:ea:45:58:99:aa:d3:a0:9b: c0:10:47:64:48:32:bb:f0:72:05:5d:b3:5e:da:44:38: 13:2c:fd:6d:a3:f9:2c:8d:4e:19:46:88:13:db:42:49: ba:8e:a9:c7:68:e2:83:04:98:20:3f:bc:1f:55:b2:cc: 90:53:be:a5:63:56:1c:87:86:75:b1:21:b4:53:83:d8: 0d:70:ac:f7:2d:06:5d:7e:89:d3:5c:fa:77:19:43:58: a9:db:42:b5:4e:b7:e3:4f:1e:c5:d4:12:26:7f:07:0f: cb:78:83:2c:5c:ac:60:db:8b:0e:f1:d0:d5:fe:d5:7e: 10:ac:7f:01:99:8c:31:4c:de:88:6c:99:bf:83:38:bc: 9e:25:02:b9:f7:0e:5f:9a:8c:fa:a4:50:d7:c8:f3:6f: e1:f6:a1:06:fb:bb:1d:65:34:d5:ad:53:1f:76:15:20: a9:e6:f5:91:de:9a:a5:5a:17:29:6b:ac:74:8e:fc:0b: fa:bf:b5:4c:8d:c2:cb:9d:a4:7f:73:0a:67:ca:d0:77: 22:c9:48:18:ba:90:dc:98:84:d8:d0:cd:0f:8b:a8:89: 17:44:56:4f:1a:cd:28:46:50:3d:7f:21:89:e4:bf:aa: 05:6b:18:16:96:92:81:11:3c:bf:d0:0b:26:ae:25:1f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:4f:c2:a6:d7:ba:45:16:d3:69:b1:41:a7:aa:f5:da: c4:11:9a:1f:c5:c6:12:2d:65:67:2e:8d:36:5a:68:62: ef:b6:f0:50:8a:c0:08:bf:1d:c8:26:ea:a6:9e:ca:c2: bf:0e:82:95:01:82:02:b5:99:1b:c1:c2:ac:e1:0b:e4: bc:c7:36:0d:a5:d0:8c:3f:aa:d8:3e:b6:59:8d:f5:60: 29:8b:7e:45:7c:a1:45:71:77:e4:38:92:8d:cf:4b:2b: ae:42:72:a7:2e:dd:ea:80:0e:91:5b:9b:f9:73:6c:35: 98:9f:83:8f:f6:46:18:7f:9d:39:91:4b:56:35:e4:a5: 38:f1:ba:4f:50:c5:01:41:15:f6:c5:43:a6:81:27:82: d9:92:0c:f7:f8:47:0a:4c:c3:bd:14:07:41:e8:0a:80: bb:9e:23:fb:18:e4:3e:d5:e7:8f:63:2b:00:ce:d6:b8: cf:b4:78:fe:0e:da:3d:97:ef:73:70:72:cc:68:4d:85: 22:82:72:be:fd:ff:1f:ed:89:d5:f5:c1:a2:73:fc:b0: b6:bb:04:bb:e1:7f:10:92:6d:89:e8:31:24:6b:52:27: 1a:7d:e5:cc:6f:74:da:8a:ed:86:93:40:6e:7e:ff:e7: 04:65:fb:70:02:6b:95:b4:74:bf:a1:74:33:d4:2a:13 Fingerprint (SHA-256): 17:E3:E3:03:03:DE:43:F6:3B:C4:4A:8E:54:73:B3:9C:FF:6E:D7:9A:50:20:33:02:A3:BC:2E:75:B6:E2:EC:12 Fingerprint (SHA1): 40:3C:0F:0D:67:1D:5F:D7:6A:5E:42:65:90:54:EF:D7:E3:18:81:6C Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #709: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #710: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #711: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #712: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #713: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #715: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED pk12util -i PKCS5WithImplicitKDF.p12 -d ../tools/copydir -k ../tests.pw -W pasword pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing PKCS#12 file with and implicit KDF value - PASSED pk12util -I -l corrupted_cert_bag.p12 -W start pk12util: File Open failed: /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/corrupted_cert_bag.p12: PR_FILE_NOT_FOUND_ERROR: File not found pk12util: PKCS12 decode not verified: PR_FILE_NOT_FOUND_ERROR: File not found tools.sh: #717: Listing a PKCS#12 file with corrupted certificate bag - PASSED tools.sh: Importing private key pbmac1 PKCS#12 file -------------- /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/pbmac1-valid-sha256.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: no nickname for cert in PKCS12 file. pk12util: using nickname: tt - ee pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #718: Importing private key pbmac1 hmac-sha-256 from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/pbmac1-valid-sha256-sha512.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #719: Importing private key pbmac1 hmac-sha-256 and hmac-sha-512 prf from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/pbmac1-valid-sha512.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing private key pbmac1 hmac-sha-512 from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/pbmac1-invalid-bad-iter.p12 -d ../tools/copydir -k ../tests.pw -W '1234' -I pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. tools.sh: #721: Fail to list private key with bad iterator - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/pbmac1-invalid-bad-salt.p12 -d ../tools/copydir -k ../tests.pw -W '1234' -I pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. Fail to list private key with bad salt val=19 tools.sh: #722: Fail to import private key with bad salt - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tools/data/pbmac1-invalid-no-length.p12 -d ../tools/copydir -k ../tests.pw -W '1234' -I pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. Fail to import private key with no length val=19 tools.sh: #723: Fail to import private key with no length - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing RSA-PSS private key from PKCS#12 file - PASSED < 6> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #725: Listing RSA-PSS private key imported from PKCS#12 file - PASSED egrep: warning: egrep is obsolescent; using grep -E tools.sh: PKCS12 Policy Test {Use default policy and enable} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #726: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #728: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {allow all} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #729: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #730: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #731: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Only allow legacy read (write)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #732: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Only allow legacy read (read)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #733: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #734: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, key_encrypt=AES-128-CBC (write)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: add cert and key failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=28 expect=28 tools.sh: #736: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, key_decrypt=AES-128-CBC (read)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #737: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #738: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode import bags failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=19 expect=19 tools.sh: #739: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, cert_encrypt=AES-128-CBC (write cert)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #740: Exporting with [AES-256-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, cert_decrypt=AES-128-CBC (read cert)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #741: Exporting with [AES-256-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #742: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_DECRYPTION_DISALLOWED: Cannot decrypt: encrypted using a disallowed algorithm or key size. return=17 expect=17 tools.sh: #743: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {allow all, RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #744: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #745: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #746: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {disallow rc4 (write), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc4 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: add cert and key failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=28 expect=28 tools.sh: #747: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {disallow rc2 (write), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #748: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {disallow rc4 (read), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc4 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #749: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #750: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode import bags failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=19 expect=19 tools.sh: #751: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {disallow rc2 (read), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #752: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #753: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_DECRYPTION_DISALLOWED: Cannot decrypt: encrypted using a disallowed algorithm or key size. return=17 expect=17 tools.sh: #754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Use default policy with multiple hashes} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #755: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Allow all encrypt, use default decrypt with multiple hashes} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #756: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #757: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #758: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Allow all with multiple hashes} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #759: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #760: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #761: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha1 on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 allow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: add cert and key failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=28 expect=28 tools.sh: #762: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow md2 on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #763: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha256 on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 allow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 encode failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=29 expect=29 tools.sh: #764: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha1 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #765: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #766: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode import bags failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=19 expect=19 tools.sh: #767: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow md2 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #768: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #769: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_DECRYPTION_DISALLOWED: Cannot decrypt: encrypted using a disallowed algorithm or key size. return=17 expect=17 tools.sh: #770: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha256 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #771: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #772: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=17 expect=17 tools.sh: #773: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow md2 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=md2/pkcs12-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #774: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #775: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #776: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha1 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1/pkcs12-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #777: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #778: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #779: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha256 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/pkcs12-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #780: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #781: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #782: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Allow all with hmac} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #783: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #784: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #785: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow hmac on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 encode failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=29 expect=29 tools.sh: #786: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow hmac on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #787: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #788: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. return=17 expect=17 tools.sh: #789: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #726: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #727: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #728: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #729: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #730: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #731: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #732: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #733: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Fri Nov 28 18:55:28 CST 2025 Running tests for fips TIMESTAMP fips BEGIN: Fri Nov 28 18:55:28 CST 2025 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.112 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.76 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 06d75dd1a9919b72b7f4594539713906cfb7d03a NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 06d75dd1a9919b72b7f4594539713906cfb7d03a FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 06d75dd1a9919b72b7f4594539713906cfb7d03a FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.chk /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs11testmodule.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x001ace80 (1756800): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED Copying CAVS vectors Copying CAVS scripts cd /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/cavs/scripts Running CAVS tests in /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/cavs/tests ********************Running aesgcm tests gcmDecrypt128.req gcmDecrypt128.rsp gcmDecrypt192.req gcmDecrypt192.rsp gcmDecrypt256.req gcmDecrypt256.rsp gcmEncryptExtIV128.req gcmEncryptExtIV128.rsp gcmEncryptExtIV192.req gcmEncryptExtIV192.rsp gcmEncryptExtIV256.req gcmEncryptExtIV256.rsp ********************Running ecdsa tests KeyPair.req KeyPair.rsp PKV.req PKV.rsp SigGen.req SigGen.rsp SigVer.req SigVer.rsp ********************Running hmac tests HMAC.req HMAC.rsp ********************Running kas tests KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init.req KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init.rsp KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.req KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.rsp KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init.req KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init.rsp KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.req KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.rsp KASFunctionTest_FFCEphem_NOKC_ZZOnly_init.req KASFunctionTest_FFCEphem_NOKC_ZZOnly_init.rsp KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp.req KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp.rsp KASValidityTest_FFCEphem_NOKC_ZZOnly_init.req KASValidityTest_FFCEphem_NOKC_ZZOnly_init.rsp KASValidityTest_FFCEphem_NOKC_ZZOnly_resp.req KASValidityTest_FFCEphem_NOKC_ZZOnly_resp.rsp ********************Running tls tests tls.req tls.rsp ********************Running ike tests ikev1_dsa.req ikev1_dsa.rsp ikev1_psk.req ikev1_psk.rsp ikev2.req ikev2.rsp ********************Running rng tests Hash_DRBG.req Hash_DRBG.rsp ********************Running sha tests SHA1ShortMsg.req SHA1ShortMsg.rsp SHA224ShortMsg.req SHA224ShortMsg.rsp SHA256ShortMsg.req SHA256ShortMsg.rsp SHA384ShortMsg.req SHA384ShortMsg.rsp SHA512ShortMsg.req SHA512ShortMsg.rsp SHA1LongMsg.req SHA1LongMsg.rsp SHA224LongMsg.req SHA224LongMsg.rsp SHA256LongMsg.req SHA256LongMsg.rsp SHA384LongMsg.req SHA384LongMsg.rsp SHA512LongMsg.req SHA512LongMsg.rsp SHA1Monte.req SHA1Monte.rsp SHA224Monte.req SHA224Monte.rsp SHA256Monte.req SHA256Monte.rsp SHA384Monte.req SHA384Monte.rsp SHA512Monte.req SHA512Monte.rsp Verifying CAVS results in /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/cavs/tests ********************Running aesgcm tests >>>>> gcmDecrypt128 >>>>> gcmDecrypt192 >>>>> gcmDecrypt256 >>>>> gcmEncryptExtIV128 >>>>> gcmEncryptExtIV192 >>>>> gcmEncryptExtIV256 ********************Running ecdsa tests >>>>> KeyPair >>>>> PKV >>>>> SigGen >>>>> SigVer ********************Running hmac tests >>>>> HMAC ********************Running kas tests >>>>> KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init >>>>> KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp >>>>> KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init >>>>> KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp >>>>> KASFunctionTest_FFCEphem_NOKC_ZZOnly_init >>>>> KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp >>>>> KASValidityTest_FFCEphem_NOKC_ZZOnly_init >>>>> KASValidityTest_FFCEphem_NOKC_ZZOnly_resp ********************Running tls tests >>>>> tls ********************Running ike tests >>>>> ikev1_dsa >>>>> ikev1_psk >>>>> ikev2 ********************Running rng tests >>>>> Hash_DRBG ********************Running sha tests >>>>> SHA1ShortMsg >>>>> SHA224ShortMsg >>>>> SHA256ShortMsg >>>>> SHA384ShortMsg >>>>> SHA512ShortMsg >>>>> SHA1LongMsg >>>>> SHA224LongMsg >>>>> SHA256LongMsg >>>>> SHA384LongMsg >>>>> SHA512LongMsg >>>>> SHA1Monte >>>>> SHA224Monte >>>>> SHA256Monte >>>>> SHA384Monte >>>>> SHA512Monte fips.sh: #23: NIST CAVS test /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/fips/cavs/tests - PASSED fips.sh done TIMESTAMP fips END: Fri Nov 28 18:55:53 CST 2025 Running tests for sdr TIMESTAMP sdr BEGIN: Fri Nov 28 18:55:53 CST 2025 ./sdr.sh: line 127: syntax error near unexpected token `(' ./sdr.sh: line 127: ` dtime=$(time -p (pwdecrypt -i ${COMBINED_300} -o ${DECODED} -l ${LOG} -d ${PROFILE} -f ${R_PWFILE}) 2>&1 1>/dev/null)' TIMESTAMP sdr END: Fri Nov 28 18:55:53 CST 2025 Running tests for crmf TIMESTAMP crmf BEGIN: Fri Nov 28 18:55:53 CST 2025 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Fri Nov 28 18:55:54 CST 2025 Running tests for smime TIMESTAMP smime BEGIN: Fri Nov 28 18:55:54 CST 2025 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -G -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -G -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -G -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -G -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -G -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -G -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -G -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -G -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -G -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -G -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -G -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -G -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Enveloped Data Tests (ECDH) ------------------------------ cmsutil -E -r bob-ec@example.com -i alice.txt -d ../alicedir -p nss \ -o alice-ec.env smime.sh: #44: Create Enveloped Data with Alice (ECDH) . - PASSED cmsutil -D -i alice-ec.env -d ../bobdir -p nss -o alice.data1 smime.sh: #45: Decode Enveloped Data Alice (ECDH) . - PASSED diff alice.txt alice-ec.data1 smime.sh: #46: Compare Decoded Enveloped Data and Original (ECDH) . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #47: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #48: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #49: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #50: Decode Multiple Recipients Enveloped Data Alice by Dave (ECDH) . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #51: Decrypt with a Multiple Email cert . - PASSED smime.sh: #52: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #53: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #54: Compare Decoded with Multiple Email cert . - PASSED smime.sh: OpenSSL interoperability -------------------------------- pk12util: PKCS12 IMPORT SUCCESSFUL pk12util: PKCS12 IMPORT SUCCESSFUL cmsutil -D -i fran-oaep_ossl.env -d ../alicedir -p nss -o fran-oaep.data1 smime.sh: #55: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #56: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256hash_ossl.env -d ../alicedir -p nss -o fran-oaep.data2 smime.sh: #57: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #58: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha384hash_ossl.env -d ../alicedir -p nss -o fran-oaep.data3 smime.sh: #59: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #60: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha512hash_ossl.env -d ../alicedir -p nss -o fran-oaep.data4 smime.sh: #61: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #62: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data5 smime.sh: #63: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #64: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha384mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data6 smime.sh: #65: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #66: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha512mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data7 smime.sh: #67: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #68: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-label_ossl.env -d ../alicedir -p nss -o fran-oaep.data8 smime.sh: #69: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #70: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256hash-sha256mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data9 smime.sh: #71: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #72: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256hash-label_ossl.env -d ../alicedir -p nss -o fran-oaep.data10 smime.sh: #73: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #74: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256mgf-label_ossl.env -d ../alicedir -p nss -o fran-oaep.data11 smime.sh: #75: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #76: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep_ossl-sha256hash-sha256mgf-label.env -d ../alicedir -p nss -o fran-oaep.data12 smime.sh: #77: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #78: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes128-sha1.env -d ../alicedir -p nss -o fran.data1 smime.sh: #79: Decode OpenSSL Enveloped Data Fran (ECDH, AES128 key wrap, SHA-1 KDF) . - PASSED smime.sh: #80: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes128-sha224.env -d ../alicedir -p nss -o fran.data2 smime.sh: #81: Decode OpenSSL Enveloped Data Fran (ECDH, AES128 key wrap, SHA-224 KDF) . - PASSED smime.sh: #82: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes128-sha256.env -d ../alicedir -p nss -o fran.data3 smime.sh: #83: Decode OpenSSL Enveloped Data Fran (ECDH, AES128 key wrap, SHA-256 KDF) . - PASSED smime.sh: #84: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes192-sha384.env -d ../alicedir -p nss -o fran.data4 smime.sh: #85: Decode OpenSSL Enveloped Data Fran (ECDH, AES192 key wrap, SHA-384 KDF) . - PASSED smime.sh: #86: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes256-sha512.env -d ../alicedir -p nss -o fran.data5 smime.sh: #87: Decode OpenSSL Enveloped Data Fran (ECDH, AES256 key wrap, SHA-512 KDF) . - PASSED smime.sh: #88: Compare Decoded with OpenSSL enveloped . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #89: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #90: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #91: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #92: Decode Encrypted-Data . - PASSED smime.sh: #93: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #94: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #95: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #96: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #97: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #98: Verifying file delivered to user Alice . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 0 smime.sh: #99: Signing file for user Alice -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #100: Verifying file delivered to user Alice -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 1 smime.sh: #101: Signing file for user Alice -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #102: Verifying file delivered to user Alice -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #103: Signing file for user Alice -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #104: Signing file for user Alice -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 4 smime.sh: #105: Signing file for user Alice -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #106: Verifying file delivered to user Alice -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 5 smime.sh: #107: Signing file for user Alice -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #108: Verifying file delivered to user Alice -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #109: Signing file for user Alice -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 8 smime.sh: #110: Signing file for user Alice -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #111: Verifying file delivered to user Alice -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #112: Signing file for user Alice -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 11 smime.sh: #113: Signing file for user Alice -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #114: Verifying file delivered to user Alice -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 12 smime.sh: #115: Signing file for user Alice -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #116: Verifying file delivered to user Alice -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 smime.sh: #117: Signing file for user Alice -a sha-1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #118: Verifying file delivered to user Alice -a sha-1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 0 smime.sh: #119: Signing file for user Alice -a sha-1 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #120: Verifying file delivered to user Alice -a sha-1 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 1 smime.sh: #121: Signing file for user Alice -a sha-1 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #122: Verifying file delivered to user Alice -a sha-1 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #123: Signing file for user Alice -a sha-1 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #124: Signing file for user Alice -a sha-1 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 4 smime.sh: #125: Signing file for user Alice -a sha-1 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #126: Verifying file delivered to user Alice -a sha-1 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 5 smime.sh: #127: Signing file for user Alice -a sha-1 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #128: Verifying file delivered to user Alice -a sha-1 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #129: Signing file for user Alice -a sha-1 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 8 smime.sh: #130: Signing file for user Alice -a sha-1 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #131: Verifying file delivered to user Alice -a sha-1 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #132: Signing file for user Alice -a sha-1 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 11 smime.sh: #133: Signing file for user Alice -a sha-1 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #134: Verifying file delivered to user Alice -a sha-1 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 12 smime.sh: #135: Signing file for user Alice -a sha-1 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #136: Verifying file delivered to user Alice -a sha-1 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 smime.sh: #137: Signing file for user Alice -a sha-256 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #138: Verifying file delivered to user Alice -a sha-256 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 0 smime.sh: #139: Signing file for user Alice -a sha-256 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #140: Verifying file delivered to user Alice -a sha-256 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 1 smime.sh: #141: Signing file for user Alice -a sha-256 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #142: Verifying file delivered to user Alice -a sha-256 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #143: Signing file for user Alice -a sha-256 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #144: Signing file for user Alice -a sha-256 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 4 smime.sh: #145: Signing file for user Alice -a sha-256 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #146: Verifying file delivered to user Alice -a sha-256 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 5 smime.sh: #147: Signing file for user Alice -a sha-256 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #148: Verifying file delivered to user Alice -a sha-256 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #149: Signing file for user Alice -a sha-256 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 8 smime.sh: #150: Signing file for user Alice -a sha-256 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #151: Verifying file delivered to user Alice -a sha-256 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #152: Signing file for user Alice -a sha-256 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 11 smime.sh: #153: Signing file for user Alice -a sha-256 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #154: Verifying file delivered to user Alice -a sha-256 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 12 smime.sh: #155: Signing file for user Alice -a sha-256 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #156: Verifying file delivered to user Alice -a sha-256 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 smime.sh: #157: Signing file for user Alice -a sha-384 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #158: Verifying file delivered to user Alice -a sha-384 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 0 smime.sh: #159: Signing file for user Alice -a sha-384 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #160: Verifying file delivered to user Alice -a sha-384 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 1 smime.sh: #161: Signing file for user Alice -a sha-384 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #162: Verifying file delivered to user Alice -a sha-384 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #163: Signing file for user Alice -a sha-384 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #164: Signing file for user Alice -a sha-384 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 4 smime.sh: #165: Signing file for user Alice -a sha-384 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #166: Verifying file delivered to user Alice -a sha-384 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 5 smime.sh: #167: Signing file for user Alice -a sha-384 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #168: Verifying file delivered to user Alice -a sha-384 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #169: Signing file for user Alice -a sha-384 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 8 smime.sh: #170: Signing file for user Alice -a sha-384 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #171: Verifying file delivered to user Alice -a sha-384 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #172: Signing file for user Alice -a sha-384 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 11 smime.sh: #173: Signing file for user Alice -a sha-384 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #174: Verifying file delivered to user Alice -a sha-384 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 12 smime.sh: #175: Signing file for user Alice -a sha-384 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #176: Verifying file delivered to user Alice -a sha-384 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 smime.sh: #177: Signing file for user Alice -a SHA-512 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #178: Verifying file delivered to user Alice -a SHA-512 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 0 smime.sh: #179: Signing file for user Alice -a SHA-512 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #180: Verifying file delivered to user Alice -a SHA-512 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 1 smime.sh: #181: Signing file for user Alice -a SHA-512 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #182: Verifying file delivered to user Alice -a SHA-512 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #183: Signing file for user Alice -a SHA-512 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #184: Signing file for user Alice -a SHA-512 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 4 smime.sh: #185: Signing file for user Alice -a SHA-512 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #186: Verifying file delivered to user Alice -a SHA-512 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 5 smime.sh: #187: Signing file for user Alice -a SHA-512 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #188: Verifying file delivered to user Alice -a SHA-512 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #189: Signing file for user Alice -a SHA-512 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 8 smime.sh: #190: Signing file for user Alice -a SHA-512 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #191: Verifying file delivered to user Alice -a SHA-512 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #192: Signing file for user Alice -a SHA-512 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 11 smime.sh: #193: Signing file for user Alice -a SHA-512 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #194: Verifying file delivered to user Alice -a SHA-512 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 12 smime.sh: #195: Signing file for user Alice -a SHA-512 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #196: Verifying file delivered to user Alice -a SHA-512 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 smime.sh: #197: Signing file for user Alice -a SHA-224 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #198: Verifying file delivered to user Alice -a SHA-224 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 0 smime.sh: #199: Signing file for user Alice -a SHA-224 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #200: Verifying file delivered to user Alice -a SHA-224 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 1 smime.sh: #201: Signing file for user Alice -a SHA-224 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #202: Verifying file delivered to user Alice -a SHA-224 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #203: Signing file for user Alice -a SHA-224 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #204: Signing file for user Alice -a SHA-224 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 4 smime.sh: #205: Signing file for user Alice -a SHA-224 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #206: Verifying file delivered to user Alice -a SHA-224 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 5 smime.sh: #207: Signing file for user Alice -a SHA-224 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #208: Verifying file delivered to user Alice -a SHA-224 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #209: Signing file for user Alice -a SHA-224 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 8 smime.sh: #210: Signing file for user Alice -a SHA-224 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #211: Verifying file delivered to user Alice -a SHA-224 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #212: Signing file for user Alice -a SHA-224 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 11 smime.sh: #213: Signing file for user Alice -a SHA-224 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #214: Verifying file delivered to user Alice -a SHA-224 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 12 smime.sh: #215: Signing file for user Alice -a SHA-224 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #216: Verifying file delivered to user Alice -a SHA-224 -u 12 . - PASSED egrep: warning: egrep is obsolescent; using grep -E smime.sh: S/MIME Policy Test {Use default policy and enable} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Use default policy and enable} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #217: Signing policy message (Use default policy and enable) . - PASSED smime.sh: Verify policy message {Use default policy and enable} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #218: Verify policy message (Use default policy and enable) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #219: Compare policy signed data (Use default policy and enable) . - PASSED smime.sh: Encrypt policy message (Use default policy and enable) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc smime.sh: #220: Encrypted policy message (Use default policy and enable) . - PASSED smime.sh: Decrypt policy message (Use default policy and enable) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec smime.sh: #221: Decrypted policy message (Use default policy and enable) . - PASSED diff alice.txt tb/recipient/message.dec smime.sh: #222: Compare policy encrypted data (Use default policy and enable) . - PASSED smime.sh: S/MIME Policy Test {Only enable aes-256} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=aes256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=aes256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Only enable aes-256} --------------- cmsutil -S -G -P -N Bob -H SHA512 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #223: Signing policy message (Only enable aes-256) . - PASSED smime.sh: Verify policy message {Only enable aes-256} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #224: Verify policy message (Only enable aes-256) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #225: Compare policy signed data (Only enable aes-256) . - PASSED smime.sh: Encrypt policy message (Only enable aes-256) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc smime.sh: #226: Encrypted policy message (Only enable aes-256) . - PASSED smime.sh: Decrypt policy message (Only enable aes-256) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec smime.sh: #227: Decrypted policy message (Only enable aes-256) . - PASSED diff alice.txt tb/recipient/message.dec smime.sh: #228: Compare policy encrypted data (Only enable aes-256) . - PASSED smime.sh: S/MIME Policy Test {Only enable camellia} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Only enable camellia} --------------- cmsutil -S -G -P -N Bob -H SHA512 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #229: Signing policy message (Only enable camellia) . - PASSED smime.sh: Verify policy message {Only enable camellia} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #230: Verify policy message (Only enable camellia) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #231: Compare policy signed data (Only enable camellia) . - PASSED smime.sh: Encrypt policy message (Only enable camellia) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc smime.sh: #232: Encrypted policy message (Only enable camellia) . - PASSED smime.sh: Decrypt policy message (Only enable camellia) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec smime.sh: #233: Decrypted policy message (Only enable camellia) . - PASSED diff alice.txt tb/recipient/message.dec smime.sh: #234: Compare policy encrypted data (Only enable camellia) . - PASSED smime.sh: S/MIME Policy Test {Bob allows all: enables default, alice allows and enables camellia} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=aes128-cbc:aes192-cbc:aes256-cbc:camellia128-cbc:camellia192-cbc:camellia256-cbc:des-ede3-cbc:rc2-40-cbc:rc2-64-cbc:rc2-128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Bob allows all: enables default, alice allows and enables camellia} --------------- cmsutil -S -G -P -N Bob -H SHA1 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #235: Signing policy message (Bob allows all: enables default, alice allows and enables camellia) . - PASSED smime.sh: Verify policy message {Bob allows all: enables default, alice allows and enables camellia} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #236: Verify policy message (Bob allows all: enables default, alice allows and enables camellia) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #237: Compare policy signed data (Bob allows all: enables default, alice allows and enables camellia) . - PASSED smime.sh: Encrypt policy message (Bob allows all: enables default, alice allows and enables camellia) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc ERROR: cannot find common bulk algorithm. cmsutil: could not retrieve enveloped data.cmsutil: cannot create encoder context. cmsutil: problem encrypting: SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. smime.sh: #238: Encrypted policy message (Bob allows all: enables default, alice allows and enables camellia) . - PASSED smime.sh: S/MIME Policy Test {Alice allows all: enables default, bob allows and enables camellia} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=aes128-cbc:aes192-cbc:aes256-cbc:camellia128-cbc:camellia192-cbc:camellia256-cbc:des-ede3-cbc:rc2-40-cbc:rc2-64-cbc:rc2-128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Alice allows all: enables default, bob allows and enables camellia} --------------- cmsutil -S -G -P -N Bob -H SHA384 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #239: Signing policy message (Alice allows all: enables default, bob allows and enables camellia) . - PASSED smime.sh: Verify policy message {Alice allows all: enables default, bob allows and enables camellia} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #240: Verify policy message (Alice allows all: enables default, bob allows and enables camellia) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #241: Compare policy signed data (Alice allows all: enables default, bob allows and enables camellia) . - PASSED smime.sh: Encrypt policy message (Alice allows all: enables default, bob allows and enables camellia) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc smime.sh: #242: Encrypted policy message (Alice allows all: enables default, bob allows and enables camellia) . - PASSED smime.sh: Decrypt policy message (Alice allows all: enables default, bob allows and enables camellia) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec cmsutil: failed to decode message. cmsutil: problem decoding: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. smime.sh: #243: Decrypted policy message (Alice allows all: enables default, bob allows and enables camellia) . - PASSED smime.sh: S/MIME Policy Test {Bob Only enables aes Alice Only enables camellia} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=aes256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Bob Only enables aes Alice Only enables camellia} --------------- cmsutil -S -G -P -N Bob -H SHA384 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #244: Signing policy message (Bob Only enables aes Alice Only enables camellia) . - PASSED smime.sh: Verify policy message {Bob Only enables aes Alice Only enables camellia} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #245: Verify policy message (Bob Only enables aes Alice Only enables camellia) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #246: Compare policy signed data (Bob Only enables aes Alice Only enables camellia) . - PASSED smime.sh: Encrypt policy message (Bob Only enables aes Alice Only enables camellia) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc ERROR: cannot find common bulk algorithm. cmsutil: could not retrieve enveloped data.cmsutil: cannot create encoder context. cmsutil: problem encrypting: SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. smime.sh: #247: Encrypted policy message (Bob Only enables aes Alice Only enables camellia) . - PASSED smime.sh: S/MIME Policy Test {Alice enable all explicit, bob allows and enables camellia} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=aes128-cbc:aes192-cbc:aes256-cbc:camellia128-cbc:camellia192-cbc:camellia256-cbc:des-ede3-cbc:rc2-40-cbc:rc2-64-cbc:rc2-128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Alice enable all explicit, bob allows and enables camellia} --------------- cmsutil -S -G -P -N Bob -H SHA384 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #248: Signing policy message (Alice enable all explicit, bob allows and enables camellia) . - PASSED smime.sh: Verify policy message {Alice enable all explicit, bob allows and enables camellia} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #249: Verify policy message (Alice enable all explicit, bob allows and enables camellia) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #250: Compare policy signed data (Alice enable all explicit, bob allows and enables camellia) . - PASSED smime.sh: Encrypt policy message (Alice enable all explicit, bob allows and enables camellia) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc smime.sh: #251: Encrypted policy message (Alice enable all explicit, bob allows and enables camellia) . - PASSED smime.sh: Decrypt policy message (Alice enable all explicit, bob allows and enables camellia) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec smime.sh: #252: Decrypted policy message (Alice enable all explicit, bob allows and enables camellia) . - PASSED diff alice.txt tb/recipient/message.dec smime.sh: #253: Compare policy encrypted data (Alice enable all explicit, bob allows and enables camellia) . - PASSED smime.sh: S/MIME Policy Test {Bob enables all explicit, alice allows and enables camellia} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=aes128-cbc:aes192-cbc:aes256-cbc:camellia128-cbc:camellia192-cbc:camellia256-cbc:des-ede3-cbc:rc2-40-cbc:rc2-64-cbc:rc2-128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=camellia256-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Bob enables all explicit, alice allows and enables camellia} --------------- cmsutil -S -G -P -N Bob -H SHA1 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #254: Signing policy message (Bob enables all explicit, alice allows and enables camellia) . - PASSED smime.sh: Verify policy message {Bob enables all explicit, alice allows and enables camellia} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #255: Verify policy message (Bob enables all explicit, alice allows and enables camellia) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #256: Compare policy signed data (Bob enables all explicit, alice allows and enables camellia) . - PASSED smime.sh: Encrypt policy message (Bob enables all explicit, alice allows and enables camellia) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "bob@example.com" -o tb/sender/message.enc smime.sh: #257: Encrypted policy message (Bob enables all explicit, alice allows and enables camellia) . - PASSED smime.sh: Decrypt policy message (Bob enables all explicit, alice allows and enables camellia) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec smime.sh: #258: Decrypted policy message (Bob enables all explicit, alice allows and enables camellia) . - PASSED diff alice.txt tb/recipient/message.dec smime.sh: #259: Compare policy encrypted data (Bob enables all explicit, alice allows and enables camellia) . - PASSED smime.sh: S/MIME Policy Test {turn off RSA key exchange (decrypt)} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs/smime-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {turn off RSA key exchange (decrypt)} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #260: Signing policy message (turn off RSA key exchange (decrypt)) . - PASSED smime.sh: Verify policy message {turn off RSA key exchange (decrypt)} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #261: Verify policy message (turn off RSA key exchange (decrypt)) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #262: Compare policy signed data (turn off RSA key exchange (decrypt)) . - PASSED smime.sh: Encrypt policy message (turn off RSA key exchange (decrypt)) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc smime.sh: #263: Encrypted policy message (turn off RSA key exchange (decrypt)) . - PASSED smime.sh: Decrypt policy message (turn off RSA key exchange (decrypt)) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec cmsutil: failed to decode message. cmsutil: problem decoding env msg: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. smime.sh: #264: Decrypted policy message (turn off RSA key exchange (decrypt)) . - PASSED smime.sh: S/MIME Policy Test {turn off sha-1 for S/MIME (generate sig)} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1/smime-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {turn off sha-1 for S/MIME (generate sig)} --------------- cmsutil -S -G -P -N Dave -H SHA-1 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig cmsutil: failed to add data to encoder. smime.sh: #265: Signing policy message (turn off sha-1 for S/MIME (generate sig)) . - PASSED smime.sh: S/MIME Policy Test {turn off sha-1 for S/MIME (verify sig)} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1/smime-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {turn off sha-1 for S/MIME (verify sig)} --------------- cmsutil -S -G -P -N Dave -H SHA-1 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #266: Signing policy message (turn off sha-1 for S/MIME (verify sig)) . - PASSED smime.sh: Verify policy message {turn off sha-1 for S/MIME (verify sig)} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy cmsutil: failed to decode message. cmsutil: problem decoding: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. smime.sh: #267: Verify policy message (turn off sha-1 for S/MIME (verify sig)) . - PASSED smime.sh: S/MIME Policy Test {turn off RSA key exchange (encrypt)} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable-hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs/smime-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {turn off RSA key exchange (encrypt)} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #268: Signing policy message (turn off RSA key exchange (encrypt)) . - PASSED smime.sh: Verify policy message {turn off RSA key exchange (encrypt)} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #269: Verify policy message (turn off RSA key exchange (encrypt)) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #270: Compare policy signed data (turn off RSA key exchange (encrypt)) . - PASSED smime.sh: Encrypt policy message (turn off RSA key exchange (encrypt)) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc cmsutil: cannot create encoder context. cmsutil: problem encrypting: SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. smime.sh: #271: Encrypted policy message (turn off RSA key exchange (encrypt)) . - PASSED smime.sh: S/MIME Policy Test {turn off RSA key exchange for encrypt only (try to encrypt)} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable-hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs/smime-key-exchange allow=rsa-pkcs/smime-key-echange legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {turn off RSA key exchange for encrypt only (try to encrypt)} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #272: Signing policy message (turn off RSA key exchange for encrypt only (try to encrypt)) . - PASSED smime.sh: Verify policy message {turn off RSA key exchange for encrypt only (try to encrypt)} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #273: Verify policy message (turn off RSA key exchange for encrypt only (try to encrypt)) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #274: Compare policy signed data (turn off RSA key exchange for encrypt only (try to encrypt)) . - PASSED smime.sh: Encrypt policy message (turn off RSA key exchange for encrypt only (try to encrypt)) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc cmsutil: cannot create encoder context. cmsutil: problem encrypting: SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. smime.sh: #275: Encrypted policy message (turn off RSA key exchange for encrypt only (try to encrypt)) . - PASSED smime.sh: S/MIME Policy Test {turn off RSA key exchange for encrypt only (try to decrypt)} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs/smime-key-exchange-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=enable=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {turn off RSA key exchange for encrypt only (try to decrypt)} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #276: Signing policy message (turn off RSA key exchange for encrypt only (try to decrypt)) . - PASSED smime.sh: Verify policy message {turn off RSA key exchange for encrypt only (try to decrypt)} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #277: Verify policy message (turn off RSA key exchange for encrypt only (try to decrypt)) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #278: Compare policy signed data (turn off RSA key exchange for encrypt only (try to decrypt)) . - PASSED smime.sh: Encrypt policy message (turn off RSA key exchange for encrypt only (try to decrypt)) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc smime.sh: #279: Encrypted policy message (turn off RSA key exchange for encrypt only (try to decrypt)) . - PASSED smime.sh: Decrypt policy message (turn off RSA key exchange for encrypt only (try to decrypt)) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec smime.sh: #280: Decrypted policy message (turn off RSA key exchange for encrypt only (try to decrypt)) . - PASSED diff alice.txt tb/recipient/message.dec smime.sh: #281: Compare policy encrypted data (turn off RSA key exchange for encrypt only (try to decrypt)) . - PASSED smime.sh: S/MIME Policy Test {Enforce all key size policy on Sender} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=3000 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Enforce all key size policy on Sender} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig ERROR: cannot add default SMIMEEncKeyPrefs attribute. cmsutil: problem signing: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. smime.sh: #282: Signing policy message (Enforce all key size policy on Sender) . - PASSED smime.sh: S/MIME Policy Test {Enforce all key size policy on Recipient} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=3000 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Enforce all key size policy on Recipient} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #283: Signing policy message (Enforce all key size policy on Recipient) . - PASSED smime.sh: Verify policy message {Enforce all key size policy on Recipient} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy signer 0 status = SigningCertNotTrusted cmsutil: problem decoding: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. smime.sh: #284: Verify policy message (Enforce all key size policy on Recipient) . - PASSED smime.sh: S/MIME Policy Test {Enforce KEA key size policy on Recipient} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=key-size-flags=key-size-smime:rsa-min=3000 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Enforce KEA key size policy on Recipient} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #285: Signing policy message (Enforce KEA key size policy on Recipient) . - PASSED smime.sh: Verify policy message {Enforce KEA key size policy on Recipient} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #286: Verify policy message (Enforce KEA key size policy on Recipient) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #287: Compare policy signed data (Enforce KEA key size policy on Recipient) . - PASSED smime.sh: Encrypt policy message (Enforce KEA key size policy on Recipient) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc cmsutil: cannot create encoder context. cmsutil: problem encrypting: SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. smime.sh: #288: Encrypted policy message (Enforce KEA key size policy on Recipient) . - PASSED smime.sh: S/MIME Policy Test {Enforce KEA key size policy on Sender} --------------- ******************************Testing tb/recipient with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=key-size-flags=key-size-smime:rsa-min=3000 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing tb/sender with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** smime.sh: Signing policy message {Enforce KEA key size policy on Sender} --------------- cmsutil -S -G -P -N Dave -H SHA256 -i alice.txt -d tb/recipient -p nss -o tb/recipient/message.sig smime.sh: #289: Signing policy message (Enforce KEA key size policy on Sender) . - PASSED smime.sh: Verify policy message {Enforce KEA key size policy on Sender} --------------- cmsutil -D -k -i tb/recipient/message.sig -d tb/sender -o tb/sender/message.vfy smime.sh: #290: Verify policy message (Enforce KEA key size policy on Sender) . - PASSED diff alice.txt tb/sender/message.vfy smime.sh: #291: Compare policy signed data (Enforce KEA key size policy on Sender) . - PASSED smime.sh: Encrypt policy message (Enforce KEA key size policy on Sender) -------- cmsutil -C -i alice.txt -d tb/sender -e tb/sender/message.env \ -r "dave@example.com" -o tb/sender/message.enc smime.sh: #292: Encrypted policy message (Enforce KEA key size policy on Sender) . - PASSED smime.sh: Decrypt policy message (Enforce KEA key size policy on Sender) -------- cmsutil -D -i tb/sender/message.enc -d tb/recipient -e tb/sender/message.env -p nss \ -o tb/recipient/message.dec cmsutil: failed to decode message. cmsutil: problem decoding env msg: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. smime.sh: #293: Decrypted policy message (Enforce KEA key size policy on Sender) . - PASSED TIMESTAMP smime END: Fri Nov 28 18:56:46 CST 2025 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Nov 28 18:56:46 CST 2025 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136368 >/dev/null 2>/dev/null selfserv_9351 with PID 2136368 found at Fri Nov 28 18:56:46 CST 2025 selfserv_9351 with PID 2136368 started at Fri Nov 28 18:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136368 at Fri Nov 28 18:56:47 CST 2025 kill -USR1 2136368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136368 killed at Fri Nov 28 18:56:47 CST 2025 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136407 >/dev/null 2>/dev/null selfserv_9351 with PID 2136407 found at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 with PID 2136407 started at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136407 at Fri Nov 28 18:56:47 CST 2025 kill -USR1 2136407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136407 killed at Fri Nov 28 18:56:47 CST 2025 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136446 >/dev/null 2>/dev/null selfserv_9351 with PID 2136446 found at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 with PID 2136446 started at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136446 at Fri Nov 28 18:56:47 CST 2025 kill -USR1 2136446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136446 killed at Fri Nov 28 18:56:47 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136499 >/dev/null 2>/dev/null selfserv_9351 with PID 2136499 found at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 with PID 2136499 started at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136499 at Fri Nov 28 18:56:47 CST 2025 kill -USR1 2136499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136499 killed at Fri Nov 28 18:56:47 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136538 >/dev/null 2>/dev/null selfserv_9351 with PID 2136538 found at Fri Nov 28 18:56:47 CST 2025 selfserv_9351 with PID 2136538 started at Fri Nov 28 18:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136538 at Fri Nov 28 18:56:48 CST 2025 kill -USR1 2136538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136538 killed at Fri Nov 28 18:56:48 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136577 >/dev/null 2>/dev/null selfserv_9351 with PID 2136577 found at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 with PID 2136577 started at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136577 at Fri Nov 28 18:56:48 CST 2025 kill -USR1 2136577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136577 killed at Fri Nov 28 18:56:48 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136630 >/dev/null 2>/dev/null selfserv_9351 with PID 2136630 found at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 with PID 2136630 started at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136630 at Fri Nov 28 18:56:48 CST 2025 kill -USR1 2136630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136630 killed at Fri Nov 28 18:56:48 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136669 >/dev/null 2>/dev/null selfserv_9351 with PID 2136669 found at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 with PID 2136669 started at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2136669 at Fri Nov 28 18:56:48 CST 2025 kill -USR1 2136669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136669 killed at Fri Nov 28 18:56:48 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136712 >/dev/null 2>/dev/null selfserv_9351 with PID 2136712 found at Fri Nov 28 18:56:48 CST 2025 selfserv_9351 with PID 2136712 started at Fri Nov 28 18:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136712 at Fri Nov 28 18:56:49 CST 2025 kill -USR1 2136712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136712 killed at Fri Nov 28 18:56:49 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136765 >/dev/null 2>/dev/null selfserv_9351 with PID 2136765 found at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 with PID 2136765 started at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136765 at Fri Nov 28 18:56:49 CST 2025 kill -USR1 2136765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136765 killed at Fri Nov 28 18:56:49 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136804 >/dev/null 2>/dev/null selfserv_9351 with PID 2136804 found at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 with PID 2136804 started at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136804 at Fri Nov 28 18:56:49 CST 2025 kill -USR1 2136804 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136804 killed at Fri Nov 28 18:56:49 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136843 >/dev/null 2>/dev/null selfserv_9351 with PID 2136843 found at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 with PID 2136843 started at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136843 at Fri Nov 28 18:56:49 CST 2025 kill -USR1 2136843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136843 killed at Fri Nov 28 18:56:49 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136902 >/dev/null 2>/dev/null selfserv_9351 with PID 2136902 found at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 with PID 2136902 started at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136902 at Fri Nov 28 18:56:50 CST 2025 kill -USR1 2136902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136902 killed at Fri Nov 28 18:56:50 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136941 >/dev/null 2>/dev/null selfserv_9351 with PID 2136941 found at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 with PID 2136941 started at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136941 at Fri Nov 28 18:56:50 CST 2025 kill -USR1 2136941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136941 killed at Fri Nov 28 18:56:50 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2136980 >/dev/null 2>/dev/null selfserv_9351 with PID 2136980 found at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 with PID 2136980 started at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2136980 at Fri Nov 28 18:56:50 CST 2025 kill -USR1 2136980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2136980 killed at Fri Nov 28 18:56:50 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137033 >/dev/null 2>/dev/null selfserv_9351 with PID 2137033 found at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 with PID 2137033 started at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137033 at Fri Nov 28 18:56:50 CST 2025 kill -USR1 2137033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137033 killed at Fri Nov 28 18:56:50 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137076 >/dev/null 2>/dev/null selfserv_9351 with PID 2137076 found at Fri Nov 28 18:56:50 CST 2025 selfserv_9351 with PID 2137076 started at Fri Nov 28 18:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137076 at Fri Nov 28 18:56:51 CST 2025 kill -USR1 2137076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137076 killed at Fri Nov 28 18:56:51 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137115 >/dev/null 2>/dev/null selfserv_9351 with PID 2137115 found at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 with PID 2137115 started at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137115 at Fri Nov 28 18:56:51 CST 2025 kill -USR1 2137115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137115 killed at Fri Nov 28 18:56:51 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137168 >/dev/null 2>/dev/null selfserv_9351 with PID 2137168 found at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 with PID 2137168 started at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137168 at Fri Nov 28 18:56:51 CST 2025 kill -USR1 2137168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137168 killed at Fri Nov 28 18:56:51 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137207 >/dev/null 2>/dev/null selfserv_9351 with PID 2137207 found at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 with PID 2137207 started at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137207 at Fri Nov 28 18:56:51 CST 2025 kill -USR1 2137207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137207 killed at Fri Nov 28 18:56:51 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137250 >/dev/null 2>/dev/null selfserv_9351 with PID 2137250 found at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 with PID 2137250 started at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137250 at Fri Nov 28 18:56:52 CST 2025 kill -USR1 2137250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137250 killed at Fri Nov 28 18:56:52 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137303 >/dev/null 2>/dev/null selfserv_9351 with PID 2137303 found at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 with PID 2137303 started at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137303 at Fri Nov 28 18:56:52 CST 2025 kill -USR1 2137303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137303 killed at Fri Nov 28 18:56:52 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137342 >/dev/null 2>/dev/null selfserv_9351 with PID 2137342 found at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 with PID 2137342 started at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137342 at Fri Nov 28 18:56:52 CST 2025 kill -USR1 2137342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137342 killed at Fri Nov 28 18:56:52 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137382 >/dev/null 2>/dev/null selfserv_9351 with PID 2137382 found at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 with PID 2137382 started at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137382 at Fri Nov 28 18:56:52 CST 2025 kill -USR1 2137382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137382 killed at Fri Nov 28 18:56:52 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137435 >/dev/null 2>/dev/null selfserv_9351 with PID 2137435 found at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 with PID 2137435 started at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137435 at Fri Nov 28 18:56:53 CST 2025 kill -USR1 2137435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137435 killed at Fri Nov 28 18:56:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137474 >/dev/null 2>/dev/null selfserv_9351 with PID 2137474 found at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 with PID 2137474 started at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137474 at Fri Nov 28 18:56:53 CST 2025 kill -USR1 2137474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137474 killed at Fri Nov 28 18:56:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137513 >/dev/null 2>/dev/null selfserv_9351 with PID 2137513 found at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 with PID 2137513 started at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137513 at Fri Nov 28 18:56:53 CST 2025 kill -USR1 2137513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137513 killed at Fri Nov 28 18:56:53 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137572 >/dev/null 2>/dev/null selfserv_9351 with PID 2137572 found at Fri Nov 28 18:56:53 CST 2025 selfserv_9351 with PID 2137572 started at Fri Nov 28 18:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137572 at Fri Nov 28 18:56:54 CST 2025 kill -USR1 2137572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137572 killed at Fri Nov 28 18:56:54 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137611 >/dev/null 2>/dev/null selfserv_9351 with PID 2137611 found at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 with PID 2137611 started at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137611 at Fri Nov 28 18:56:54 CST 2025 kill -USR1 2137611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137611 killed at Fri Nov 28 18:56:54 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137650 >/dev/null 2>/dev/null selfserv_9351 with PID 2137650 found at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 with PID 2137650 started at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137650 at Fri Nov 28 18:56:54 CST 2025 kill -USR1 2137650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137650 killed at Fri Nov 28 18:56:54 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137703 >/dev/null 2>/dev/null selfserv_9351 with PID 2137703 found at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 with PID 2137703 started at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137703 at Fri Nov 28 18:56:54 CST 2025 kill -USR1 2137703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137703 killed at Fri Nov 28 18:56:54 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137748 >/dev/null 2>/dev/null selfserv_9351 with PID 2137748 found at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 with PID 2137748 started at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137748 at Fri Nov 28 18:56:55 CST 2025 kill -USR1 2137748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137748 killed at Fri Nov 28 18:56:55 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137787 >/dev/null 2>/dev/null selfserv_9351 with PID 2137787 found at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 with PID 2137787 started at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137787 at Fri Nov 28 18:56:55 CST 2025 kill -USR1 2137787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137787 killed at Fri Nov 28 18:56:55 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137840 >/dev/null 2>/dev/null selfserv_9351 with PID 2137840 found at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 with PID 2137840 started at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137840 at Fri Nov 28 18:56:55 CST 2025 kill -USR1 2137840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137840 killed at Fri Nov 28 18:56:55 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137879 >/dev/null 2>/dev/null selfserv_9351 with PID 2137879 found at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 with PID 2137879 started at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137879 at Fri Nov 28 18:56:55 CST 2025 kill -USR1 2137879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137879 killed at Fri Nov 28 18:56:55 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137919 >/dev/null 2>/dev/null selfserv_9351 with PID 2137919 found at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 with PID 2137919 started at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2137919 at Fri Nov 28 18:56:56 CST 2025 kill -USR1 2137919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137919 killed at Fri Nov 28 18:56:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2137972 >/dev/null 2>/dev/null selfserv_9351 with PID 2137972 found at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 with PID 2137972 started at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2137972 at Fri Nov 28 18:56:56 CST 2025 kill -USR1 2137972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2137972 killed at Fri Nov 28 18:56:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138011 >/dev/null 2>/dev/null selfserv_9351 with PID 2138011 found at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 with PID 2138011 started at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138011 at Fri Nov 28 18:56:56 CST 2025 kill -USR1 2138011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138011 killed at Fri Nov 28 18:56:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138050 >/dev/null 2>/dev/null selfserv_9351 with PID 2138050 found at Fri Nov 28 18:56:56 CST 2025 selfserv_9351 with PID 2138050 started at Fri Nov 28 18:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138050 at Fri Nov 28 18:56:57 CST 2025 kill -USR1 2138050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138050 killed at Fri Nov 28 18:56:57 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138103 >/dev/null 2>/dev/null selfserv_9351 with PID 2138103 found at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 with PID 2138103 started at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138103 at Fri Nov 28 18:56:57 CST 2025 kill -USR1 2138103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138103 killed at Fri Nov 28 18:56:57 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138142 >/dev/null 2>/dev/null selfserv_9351 with PID 2138142 found at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 with PID 2138142 started at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138142 at Fri Nov 28 18:56:57 CST 2025 kill -USR1 2138142 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138142 killed at Fri Nov 28 18:56:57 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138181 >/dev/null 2>/dev/null selfserv_9351 with PID 2138181 found at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 with PID 2138181 started at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138181 at Fri Nov 28 18:56:57 CST 2025 kill -USR1 2138181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138181 killed at Fri Nov 28 18:56:57 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138234 >/dev/null 2>/dev/null selfserv_9351 with PID 2138234 found at Fri Nov 28 18:56:57 CST 2025 selfserv_9351 with PID 2138234 started at Fri Nov 28 18:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138234 at Fri Nov 28 18:56:57 CST 2025 kill -USR1 2138234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138234 killed at Fri Nov 28 18:56:57 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138273 >/dev/null 2>/dev/null selfserv_9351 with PID 2138273 found at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 with PID 2138273 started at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138273 at Fri Nov 28 18:56:58 CST 2025 kill -USR1 2138273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138273 killed at Fri Nov 28 18:56:58 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138324 >/dev/null 2>/dev/null selfserv_9351 with PID 2138324 found at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 with PID 2138324 started at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138324 at Fri Nov 28 18:56:58 CST 2025 kill -USR1 2138324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138324 killed at Fri Nov 28 18:56:58 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138377 >/dev/null 2>/dev/null selfserv_9351 with PID 2138377 found at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 with PID 2138377 started at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138377 at Fri Nov 28 18:56:58 CST 2025 kill -USR1 2138377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138377 killed at Fri Nov 28 18:56:58 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138420 >/dev/null 2>/dev/null selfserv_9351 with PID 2138420 found at Fri Nov 28 18:56:58 CST 2025 selfserv_9351 with PID 2138420 started at Fri Nov 28 18:56:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138420 at Fri Nov 28 18:56:59 CST 2025 kill -USR1 2138420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138420 killed at Fri Nov 28 18:56:59 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138459 >/dev/null 2>/dev/null selfserv_9351 with PID 2138459 found at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 with PID 2138459 started at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138459 at Fri Nov 28 18:56:59 CST 2025 kill -USR1 2138459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138459 killed at Fri Nov 28 18:56:59 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138512 >/dev/null 2>/dev/null selfserv_9351 with PID 2138512 found at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 with PID 2138512 started at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138512 at Fri Nov 28 18:56:59 CST 2025 kill -USR1 2138512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138512 killed at Fri Nov 28 18:56:59 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138551 >/dev/null 2>/dev/null selfserv_9351 with PID 2138551 found at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 with PID 2138551 started at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138551 at Fri Nov 28 18:56:59 CST 2025 kill -USR1 2138551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138551 killed at Fri Nov 28 18:56:59 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138596 >/dev/null 2>/dev/null selfserv_9351 with PID 2138596 found at Fri Nov 28 18:56:59 CST 2025 selfserv_9351 with PID 2138596 started at Fri Nov 28 18:56:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138596 at Fri Nov 28 18:57:00 CST 2025 kill -USR1 2138596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138596 killed at Fri Nov 28 18:57:00 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138649 >/dev/null 2>/dev/null selfserv_9351 with PID 2138649 found at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 with PID 2138649 started at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138649 at Fri Nov 28 18:57:00 CST 2025 kill -USR1 2138649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138649 killed at Fri Nov 28 18:57:00 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138688 >/dev/null 2>/dev/null selfserv_9351 with PID 2138688 found at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 with PID 2138688 started at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138688 at Fri Nov 28 18:57:00 CST 2025 kill -USR1 2138688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138688 killed at Fri Nov 28 18:57:00 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138727 >/dev/null 2>/dev/null selfserv_9351 with PID 2138727 found at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 with PID 2138727 started at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2138727 at Fri Nov 28 18:57:00 CST 2025 kill -USR1 2138727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138727 killed at Fri Nov 28 18:57:00 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138784 >/dev/null 2>/dev/null selfserv_9351 with PID 2138784 found at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 with PID 2138784 started at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138784 at Fri Nov 28 18:57:01 CST 2025 kill -USR1 2138784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138784 killed at Fri Nov 28 18:57:01 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138823 >/dev/null 2>/dev/null selfserv_9351 with PID 2138823 found at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 with PID 2138823 started at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138823 at Fri Nov 28 18:57:01 CST 2025 kill -USR1 2138823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138823 killed at Fri Nov 28 18:57:01 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138862 >/dev/null 2>/dev/null selfserv_9351 with PID 2138862 found at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 with PID 2138862 started at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138862 at Fri Nov 28 18:57:01 CST 2025 kill -USR1 2138862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138862 killed at Fri Nov 28 18:57:01 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138919 >/dev/null 2>/dev/null selfserv_9351 with PID 2138919 found at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 with PID 2138919 started at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138919 at Fri Nov 28 18:57:01 CST 2025 kill -USR1 2138919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138919 killed at Fri Nov 28 18:57:01 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2138970 >/dev/null 2>/dev/null selfserv_9351 with PID 2138970 found at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 with PID 2138970 started at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2138970 at Fri Nov 28 18:57:02 CST 2025 kill -USR1 2138970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2138970 killed at Fri Nov 28 18:57:02 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139045 >/dev/null 2>/dev/null selfserv_9351 with PID 2139045 found at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 with PID 2139045 started at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139045 at Fri Nov 28 18:57:02 CST 2025 kill -USR1 2139045 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139045 killed at Fri Nov 28 18:57:02 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139098 >/dev/null 2>/dev/null selfserv_9351 with PID 2139098 found at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 with PID 2139098 started at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139098 at Fri Nov 28 18:57:02 CST 2025 kill -USR1 2139098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139098 killed at Fri Nov 28 18:57:02 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139139 >/dev/null 2>/dev/null selfserv_9351 with PID 2139139 found at Fri Nov 28 18:57:02 CST 2025 selfserv_9351 with PID 2139139 started at Fri Nov 28 18:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139139 at Fri Nov 28 18:57:03 CST 2025 kill -USR1 2139139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139139 killed at Fri Nov 28 18:57:03 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139178 >/dev/null 2>/dev/null selfserv_9351 with PID 2139178 found at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 with PID 2139178 started at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139178 at Fri Nov 28 18:57:03 CST 2025 kill -USR1 2139178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139178 killed at Fri Nov 28 18:57:03 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139231 >/dev/null 2>/dev/null selfserv_9351 with PID 2139231 found at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 with PID 2139231 started at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139231 at Fri Nov 28 18:57:03 CST 2025 kill -USR1 2139231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139231 killed at Fri Nov 28 18:57:03 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139270 >/dev/null 2>/dev/null selfserv_9351 with PID 2139270 found at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 with PID 2139270 started at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139270 at Fri Nov 28 18:57:03 CST 2025 kill -USR1 2139270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139270 killed at Fri Nov 28 18:57:03 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139314 >/dev/null 2>/dev/null selfserv_9351 with PID 2139314 found at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 with PID 2139314 started at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139314 at Fri Nov 28 18:57:04 CST 2025 kill -USR1 2139314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139314 killed at Fri Nov 28 18:57:04 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139367 >/dev/null 2>/dev/null selfserv_9351 with PID 2139367 found at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 with PID 2139367 started at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139367 at Fri Nov 28 18:57:04 CST 2025 kill -USR1 2139367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139367 killed at Fri Nov 28 18:57:04 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139406 >/dev/null 2>/dev/null selfserv_9351 with PID 2139406 found at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 with PID 2139406 started at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139406 at Fri Nov 28 18:57:04 CST 2025 kill -USR1 2139406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139406 killed at Fri Nov 28 18:57:04 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139445 >/dev/null 2>/dev/null selfserv_9351 with PID 2139445 found at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 with PID 2139445 started at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139445 at Fri Nov 28 18:57:04 CST 2025 kill -USR1 2139445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139445 killed at Fri Nov 28 18:57:04 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139504 >/dev/null 2>/dev/null selfserv_9351 with PID 2139504 found at Fri Nov 28 18:57:04 CST 2025 selfserv_9351 with PID 2139504 started at Fri Nov 28 18:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139504 at Fri Nov 28 18:57:05 CST 2025 kill -USR1 2139504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139504 killed at Fri Nov 28 18:57:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139543 >/dev/null 2>/dev/null selfserv_9351 with PID 2139543 found at Fri Nov 28 18:57:05 CST 2025 selfserv_9351 with PID 2139543 started at Fri Nov 28 18:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139543 at Fri Nov 28 18:57:05 CST 2025 kill -USR1 2139543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139543 killed at Fri Nov 28 18:57:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139582 >/dev/null 2>/dev/null selfserv_9351 with PID 2139582 found at Fri Nov 28 18:57:05 CST 2025 selfserv_9351 with PID 2139582 started at Fri Nov 28 18:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139582 at Fri Nov 28 18:57:05 CST 2025 kill -USR1 2139582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139582 killed at Fri Nov 28 18:57:05 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139636 >/dev/null 2>/dev/null selfserv_9351 with PID 2139636 found at Fri Nov 28 18:57:05 CST 2025 selfserv_9351 with PID 2139636 started at Fri Nov 28 18:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139636 at Fri Nov 28 18:57:06 CST 2025 kill -USR1 2139636 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139636 killed at Fri Nov 28 18:57:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139675 >/dev/null 2>/dev/null selfserv_9351 with PID 2139675 found at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 with PID 2139675 started at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139675 at Fri Nov 28 18:57:06 CST 2025 kill -USR1 2139675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139675 killed at Fri Nov 28 18:57:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139714 >/dev/null 2>/dev/null selfserv_9351 with PID 2139714 found at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 with PID 2139714 started at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139714 at Fri Nov 28 18:57:06 CST 2025 kill -USR1 2139714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139714 killed at Fri Nov 28 18:57:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139767 >/dev/null 2>/dev/null selfserv_9351 with PID 2139767 found at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 with PID 2139767 started at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139767 at Fri Nov 28 18:57:06 CST 2025 kill -USR1 2139767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139767 killed at Fri Nov 28 18:57:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139806 >/dev/null 2>/dev/null selfserv_9351 with PID 2139806 found at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 with PID 2139806 started at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139806 at Fri Nov 28 18:57:07 CST 2025 kill -USR1 2139806 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139806 killed at Fri Nov 28 18:57:07 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139845 >/dev/null 2>/dev/null selfserv_9351 with PID 2139845 found at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 with PID 2139845 started at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139845 at Fri Nov 28 18:57:07 CST 2025 kill -USR1 2139845 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139845 killed at Fri Nov 28 18:57:07 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139898 >/dev/null 2>/dev/null selfserv_9351 with PID 2139898 found at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 with PID 2139898 started at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139898 at Fri Nov 28 18:57:07 CST 2025 kill -USR1 2139898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139898 killed at Fri Nov 28 18:57:07 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139938 >/dev/null 2>/dev/null selfserv_9351 with PID 2139938 found at Fri Nov 28 18:57:07 CST 2025 selfserv_9351 with PID 2139938 started at Fri Nov 28 18:57:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2139938 at Fri Nov 28 18:57:08 CST 2025 kill -USR1 2139938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139938 killed at Fri Nov 28 18:57:08 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2139977 >/dev/null 2>/dev/null selfserv_9351 with PID 2139977 found at Fri Nov 28 18:57:08 CST 2025 selfserv_9351 with PID 2139977 started at Fri Nov 28 18:57:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2139977 at Fri Nov 28 18:57:08 CST 2025 kill -USR1 2139977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2139977 killed at Fri Nov 28 18:57:08 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140030 >/dev/null 2>/dev/null selfserv_9351 with PID 2140030 found at Fri Nov 28 18:57:08 CST 2025 selfserv_9351 with PID 2140030 started at Fri Nov 28 18:57:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140030 at Fri Nov 28 18:57:08 CST 2025 kill -USR1 2140030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140030 killed at Fri Nov 28 18:57:08 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140069 >/dev/null 2>/dev/null selfserv_9351 with PID 2140069 found at Fri Nov 28 18:57:08 CST 2025 selfserv_9351 with PID 2140069 started at Fri Nov 28 18:57:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140069 at Fri Nov 28 18:57:09 CST 2025 kill -USR1 2140069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140069 killed at Fri Nov 28 18:57:09 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140113 >/dev/null 2>/dev/null selfserv_9351 with PID 2140113 found at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 with PID 2140113 started at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140113 at Fri Nov 28 18:57:09 CST 2025 kill -USR1 2140113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140113 killed at Fri Nov 28 18:57:09 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140166 >/dev/null 2>/dev/null selfserv_9351 with PID 2140166 found at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 with PID 2140166 started at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140166 at Fri Nov 28 18:57:09 CST 2025 kill -USR1 2140166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140166 killed at Fri Nov 28 18:57:09 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140205 >/dev/null 2>/dev/null selfserv_9351 with PID 2140205 found at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 with PID 2140205 started at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140205 at Fri Nov 28 18:57:09 CST 2025 kill -USR1 2140205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140205 killed at Fri Nov 28 18:57:09 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140250 >/dev/null 2>/dev/null selfserv_9351 with PID 2140250 found at Fri Nov 28 18:57:09 CST 2025 selfserv_9351 with PID 2140250 started at Fri Nov 28 18:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140250 at Fri Nov 28 18:57:10 CST 2025 kill -USR1 2140250 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140250 killed at Fri Nov 28 18:57:10 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140303 >/dev/null 2>/dev/null selfserv_9351 with PID 2140303 found at Fri Nov 28 18:57:10 CST 2025 selfserv_9351 with PID 2140303 started at Fri Nov 28 18:57:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140303 at Fri Nov 28 18:57:10 CST 2025 kill -USR1 2140303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140303 killed at Fri Nov 28 18:57:10 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140342 >/dev/null 2>/dev/null selfserv_9351 with PID 2140342 found at Fri Nov 28 18:57:10 CST 2025 selfserv_9351 with PID 2140342 started at Fri Nov 28 18:57:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2140342 at Fri Nov 28 18:57:10 CST 2025 kill -USR1 2140342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140342 killed at Fri Nov 28 18:57:10 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140381 >/dev/null 2>/dev/null selfserv_9351 with PID 2140381 found at Fri Nov 28 18:57:10 CST 2025 selfserv_9351 with PID 2140381 started at Fri Nov 28 18:57:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140381 at Fri Nov 28 18:57:11 CST 2025 kill -USR1 2140381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140381 killed at Fri Nov 28 18:57:11 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140438 >/dev/null 2>/dev/null selfserv_9351 with PID 2140438 found at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 with PID 2140438 started at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140438 at Fri Nov 28 18:57:11 CST 2025 kill -USR1 2140438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140438 killed at Fri Nov 28 18:57:11 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140477 >/dev/null 2>/dev/null selfserv_9351 with PID 2140477 found at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 with PID 2140477 started at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2140477 at Fri Nov 28 18:57:11 CST 2025 kill -USR1 2140477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140477 killed at Fri Nov 28 18:57:11 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140516 >/dev/null 2>/dev/null selfserv_9351 with PID 2140516 found at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 with PID 2140516 started at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140516 at Fri Nov 28 18:57:11 CST 2025 kill -USR1 2140516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140516 killed at Fri Nov 28 18:57:11 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140573 >/dev/null 2>/dev/null selfserv_9351 with PID 2140573 found at Fri Nov 28 18:57:11 CST 2025 selfserv_9351 with PID 2140573 started at Fri Nov 28 18:57:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140573 at Fri Nov 28 18:57:12 CST 2025 kill -USR1 2140573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140573 killed at Fri Nov 28 18:57:12 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140612 >/dev/null 2>/dev/null selfserv_9351 with PID 2140612 found at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 with PID 2140612 started at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2140612 at Fri Nov 28 18:57:12 CST 2025 kill -USR1 2140612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140612 killed at Fri Nov 28 18:57:12 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140651 >/dev/null 2>/dev/null selfserv_9351 with PID 2140651 found at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 with PID 2140651 started at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140651 at Fri Nov 28 18:57:12 CST 2025 kill -USR1 2140651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140651 killed at Fri Nov 28 18:57:12 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140704 >/dev/null 2>/dev/null selfserv_9351 with PID 2140704 found at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 with PID 2140704 started at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2140704 at Fri Nov 28 18:57:12 CST 2025 kill -USR1 2140704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140704 killed at Fri Nov 28 18:57:12 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140744 >/dev/null 2>/dev/null selfserv_9351 with PID 2140744 found at Fri Nov 28 18:57:12 CST 2025 selfserv_9351 with PID 2140744 started at Fri Nov 28 18:57:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2140744 at Fri Nov 28 18:57:13 CST 2025 kill -USR1 2140744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140744 killed at Fri Nov 28 18:57:13 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140783 >/dev/null 2>/dev/null selfserv_9351 with PID 2140783 found at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 with PID 2140783 started at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2140783 at Fri Nov 28 18:57:13 CST 2025 kill -USR1 2140783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140783 killed at Fri Nov 28 18:57:13 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140836 >/dev/null 2>/dev/null selfserv_9351 with PID 2140836 found at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 with PID 2140836 started at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140836 at Fri Nov 28 18:57:13 CST 2025 kill -USR1 2140836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140836 killed at Fri Nov 28 18:57:13 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140875 >/dev/null 2>/dev/null selfserv_9351 with PID 2140875 found at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 with PID 2140875 started at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140875 at Fri Nov 28 18:57:13 CST 2025 kill -USR1 2140875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140875 killed at Fri Nov 28 18:57:13 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140919 >/dev/null 2>/dev/null selfserv_9351 with PID 2140919 found at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 with PID 2140919 started at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140919 at Fri Nov 28 18:57:14 CST 2025 kill -USR1 2140919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140919 killed at Fri Nov 28 18:57:14 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2140972 >/dev/null 2>/dev/null selfserv_9351 with PID 2140972 found at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 with PID 2140972 started at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2140972 at Fri Nov 28 18:57:14 CST 2025 kill -USR1 2140972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2140972 killed at Fri Nov 28 18:57:14 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141011 >/dev/null 2>/dev/null selfserv_9351 with PID 2141011 found at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 with PID 2141011 started at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141011 at Fri Nov 28 18:57:14 CST 2025 kill -USR1 2141011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141011 killed at Fri Nov 28 18:57:14 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141050 >/dev/null 2>/dev/null selfserv_9351 with PID 2141050 found at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 with PID 2141050 started at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2141050 at Fri Nov 28 18:57:14 CST 2025 kill -USR1 2141050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141050 killed at Fri Nov 28 18:57:14 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141109 >/dev/null 2>/dev/null selfserv_9351 with PID 2141109 found at Fri Nov 28 18:57:15 CST 2025 selfserv_9351 with PID 2141109 started at Fri Nov 28 18:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141109 at Fri Nov 28 18:57:15 CST 2025 kill -USR1 2141109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141109 killed at Fri Nov 28 18:57:15 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141148 >/dev/null 2>/dev/null selfserv_9351 with PID 2141148 found at Fri Nov 28 18:57:15 CST 2025 selfserv_9351 with PID 2141148 started at Fri Nov 28 18:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141148 at Fri Nov 28 18:57:15 CST 2025 kill -USR1 2141148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141148 killed at Fri Nov 28 18:57:15 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141187 >/dev/null 2>/dev/null selfserv_9351 with PID 2141187 found at Fri Nov 28 18:57:15 CST 2025 selfserv_9351 with PID 2141187 started at Fri Nov 28 18:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141187 at Fri Nov 28 18:57:15 CST 2025 kill -USR1 2141187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141187 killed at Fri Nov 28 18:57:15 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141242 >/dev/null 2>/dev/null selfserv_9351 with PID 2141242 found at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 with PID 2141242 started at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141242 at Fri Nov 28 18:57:16 CST 2025 kill -USR1 2141242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141242 killed at Fri Nov 28 18:57:16 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141281 >/dev/null 2>/dev/null selfserv_9351 with PID 2141281 found at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 with PID 2141281 started at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141281 at Fri Nov 28 18:57:16 CST 2025 kill -USR1 2141281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141281 killed at Fri Nov 28 18:57:16 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141320 >/dev/null 2>/dev/null selfserv_9351 with PID 2141320 found at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 with PID 2141320 started at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141320 at Fri Nov 28 18:57:16 CST 2025 kill -USR1 2141320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141320 killed at Fri Nov 28 18:57:16 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141373 >/dev/null 2>/dev/null selfserv_9351 with PID 2141373 found at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 with PID 2141373 started at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141373 at Fri Nov 28 18:57:16 CST 2025 kill -USR1 2141373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141373 killed at Fri Nov 28 18:57:16 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141413 >/dev/null 2>/dev/null selfserv_9351 with PID 2141413 found at Fri Nov 28 18:57:16 CST 2025 selfserv_9351 with PID 2141413 started at Fri Nov 28 18:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141413 at Fri Nov 28 18:57:17 CST 2025 kill -USR1 2141413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141413 killed at Fri Nov 28 18:57:17 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141452 >/dev/null 2>/dev/null selfserv_9351 with PID 2141452 found at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 with PID 2141452 started at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141452 at Fri Nov 28 18:57:17 CST 2025 kill -USR1 2141452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141452 killed at Fri Nov 28 18:57:17 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141505 >/dev/null 2>/dev/null selfserv_9351 with PID 2141505 found at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 with PID 2141505 started at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141505 at Fri Nov 28 18:57:17 CST 2025 kill -USR1 2141505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141505 killed at Fri Nov 28 18:57:17 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141544 >/dev/null 2>/dev/null selfserv_9351 with PID 2141544 found at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 with PID 2141544 started at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141544 at Fri Nov 28 18:57:17 CST 2025 kill -USR1 2141544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141544 killed at Fri Nov 28 18:57:17 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141584 >/dev/null 2>/dev/null selfserv_9351 with PID 2141584 found at Fri Nov 28 18:57:17 CST 2025 selfserv_9351 with PID 2141584 started at Fri Nov 28 18:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141584 at Fri Nov 28 18:57:18 CST 2025 kill -USR1 2141584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141584 killed at Fri Nov 28 18:57:18 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141637 >/dev/null 2>/dev/null selfserv_9351 with PID 2141637 found at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 with PID 2141637 started at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141637 at Fri Nov 28 18:57:18 CST 2025 kill -USR1 2141637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141637 killed at Fri Nov 28 18:57:18 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141676 >/dev/null 2>/dev/null selfserv_9351 with PID 2141676 found at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 with PID 2141676 started at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141676 at Fri Nov 28 18:57:18 CST 2025 kill -USR1 2141676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141676 killed at Fri Nov 28 18:57:18 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141715 >/dev/null 2>/dev/null selfserv_9351 with PID 2141715 found at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 with PID 2141715 started at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141715 at Fri Nov 28 18:57:18 CST 2025 kill -USR1 2141715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141715 killed at Fri Nov 28 18:57:18 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141772 >/dev/null 2>/dev/null selfserv_9351 with PID 2141772 found at Fri Nov 28 18:57:18 CST 2025 selfserv_9351 with PID 2141772 started at Fri Nov 28 18:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141772 at Fri Nov 28 18:57:19 CST 2025 kill -USR1 2141772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141772 killed at Fri Nov 28 18:57:19 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141811 >/dev/null 2>/dev/null selfserv_9351 with PID 2141811 found at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 with PID 2141811 started at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141811 at Fri Nov 28 18:57:19 CST 2025 kill -USR1 2141811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141811 killed at Fri Nov 28 18:57:19 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141850 >/dev/null 2>/dev/null selfserv_9351 with PID 2141850 found at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 with PID 2141850 started at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141850 at Fri Nov 28 18:57:19 CST 2025 kill -USR1 2141850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141850 killed at Fri Nov 28 18:57:19 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141903 >/dev/null 2>/dev/null selfserv_9351 with PID 2141903 found at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 with PID 2141903 started at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141903 at Fri Nov 28 18:57:19 CST 2025 kill -USR1 2141903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141903 killed at Fri Nov 28 18:57:19 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141948 >/dev/null 2>/dev/null selfserv_9351 with PID 2141948 found at Fri Nov 28 18:57:19 CST 2025 selfserv_9351 with PID 2141948 started at Fri Nov 28 18:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2141948 at Fri Nov 28 18:57:20 CST 2025 kill -USR1 2141948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141948 killed at Fri Nov 28 18:57:20 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2141987 >/dev/null 2>/dev/null selfserv_9351 with PID 2141987 found at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 with PID 2141987 started at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2141987 at Fri Nov 28 18:57:20 CST 2025 kill -USR1 2141987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2141987 killed at Fri Nov 28 18:57:20 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142040 >/dev/null 2>/dev/null selfserv_9351 with PID 2142040 found at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 with PID 2142040 started at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2142040 at Fri Nov 28 18:57:20 CST 2025 kill -USR1 2142040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142040 killed at Fri Nov 28 18:57:20 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142079 >/dev/null 2>/dev/null selfserv_9351 with PID 2142079 found at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 with PID 2142079 started at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2142079 at Fri Nov 28 18:57:20 CST 2025 kill -USR1 2142079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142079 killed at Fri Nov 28 18:57:20 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142123 >/dev/null 2>/dev/null selfserv_9351 with PID 2142123 found at Fri Nov 28 18:57:20 CST 2025 selfserv_9351 with PID 2142123 started at Fri Nov 28 18:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2142123 at Fri Nov 28 18:57:21 CST 2025 kill -USR1 2142123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142123 killed at Fri Nov 28 18:57:21 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142176 >/dev/null 2>/dev/null selfserv_9351 with PID 2142176 found at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 with PID 2142176 started at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2142176 at Fri Nov 28 18:57:21 CST 2025 kill -USR1 2142176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142176 killed at Fri Nov 28 18:57:21 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142215 >/dev/null 2>/dev/null selfserv_9351 with PID 2142215 found at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 with PID 2142215 started at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142215 at Fri Nov 28 18:57:21 CST 2025 kill -USR1 2142215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142215 killed at Fri Nov 28 18:57:21 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142254 >/dev/null 2>/dev/null selfserv_9351 with PID 2142254 found at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 with PID 2142254 started at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2142254 at Fri Nov 28 18:57:21 CST 2025 kill -USR1 2142254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142254 killed at Fri Nov 28 18:57:21 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142314 >/dev/null 2>/dev/null selfserv_9351 with PID 2142314 found at Fri Nov 28 18:57:21 CST 2025 selfserv_9351 with PID 2142314 started at Fri Nov 28 18:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142314 at Fri Nov 28 18:57:22 CST 2025 kill -USR1 2142314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142314 killed at Fri Nov 28 18:57:22 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142353 >/dev/null 2>/dev/null selfserv_9351 with PID 2142353 found at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 with PID 2142353 started at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142353 at Fri Nov 28 18:57:22 CST 2025 kill -USR1 2142353 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142353 killed at Fri Nov 28 18:57:22 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142392 >/dev/null 2>/dev/null selfserv_9351 with PID 2142392 found at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 with PID 2142392 started at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142392 at Fri Nov 28 18:57:22 CST 2025 kill -USR1 2142392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142392 killed at Fri Nov 28 18:57:22 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142463 >/dev/null 2>/dev/null selfserv_9351 with PID 2142463 found at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 with PID 2142463 started at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142463 at Fri Nov 28 18:57:22 CST 2025 kill -USR1 2142463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142463 killed at Fri Nov 28 18:57:22 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142503 >/dev/null 2>/dev/null selfserv_9351 with PID 2142503 found at Fri Nov 28 18:57:22 CST 2025 selfserv_9351 with PID 2142503 started at Fri Nov 28 18:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142503 at Fri Nov 28 18:57:23 CST 2025 kill -USR1 2142503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142503 killed at Fri Nov 28 18:57:23 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142542 >/dev/null 2>/dev/null selfserv_9351 with PID 2142542 found at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 with PID 2142542 started at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142542 at Fri Nov 28 18:57:23 CST 2025 kill -USR1 2142542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142542 killed at Fri Nov 28 18:57:23 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142595 >/dev/null 2>/dev/null selfserv_9351 with PID 2142595 found at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 with PID 2142595 started at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142595 at Fri Nov 28 18:57:23 CST 2025 kill -USR1 2142595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142595 killed at Fri Nov 28 18:57:23 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142634 >/dev/null 2>/dev/null selfserv_9351 with PID 2142634 found at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 with PID 2142634 started at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142634 at Fri Nov 28 18:57:23 CST 2025 kill -USR1 2142634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142634 killed at Fri Nov 28 18:57:23 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142673 >/dev/null 2>/dev/null selfserv_9351 with PID 2142673 found at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 with PID 2142673 started at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142673 at Fri Nov 28 18:57:23 CST 2025 kill -USR1 2142673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142673 killed at Fri Nov 28 18:57:23 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142732 >/dev/null 2>/dev/null selfserv_9351 with PID 2142732 found at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 with PID 2142732 started at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142732 at Fri Nov 28 18:57:24 CST 2025 kill -USR1 2142732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142732 killed at Fri Nov 28 18:57:24 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142771 >/dev/null 2>/dev/null selfserv_9351 with PID 2142771 found at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 with PID 2142771 started at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142771 at Fri Nov 28 18:57:24 CST 2025 kill -USR1 2142771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142771 killed at Fri Nov 28 18:57:24 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142810 >/dev/null 2>/dev/null selfserv_9351 with PID 2142810 found at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 with PID 2142810 started at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2142810 at Fri Nov 28 18:57:24 CST 2025 kill -USR1 2142810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142810 killed at Fri Nov 28 18:57:24 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142863 >/dev/null 2>/dev/null selfserv_9351 with PID 2142863 found at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 with PID 2142863 started at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142863 at Fri Nov 28 18:57:24 CST 2025 kill -USR1 2142863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142863 killed at Fri Nov 28 18:57:24 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142908 >/dev/null 2>/dev/null selfserv_9351 with PID 2142908 found at Fri Nov 28 18:57:24 CST 2025 selfserv_9351 with PID 2142908 started at Fri Nov 28 18:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142908 at Fri Nov 28 18:57:25 CST 2025 kill -USR1 2142908 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142908 killed at Fri Nov 28 18:57:25 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2142947 >/dev/null 2>/dev/null selfserv_9351 with PID 2142947 found at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 with PID 2142947 started at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2142947 at Fri Nov 28 18:57:25 CST 2025 kill -USR1 2142947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2142947 killed at Fri Nov 28 18:57:25 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143000 >/dev/null 2>/dev/null selfserv_9351 with PID 2143000 found at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 with PID 2143000 started at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143000 at Fri Nov 28 18:57:25 CST 2025 kill -USR1 2143000 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143000 killed at Fri Nov 28 18:57:25 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143039 >/dev/null 2>/dev/null selfserv_9351 with PID 2143039 found at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 with PID 2143039 started at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143039 at Fri Nov 28 18:57:25 CST 2025 kill -USR1 2143039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143039 killed at Fri Nov 28 18:57:25 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143079 >/dev/null 2>/dev/null selfserv_9351 with PID 2143079 found at Fri Nov 28 18:57:25 CST 2025 selfserv_9351 with PID 2143079 started at Fri Nov 28 18:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143079 at Fri Nov 28 18:57:26 CST 2025 kill -USR1 2143079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143079 killed at Fri Nov 28 18:57:26 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143132 >/dev/null 2>/dev/null selfserv_9351 with PID 2143132 found at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 with PID 2143132 started at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143132 at Fri Nov 28 18:57:26 CST 2025 kill -USR1 2143132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143132 killed at Fri Nov 28 18:57:26 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143171 >/dev/null 2>/dev/null selfserv_9351 with PID 2143171 found at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 with PID 2143171 started at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143171 at Fri Nov 28 18:57:26 CST 2025 kill -USR1 2143171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143171 killed at Fri Nov 28 18:57:26 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143210 >/dev/null 2>/dev/null selfserv_9351 with PID 2143210 found at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 with PID 2143210 started at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143210 at Fri Nov 28 18:57:26 CST 2025 kill -USR1 2143210 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143210 killed at Fri Nov 28 18:57:26 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143263 >/dev/null 2>/dev/null selfserv_9351 with PID 2143263 found at Fri Nov 28 18:57:26 CST 2025 selfserv_9351 with PID 2143263 started at Fri Nov 28 18:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143263 at Fri Nov 28 18:57:27 CST 2025 kill -USR1 2143263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143263 killed at Fri Nov 28 18:57:27 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143302 >/dev/null 2>/dev/null selfserv_9351 with PID 2143302 found at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 with PID 2143302 started at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143302 at Fri Nov 28 18:57:27 CST 2025 kill -USR1 2143302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143302 killed at Fri Nov 28 18:57:27 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143341 >/dev/null 2>/dev/null selfserv_9351 with PID 2143341 found at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 with PID 2143341 started at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143341 at Fri Nov 28 18:57:27 CST 2025 kill -USR1 2143341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143341 killed at Fri Nov 28 18:57:27 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143394 >/dev/null 2>/dev/null selfserv_9351 with PID 2143394 found at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 with PID 2143394 started at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143394 at Fri Nov 28 18:57:27 CST 2025 kill -USR1 2143394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143394 killed at Fri Nov 28 18:57:27 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143433 >/dev/null 2>/dev/null selfserv_9351 with PID 2143433 found at Fri Nov 28 18:57:27 CST 2025 selfserv_9351 with PID 2143433 started at Fri Nov 28 18:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143433 at Fri Nov 28 18:57:28 CST 2025 kill -USR1 2143433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143433 killed at Fri Nov 28 18:57:28 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143472 >/dev/null 2>/dev/null selfserv_9351 with PID 2143472 found at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 with PID 2143472 started at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143472 at Fri Nov 28 18:57:28 CST 2025 kill -USR1 2143472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143472 killed at Fri Nov 28 18:57:28 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143525 >/dev/null 2>/dev/null selfserv_9351 with PID 2143525 found at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 with PID 2143525 started at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143525 at Fri Nov 28 18:57:28 CST 2025 kill -USR1 2143525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143525 killed at Fri Nov 28 18:57:28 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143564 >/dev/null 2>/dev/null selfserv_9351 with PID 2143564 found at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 with PID 2143564 started at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143564 at Fri Nov 28 18:57:28 CST 2025 kill -USR1 2143564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143564 killed at Fri Nov 28 18:57:28 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143607 >/dev/null 2>/dev/null selfserv_9351 with PID 2143607 found at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 with PID 2143607 started at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143607 at Fri Nov 28 18:57:29 CST 2025 kill -USR1 2143607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143607 killed at Fri Nov 28 18:57:29 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143660 >/dev/null 2>/dev/null selfserv_9351 with PID 2143660 found at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 with PID 2143660 started at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143660 at Fri Nov 28 18:57:29 CST 2025 kill -USR1 2143660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143660 killed at Fri Nov 28 18:57:29 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143699 >/dev/null 2>/dev/null selfserv_9351 with PID 2143699 found at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 with PID 2143699 started at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143699 at Fri Nov 28 18:57:29 CST 2025 kill -USR1 2143699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143699 killed at Fri Nov 28 18:57:29 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143744 >/dev/null 2>/dev/null selfserv_9351 with PID 2143744 found at Fri Nov 28 18:57:29 CST 2025 selfserv_9351 with PID 2143744 started at Fri Nov 28 18:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143744 at Fri Nov 28 18:57:30 CST 2025 kill -USR1 2143744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143744 killed at Fri Nov 28 18:57:30 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143797 >/dev/null 2>/dev/null selfserv_9351 with PID 2143797 found at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 with PID 2143797 started at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143797 at Fri Nov 28 18:57:30 CST 2025 kill -USR1 2143797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143797 killed at Fri Nov 28 18:57:30 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143836 >/dev/null 2>/dev/null selfserv_9351 with PID 2143836 found at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 with PID 2143836 started at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143836 at Fri Nov 28 18:57:30 CST 2025 kill -USR1 2143836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143836 killed at Fri Nov 28 18:57:30 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143875 >/dev/null 2>/dev/null selfserv_9351 with PID 2143875 found at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 with PID 2143875 started at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2143875 at Fri Nov 28 18:57:30 CST 2025 kill -USR1 2143875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143875 killed at Fri Nov 28 18:57:30 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143932 >/dev/null 2>/dev/null selfserv_9351 with PID 2143932 found at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 with PID 2143932 started at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143932 at Fri Nov 28 18:57:31 CST 2025 kill -USR1 2143932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143932 killed at Fri Nov 28 18:57:31 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2143971 >/dev/null 2>/dev/null selfserv_9351 with PID 2143971 found at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 with PID 2143971 started at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2143971 at Fri Nov 28 18:57:31 CST 2025 kill -USR1 2143971 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2143971 killed at Fri Nov 28 18:57:31 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2144010 >/dev/null 2>/dev/null selfserv_9351 with PID 2144010 found at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 with PID 2144010 started at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2144010 at Fri Nov 28 18:57:31 CST 2025 kill -USR1 2144010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2144010 killed at Fri Nov 28 18:57:31 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2144067 >/dev/null 2>/dev/null selfserv_9351 with PID 2144067 found at Fri Nov 28 18:57:31 CST 2025 selfserv_9351 with PID 2144067 started at Fri Nov 28 18:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2144067 at Fri Nov 28 18:57:32 CST 2025 kill -USR1 2144067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2144067 killed at Fri Nov 28 18:57:32 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2144106 >/dev/null 2>/dev/null selfserv_9351 with PID 2144106 found at Fri Nov 28 18:57:32 CST 2025 selfserv_9351 with PID 2144106 started at Fri Nov 28 18:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2144106 at Fri Nov 28 18:57:32 CST 2025 kill -USR1 2144106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2144106 killed at Fri Nov 28 18:57:32 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2144145 >/dev/null 2>/dev/null selfserv_9351 with PID 2144145 found at Fri Nov 28 18:57:32 CST 2025 selfserv_9351 with PID 2144145 started at Fri Nov 28 18:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2144145 at Fri Nov 28 18:57:32 CST 2025 kill -USR1 2144145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2144145 killed at Fri Nov 28 18:57:32 CST 2025 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9351 starting at Fri Nov 28 18:57:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:32 CST 2025 selfserv_9351 with PID 2144206 started at Fri Nov 28 18:57:32 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:33 CST 2025 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:34 CST 2025 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:34 CST 2025 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:34 CST 2025 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:34 CST 2025 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:34 CST 2025 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:34 CST 2025 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:35 CST 2025 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:35 CST 2025 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:35 CST 2025 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:35 CST 2025 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:35 CST 2025 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:35 CST 2025 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:36 CST 2025 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:36 CST 2025 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:36 CST 2025 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:36 CST 2025 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:36 CST 2025 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:36 CST 2025 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:37 CST 2025 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:37 CST 2025 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:37 CST 2025 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:37 CST 2025 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:37 CST 2025 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:37 CST 2025 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:38 CST 2025 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:39 CST 2025 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:39 CST 2025 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2144206 >/dev/null 2>/dev/null selfserv_9351 with PID 2144206 found at Fri Nov 28 18:57:39 CST 2025 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2144206 at Fri Nov 28 18:57:39 CST 2025 kill -USR1 2144206 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2144206 killed at Fri Nov 28 18:57:39 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:39 CST 2025 selfserv_9351 with PID 2145141 started at Fri Nov 28 18:57:39 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:39 CST 2025 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:39 CST 2025 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:40 CST 2025 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:40 CST 2025 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:40 CST 2025 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:40 CST 2025 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:40 CST 2025 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:40 CST 2025 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:41 CST 2025 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:41 CST 2025 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:41 CST 2025 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:41 CST 2025 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:41 CST 2025 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:41 CST 2025 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:42 CST 2025 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:43 CST 2025 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:43 CST 2025 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:43 CST 2025 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:43 CST 2025 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:43 CST 2025 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:43 CST 2025 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:44 CST 2025 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:44 CST 2025 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:44 CST 2025 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:44 CST 2025 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:44 CST 2025 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:44 CST 2025 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:45 CST 2025 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:45 CST 2025 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:45 CST 2025 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:45 CST 2025 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:45 CST 2025 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:45 CST 2025 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2145141 >/dev/null 2>/dev/null selfserv_9351 with PID 2145141 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2145141 at Fri Nov 28 18:57:46 CST 2025 kill -USR1 2145141 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2145141 killed at Fri Nov 28 18:57:46 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:46 CST 2025 selfserv_9351 with PID 2146087 started at Fri Nov 28 18:57:46 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:46 CST 2025 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:47 CST 2025 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:48 CST 2025 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:49 CST 2025 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:50 CST 2025 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:51 CST 2025 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2146087 >/dev/null 2>/dev/null selfserv_9351 with PID 2146087 found at Fri Nov 28 18:57:51 CST 2025 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2146087 at Fri Nov 28 18:57:51 CST 2025 kill -USR1 2146087 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2146087 killed at Fri Nov 28 18:57:51 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:51 CST 2025 selfserv_9351 with PID 2147020 started at Fri Nov 28 18:57:51 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:51 CST 2025 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:51 CST 2025 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:51 CST 2025 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:51 CST 2025 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:52 CST 2025 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:53 CST 2025 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:54 CST 2025 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:55 CST 2025 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:56 CST 2025 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:57 CST 2025 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147020 >/dev/null 2>/dev/null selfserv_9351 with PID 2147020 found at Fri Nov 28 18:57:57 CST 2025 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2147020 at Fri Nov 28 18:57:57 CST 2025 kill -USR1 2147020 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2147020 killed at Fri Nov 28 18:57:57 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:57:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2147957 >/dev/null 2>/dev/null selfserv_9351 with PID 2147957 found at Fri Nov 28 18:57:57 CST 2025 selfserv_9351 with PID 2147957 started at Fri Nov 28 18:57:57 CST 2025 trying to kill selfserv_9351 with PID 2147957 at Fri Nov 28 18:57:57 CST 2025 kill -USR1 2147957 ./ssl.sh: line 213: 2147957 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2147957 killed at Fri Nov 28 18:57:57 CST 2025 selfserv_9351 starting at Fri Nov 28 18:57:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:57 CST 2025 selfserv_9351 with PID 2147989 started at Fri Nov 28 18:57:57 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:57 CST 2025 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:57 CST 2025 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:57 CST 2025 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:58 CST 2025 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:58 CST 2025 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:58 CST 2025 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:58 CST 2025 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:58 CST 2025 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:58 CST 2025 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:57:59 CST 2025 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:00 CST 2025 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:00 CST 2025 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:00 CST 2025 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:00 CST 2025 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:00 CST 2025 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:00 CST 2025 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:01 CST 2025 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:02 CST 2025 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:02 CST 2025 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:02 CST 2025 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:02 CST 2025 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:02 CST 2025 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:02 CST 2025 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:03 CST 2025 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:03 CST 2025 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:03 CST 2025 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:03 CST 2025 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:03 CST 2025 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2147989 >/dev/null 2>/dev/null selfserv_9351 with PID 2147989 found at Fri Nov 28 18:58:03 CST 2025 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2147989 at Fri Nov 28 18:58:03 CST 2025 kill -USR1 2147989 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2147989 killed at Fri Nov 28 18:58:03 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:03 CST 2025 selfserv_9351 with PID 2148993 started at Fri Nov 28 18:58:03 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:04 CST 2025 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:04 CST 2025 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:04 CST 2025 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:04 CST 2025 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:04 CST 2025 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:04 CST 2025 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:05 CST 2025 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:05 CST 2025 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:05 CST 2025 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:05 CST 2025 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:05 CST 2025 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:05 CST 2025 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:06 CST 2025 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:06 CST 2025 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:06 CST 2025 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:06 CST 2025 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:06 CST 2025 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:06 CST 2025 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:07 CST 2025 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:07 CST 2025 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:07 CST 2025 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:07 CST 2025 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:07 CST 2025 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:07 CST 2025 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:08 CST 2025 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:08 CST 2025 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:08 CST 2025 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:08 CST 2025 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:08 CST 2025 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:08 CST 2025 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:09 CST 2025 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:09 CST 2025 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:09 CST 2025 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:09 CST 2025 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:09 CST 2025 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:09 CST 2025 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:10 CST 2025 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:10 CST 2025 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:10 CST 2025 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:10 CST 2025 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2148993 >/dev/null 2>/dev/null selfserv_9351 with PID 2148993 found at Fri Nov 28 18:58:10 CST 2025 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2148993 at Fri Nov 28 18:58:10 CST 2025 kill -USR1 2148993 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2148993 killed at Fri Nov 28 18:58:10 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:10 CST 2025 selfserv_9351 with PID 2149931 started at Fri Nov 28 18:58:10 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:10 CST 2025 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:11 CST 2025 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:11 CST 2025 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:11 CST 2025 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:11 CST 2025 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:11 CST 2025 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:12 CST 2025 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:12 CST 2025 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:12 CST 2025 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:12 CST 2025 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:12 CST 2025 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:12 CST 2025 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:13 CST 2025 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:13 CST 2025 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:13 CST 2025 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:13 CST 2025 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:13 CST 2025 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:13 CST 2025 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:14 CST 2025 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:14 CST 2025 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:14 CST 2025 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:14 CST 2025 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:14 CST 2025 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:15 CST 2025 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:15 CST 2025 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:15 CST 2025 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:15 CST 2025 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:15 CST 2025 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:15 CST 2025 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:16 CST 2025 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:16 CST 2025 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:16 CST 2025 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:16 CST 2025 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:16 CST 2025 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:16 CST 2025 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:17 CST 2025 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:17 CST 2025 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:17 CST 2025 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:17 CST 2025 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:17 CST 2025 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2149931 >/dev/null 2>/dev/null selfserv_9351 with PID 2149931 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2149931 at Fri Nov 28 18:58:18 CST 2025 kill -USR1 2149931 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2149931 killed at Fri Nov 28 18:58:18 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 selfserv_9351 with PID 2150874 started at Fri Nov 28 18:58:18 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:18 CST 2025 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:19 CST 2025 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:20 CST 2025 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:21 CST 2025 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2150874 >/dev/null 2>/dev/null selfserv_9351 with PID 2150874 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2150874 at Fri Nov 28 18:58:22 CST 2025 kill -USR1 2150874 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2150874 killed at Fri Nov 28 18:58:22 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:22 CST 2025 selfserv_9351 with PID 2151833 started at Fri Nov 28 18:58:22 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:22 CST 2025 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:23 CST 2025 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:24 CST 2025 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:25 CST 2025 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:26 CST 2025 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2151833 >/dev/null 2>/dev/null selfserv_9351 with PID 2151833 found at Fri Nov 28 18:58:27 CST 2025 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2151833 at Fri Nov 28 18:58:27 CST 2025 kill -USR1 2151833 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2151833 killed at Fri Nov 28 18:58:27 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:27 CST 2025 selfserv_9351 with PID 2152766 started at Fri Nov 28 18:58:27 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:28 CST 2025 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:28 CST 2025 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:28 CST 2025 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:28 CST 2025 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:28 CST 2025 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:28 CST 2025 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:29 CST 2025 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:29 CST 2025 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:29 CST 2025 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:29 CST 2025 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:29 CST 2025 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:29 CST 2025 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:30 CST 2025 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:31 CST 2025 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:31 CST 2025 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:31 CST 2025 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:31 CST 2025 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:31 CST 2025 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:31 CST 2025 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:32 CST 2025 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:33 CST 2025 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:33 CST 2025 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:33 CST 2025 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:33 CST 2025 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:33 CST 2025 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:33 CST 2025 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:34 CST 2025 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:34 CST 2025 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2152766 >/dev/null 2>/dev/null selfserv_9351 with PID 2152766 found at Fri Nov 28 18:58:34 CST 2025 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2152766 at Fri Nov 28 18:58:34 CST 2025 kill -USR1 2152766 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2152766 killed at Fri Nov 28 18:58:34 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2153709 >/dev/null 2>/dev/null selfserv_9351 with PID 2153709 found at Fri Nov 28 18:58:34 CST 2025 selfserv_9351 with PID 2153709 started at Fri Nov 28 18:58:34 CST 2025 trying to kill selfserv_9351 with PID 2153709 at Fri Nov 28 18:58:34 CST 2025 kill -USR1 2153709 ./ssl.sh: line 213: 2153709 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2153709 killed at Fri Nov 28 18:58:34 CST 2025 selfserv_9351 starting at Fri Nov 28 18:58:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:34 CST 2025 selfserv_9351 with PID 2153741 started at Fri Nov 28 18:58:34 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:34 CST 2025 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:34 CST 2025 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:35 CST 2025 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:35 CST 2025 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:35 CST 2025 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:35 CST 2025 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:35 CST 2025 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:35 CST 2025 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:36 CST 2025 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:37 CST 2025 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:37 CST 2025 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:37 CST 2025 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:37 CST 2025 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:37 CST 2025 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:37 CST 2025 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:38 CST 2025 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:39 CST 2025 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:39 CST 2025 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:39 CST 2025 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:39 CST 2025 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:39 CST 2025 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:39 CST 2025 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:40 CST 2025 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:40 CST 2025 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:40 CST 2025 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:40 CST 2025 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:40 CST 2025 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:40 CST 2025 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2153741 >/dev/null 2>/dev/null selfserv_9351 with PID 2153741 found at Fri Nov 28 18:58:41 CST 2025 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2153741 at Fri Nov 28 18:58:41 CST 2025 kill -USR1 2153741 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2153741 killed at Fri Nov 28 18:58:41 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:41 CST 2025 selfserv_9351 with PID 2154681 started at Fri Nov 28 18:58:41 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:41 CST 2025 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:41 CST 2025 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:41 CST 2025 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:41 CST 2025 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:41 CST 2025 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:42 CST 2025 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:42 CST 2025 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:42 CST 2025 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:42 CST 2025 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:42 CST 2025 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:42 CST 2025 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:43 CST 2025 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:43 CST 2025 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:43 CST 2025 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:43 CST 2025 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:43 CST 2025 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:43 CST 2025 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:44 CST 2025 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:44 CST 2025 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:44 CST 2025 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:44 CST 2025 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:44 CST 2025 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:44 CST 2025 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:45 CST 2025 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:45 CST 2025 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:45 CST 2025 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:45 CST 2025 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:45 CST 2025 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:45 CST 2025 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:46 CST 2025 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:46 CST 2025 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:46 CST 2025 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:46 CST 2025 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:46 CST 2025 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:46 CST 2025 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:47 CST 2025 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:47 CST 2025 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:47 CST 2025 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:47 CST 2025 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:47 CST 2025 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2154681 >/dev/null 2>/dev/null selfserv_9351 with PID 2154681 found at Fri Nov 28 18:58:47 CST 2025 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2154681 at Fri Nov 28 18:58:47 CST 2025 kill -USR1 2154681 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2154681 killed at Fri Nov 28 18:58:47 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:48 CST 2025 selfserv_9351 with PID 2155617 started at Fri Nov 28 18:58:48 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:48 CST 2025 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:48 CST 2025 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:48 CST 2025 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:48 CST 2025 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:48 CST 2025 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:49 CST 2025 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:49 CST 2025 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:49 CST 2025 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:49 CST 2025 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:49 CST 2025 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:49 CST 2025 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:50 CST 2025 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:50 CST 2025 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:50 CST 2025 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:50 CST 2025 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:50 CST 2025 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:51 CST 2025 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:51 CST 2025 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:51 CST 2025 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:51 CST 2025 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:51 CST 2025 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:51 CST 2025 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:52 CST 2025 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:52 CST 2025 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:52 CST 2025 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:52 CST 2025 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:52 CST 2025 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:52 CST 2025 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:53 CST 2025 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:53 CST 2025 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:53 CST 2025 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:53 CST 2025 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:53 CST 2025 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:54 CST 2025 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:54 CST 2025 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:54 CST 2025 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:54 CST 2025 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:54 CST 2025 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:54 CST 2025 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2155617 >/dev/null 2>/dev/null selfserv_9351 with PID 2155617 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2155617 at Fri Nov 28 18:58:55 CST 2025 kill -USR1 2155617 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2155617 killed at Fri Nov 28 18:58:55 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:55 CST 2025 selfserv_9351 with PID 2156567 started at Fri Nov 28 18:58:55 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:55 CST 2025 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:56 CST 2025 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:57 CST 2025 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:58 CST 2025 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2156567 >/dev/null 2>/dev/null selfserv_9351 with PID 2156567 found at Fri Nov 28 18:58:59 CST 2025 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2156567 at Fri Nov 28 18:58:59 CST 2025 kill -USR1 2156567 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2156567 killed at Fri Nov 28 18:58:59 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:58:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:58:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 selfserv_9351 with PID 2157509 started at Fri Nov 28 18:59:00 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:00 CST 2025 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:01 CST 2025 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:02 CST 2025 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:03 CST 2025 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:04 CST 2025 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2157509 >/dev/null 2>/dev/null selfserv_9351 with PID 2157509 found at Fri Nov 28 18:59:05 CST 2025 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2157509 at Fri Nov 28 18:59:05 CST 2025 kill -USR1 2157509 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2157509 killed at Fri Nov 28 18:59:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:05 CST 2025 selfserv_9351 with PID 2158497 started at Fri Nov 28 18:59:05 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:05 CST 2025 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:05 CST 2025 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:05 CST 2025 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:05 CST 2025 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:06 CST 2025 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:06 CST 2025 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:06 CST 2025 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:06 CST 2025 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:06 CST 2025 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:06 CST 2025 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:07 CST 2025 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:08 CST 2025 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:08 CST 2025 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:08 CST 2025 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:08 CST 2025 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:08 CST 2025 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:08 CST 2025 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:09 CST 2025 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:10 CST 2025 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:10 CST 2025 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:10 CST 2025 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:10 CST 2025 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:10 CST 2025 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:10 CST 2025 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:11 CST 2025 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:11 CST 2025 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:11 CST 2025 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:11 CST 2025 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2158497 >/dev/null 2>/dev/null selfserv_9351 with PID 2158497 found at Fri Nov 28 18:59:11 CST 2025 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2158497 at Fri Nov 28 18:59:11 CST 2025 kill -USR1 2158497 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2158497 killed at Fri Nov 28 18:59:11 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2159434 >/dev/null 2>/dev/null selfserv_9351 with PID 2159434 found at Fri Nov 28 18:59:11 CST 2025 selfserv_9351 with PID 2159434 started at Fri Nov 28 18:59:11 CST 2025 trying to kill selfserv_9351 with PID 2159434 at Fri Nov 28 18:59:11 CST 2025 kill -USR1 2159434 ./ssl.sh: line 213: 2159434 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2159434 killed at Fri Nov 28 18:59:11 CST 2025 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9351 starting at Fri Nov 28 18:59:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2159531 >/dev/null 2>/dev/null selfserv_9351 with PID 2159531 found at Fri Nov 28 18:59:12 CST 2025 selfserv_9351 with PID 2159531 started at Fri Nov 28 18:59:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2159531 at Fri Nov 28 18:59:12 CST 2025 kill -USR1 2159531 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2159531 killed at Fri Nov 28 18:59:12 CST 2025 ssl.sh: Check that OCSP doesn't break if we disable sha1 - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** vfyserv -o wrong.host.badssl.com -d ../server 2>&1 | tee ../server/vfy.out Connecting to host wrong.host.badssl.com (addr 104.154.89.105) on port 443 Error in function PR_Write: -12276 - Unable to communicate securely with peer: requested domain name does not match the server's certificate. grep -E '12276|5961' ../server/vfy.out Error in function PR_Write: -12276 ssl.sh: #663: produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9351 starting at Fri Nov 28 18:59:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2159582 >/dev/null 2>/dev/null selfserv_9351 with PID 2159582 found at Fri Nov 28 18:59:14 CST 2025 selfserv_9351 with PID 2159582 started at Fri Nov 28 18:59:14 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #666: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #667: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #668: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #669: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #670: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #671: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #672: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #673: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #674: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #683: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #686: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #687: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #688: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signature verification ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-verify library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #689: Restrict RSA keys on signature verification produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signing ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-sign library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #690: Restrict RSA keys on signing produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-ssl library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12226: SSL peer rejected a handshake message for unacceptable content. tstclnt: write to SSL socket failed: SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. ssl.sh: #691: Restrict RSA keys when used in SSL produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=1023 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #692: Restrict RSA keys when used in SSL produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #693: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #694: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #695: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #696: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2159582 at Fri Nov 28 18:59:16 CST 2025 kill -USR1 2159582 selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2159582 killed at Fri Nov 28 18:59:16 CST 2025 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 18:59:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2160053 >/dev/null 2>/dev/null selfserv_9351 with PID 2160053 found at Fri Nov 28 18:59:16 CST 2025 selfserv_9351 with PID 2160053 started at Fri Nov 28 18:59:16 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2160053 at Fri Nov 28 18:59:20 CST 2025 kill -USR1 2160053 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2160053 killed at Fri Nov 28 18:59:20 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 18:59:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2160552 >/dev/null 2>/dev/null selfserv_9351 with PID 2160552 found at Fri Nov 28 18:59:20 CST 2025 selfserv_9351 with PID 2160552 started at Fri Nov 28 18:59:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #790: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2160552 at Fri Nov 28 18:59:25 CST 2025 kill -USR1 2160552 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2160552 killed at Fri Nov 28 18:59:25 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 18:59:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161306 >/dev/null 2>/dev/null selfserv_9351 with PID 2161306 found at Fri Nov 28 18:59:25 CST 2025 selfserv_9351 with PID 2161306 started at Fri Nov 28 18:59:25 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161306 at Fri Nov 28 18:59:25 CST 2025 kill -USR1 2161306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161306 killed at Fri Nov 28 18:59:25 CST 2025 ssl.sh: SSL Client Authentication - server normal/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161361 >/dev/null 2>/dev/null selfserv_9351 with PID 2161361 found at Fri Nov 28 18:59:25 CST 2025 selfserv_9351 with PID 2161361 started at Fri Nov 28 18:59:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161361 at Fri Nov 28 18:59:26 CST 2025 kill -USR1 2161361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161361 killed at Fri Nov 28 18:59:26 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161402 >/dev/null 2>/dev/null selfserv_9351 with PID 2161402 found at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 with PID 2161402 started at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161402 at Fri Nov 28 18:59:26 CST 2025 kill -USR1 2161402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161402 killed at Fri Nov 28 18:59:26 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161443 >/dev/null 2>/dev/null selfserv_9351 with PID 2161443 found at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 with PID 2161443 started at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161443 at Fri Nov 28 18:59:26 CST 2025 kill -USR1 2161443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161443 killed at Fri Nov 28 18:59:26 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161484 >/dev/null 2>/dev/null selfserv_9351 with PID 2161484 found at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 with PID 2161484 started at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2161484 at Fri Nov 28 18:59:26 CST 2025 kill -USR1 2161484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161484 killed at Fri Nov 28 18:59:26 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161525 >/dev/null 2>/dev/null selfserv_9351 with PID 2161525 found at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 with PID 2161525 started at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #795: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2161525 at Fri Nov 28 18:59:27 CST 2025 kill -USR1 2161525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161525 killed at Fri Nov 28 18:59:27 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161566 >/dev/null 2>/dev/null selfserv_9351 with PID 2161566 found at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 with PID 2161566 started at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161566 at Fri Nov 28 18:59:27 CST 2025 kill -USR1 2161566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161566 killed at Fri Nov 28 18:59:27 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161607 >/dev/null 2>/dev/null selfserv_9351 with PID 2161607 found at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 with PID 2161607 started at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161607 at Fri Nov 28 18:59:27 CST 2025 kill -USR1 2161607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161607 killed at Fri Nov 28 18:59:27 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161648 >/dev/null 2>/dev/null selfserv_9351 with PID 2161648 found at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 with PID 2161648 started at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161648 at Fri Nov 28 18:59:27 CST 2025 kill -USR1 2161648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161648 killed at Fri Nov 28 18:59:27 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161689 >/dev/null 2>/dev/null selfserv_9351 with PID 2161689 found at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 with PID 2161689 started at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161689 at Fri Nov 28 18:59:28 CST 2025 kill -USR1 2161689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161689 killed at Fri Nov 28 18:59:28 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161730 >/dev/null 2>/dev/null selfserv_9351 with PID 2161730 found at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 with PID 2161730 started at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2161730 at Fri Nov 28 18:59:28 CST 2025 kill -USR1 2161730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161730 killed at Fri Nov 28 18:59:28 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161771 >/dev/null 2>/dev/null selfserv_9351 with PID 2161771 found at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 with PID 2161771 started at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #801: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2161771 at Fri Nov 28 18:59:28 CST 2025 kill -USR1 2161771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161771 killed at Fri Nov 28 18:59:28 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161812 >/dev/null 2>/dev/null selfserv_9351 with PID 2161812 found at Fri Nov 28 18:59:28 CST 2025 selfserv_9351 with PID 2161812 started at Fri Nov 28 18:59:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161812 at Fri Nov 28 18:59:28 CST 2025 kill -USR1 2161812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161812 killed at Fri Nov 28 18:59:29 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161857 >/dev/null 2>/dev/null selfserv_9351 with PID 2161857 found at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 with PID 2161857 started at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161857 at Fri Nov 28 18:59:29 CST 2025 kill -USR1 2161857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161857 killed at Fri Nov 28 18:59:29 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161898 >/dev/null 2>/dev/null selfserv_9351 with PID 2161898 found at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 with PID 2161898 started at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161898 at Fri Nov 28 18:59:29 CST 2025 kill -USR1 2161898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161898 killed at Fri Nov 28 18:59:29 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161939 >/dev/null 2>/dev/null selfserv_9351 with PID 2161939 found at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 with PID 2161939 started at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2161939 at Fri Nov 28 18:59:29 CST 2025 kill -USR1 2161939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161939 killed at Fri Nov 28 18:59:29 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2161986 >/dev/null 2>/dev/null selfserv_9351 with PID 2161986 found at Fri Nov 28 18:59:29 CST 2025 selfserv_9351 with PID 2161986 started at Fri Nov 28 18:59:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2161986 at Fri Nov 28 18:59:30 CST 2025 kill -USR1 2161986 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2161986 killed at Fri Nov 28 18:59:30 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162027 >/dev/null 2>/dev/null selfserv_9351 with PID 2162027 found at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 with PID 2162027 started at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #807: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162027 at Fri Nov 28 18:59:30 CST 2025 kill -USR1 2162027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162027 killed at Fri Nov 28 18:59:30 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162068 >/dev/null 2>/dev/null selfserv_9351 with PID 2162068 found at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 with PID 2162068 started at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162068 at Fri Nov 28 18:59:30 CST 2025 kill -USR1 2162068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162068 killed at Fri Nov 28 18:59:30 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162109 >/dev/null 2>/dev/null selfserv_9351 with PID 2162109 found at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 with PID 2162109 started at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162109 at Fri Nov 28 18:59:30 CST 2025 kill -USR1 2162109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162109 killed at Fri Nov 28 18:59:30 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162154 >/dev/null 2>/dev/null selfserv_9351 with PID 2162154 found at Fri Nov 28 18:59:30 CST 2025 selfserv_9351 with PID 2162154 started at Fri Nov 28 18:59:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162154 at Fri Nov 28 18:59:31 CST 2025 kill -USR1 2162154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162154 killed at Fri Nov 28 18:59:31 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162195 >/dev/null 2>/dev/null selfserv_9351 with PID 2162195 found at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 with PID 2162195 started at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #811: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162195 at Fri Nov 28 18:59:31 CST 2025 kill -USR1 2162195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162195 killed at Fri Nov 28 18:59:31 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162236 >/dev/null 2>/dev/null selfserv_9351 with PID 2162236 found at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 with PID 2162236 started at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162236 at Fri Nov 28 18:59:31 CST 2025 kill -USR1 2162236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162236 killed at Fri Nov 28 18:59:31 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162277 >/dev/null 2>/dev/null selfserv_9351 with PID 2162277 found at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 with PID 2162277 started at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162277 at Fri Nov 28 18:59:31 CST 2025 kill -USR1 2162277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162277 killed at Fri Nov 28 18:59:31 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162322 >/dev/null 2>/dev/null selfserv_9351 with PID 2162322 found at Fri Nov 28 18:59:31 CST 2025 selfserv_9351 with PID 2162322 started at Fri Nov 28 18:59:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162322 at Fri Nov 28 18:59:32 CST 2025 kill -USR1 2162322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162322 killed at Fri Nov 28 18:59:32 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162363 >/dev/null 2>/dev/null selfserv_9351 with PID 2162363 found at Fri Nov 28 18:59:32 CST 2025 selfserv_9351 with PID 2162363 started at Fri Nov 28 18:59:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162363 at Fri Nov 28 18:59:32 CST 2025 kill -USR1 2162363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162363 killed at Fri Nov 28 18:59:32 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162404 >/dev/null 2>/dev/null selfserv_9351 with PID 2162404 found at Fri Nov 28 18:59:32 CST 2025 selfserv_9351 with PID 2162404 started at Fri Nov 28 18:59:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162404 at Fri Nov 28 18:59:32 CST 2025 kill -USR1 2162404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162404 killed at Fri Nov 28 18:59:32 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162446 >/dev/null 2>/dev/null selfserv_9351 with PID 2162446 found at Fri Nov 28 18:59:32 CST 2025 selfserv_9351 with PID 2162446 started at Fri Nov 28 18:59:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #817: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162446 at Fri Nov 28 18:59:33 CST 2025 kill -USR1 2162446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162446 killed at Fri Nov 28 18:59:33 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162487 >/dev/null 2>/dev/null selfserv_9351 with PID 2162487 found at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 with PID 2162487 started at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162487 at Fri Nov 28 18:59:33 CST 2025 kill -USR1 2162487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162487 killed at Fri Nov 28 18:59:33 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162528 >/dev/null 2>/dev/null selfserv_9351 with PID 2162528 found at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 with PID 2162528 started at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #819: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162528 at Fri Nov 28 18:59:33 CST 2025 kill -USR1 2162528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162528 killed at Fri Nov 28 18:59:33 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162569 >/dev/null 2>/dev/null selfserv_9351 with PID 2162569 found at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 with PID 2162569 started at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162569 at Fri Nov 28 18:59:33 CST 2025 kill -USR1 2162569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162569 killed at Fri Nov 28 18:59:33 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162615 >/dev/null 2>/dev/null selfserv_9351 with PID 2162615 found at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 with PID 2162615 started at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162615 at Fri Nov 28 18:59:34 CST 2025 kill -USR1 2162615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162615 killed at Fri Nov 28 18:59:34 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162656 >/dev/null 2>/dev/null selfserv_9351 with PID 2162656 found at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 with PID 2162656 started at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162656 at Fri Nov 28 18:59:34 CST 2025 kill -USR1 2162656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162656 killed at Fri Nov 28 18:59:34 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162697 >/dev/null 2>/dev/null selfserv_9351 with PID 2162697 found at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 with PID 2162697 started at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162697 at Fri Nov 28 18:59:34 CST 2025 kill -USR1 2162697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162697 killed at Fri Nov 28 18:59:34 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162738 >/dev/null 2>/dev/null selfserv_9351 with PID 2162738 found at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 with PID 2162738 started at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #824: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162738 at Fri Nov 28 18:59:34 CST 2025 kill -USR1 2162738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162738 killed at Fri Nov 28 18:59:34 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162785 >/dev/null 2>/dev/null selfserv_9351 with PID 2162785 found at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 with PID 2162785 started at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162785 at Fri Nov 28 18:59:35 CST 2025 kill -USR1 2162785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162785 killed at Fri Nov 28 18:59:35 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162826 >/dev/null 2>/dev/null selfserv_9351 with PID 2162826 found at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 with PID 2162826 started at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162826 at Fri Nov 28 18:59:35 CST 2025 kill -USR1 2162826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162826 killed at Fri Nov 28 18:59:35 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162867 >/dev/null 2>/dev/null selfserv_9351 with PID 2162867 found at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 with PID 2162867 started at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162867 at Fri Nov 28 18:59:35 CST 2025 kill -USR1 2162867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162867 killed at Fri Nov 28 18:59:35 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162909 >/dev/null 2>/dev/null selfserv_9351 with PID 2162909 found at Fri Nov 28 18:59:35 CST 2025 selfserv_9351 with PID 2162909 started at Fri Nov 28 18:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162909 at Fri Nov 28 18:59:36 CST 2025 kill -USR1 2162909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162909 killed at Fri Nov 28 18:59:36 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162950 >/dev/null 2>/dev/null selfserv_9351 with PID 2162950 found at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 with PID 2162950 started at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #829: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2162950 at Fri Nov 28 18:59:36 CST 2025 kill -USR1 2162950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162950 killed at Fri Nov 28 18:59:36 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2162991 >/dev/null 2>/dev/null selfserv_9351 with PID 2162991 found at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 with PID 2162991 started at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2162991 at Fri Nov 28 18:59:36 CST 2025 kill -USR1 2162991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2162991 killed at Fri Nov 28 18:59:36 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163032 >/dev/null 2>/dev/null selfserv_9351 with PID 2163032 found at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 with PID 2163032 started at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163032 at Fri Nov 28 18:59:36 CST 2025 kill -USR1 2163032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163032 killed at Fri Nov 28 18:59:36 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163073 >/dev/null 2>/dev/null selfserv_9351 with PID 2163073 found at Fri Nov 28 18:59:36 CST 2025 selfserv_9351 with PID 2163073 started at Fri Nov 28 18:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163073 at Fri Nov 28 18:59:37 CST 2025 kill -USR1 2163073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163073 killed at Fri Nov 28 18:59:37 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163114 >/dev/null 2>/dev/null selfserv_9351 with PID 2163114 found at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 with PID 2163114 started at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2163114 at Fri Nov 28 18:59:37 CST 2025 kill -USR1 2163114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163114 killed at Fri Nov 28 18:59:37 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163155 >/dev/null 2>/dev/null selfserv_9351 with PID 2163155 found at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 with PID 2163155 started at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163155 at Fri Nov 28 18:59:37 CST 2025 kill -USR1 2163155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163155 killed at Fri Nov 28 18:59:37 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163196 >/dev/null 2>/dev/null selfserv_9351 with PID 2163196 found at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 with PID 2163196 started at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163196 at Fri Nov 28 18:59:37 CST 2025 kill -USR1 2163196 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163196 killed at Fri Nov 28 18:59:37 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163237 >/dev/null 2>/dev/null selfserv_9351 with PID 2163237 found at Fri Nov 28 18:59:37 CST 2025 selfserv_9351 with PID 2163237 started at Fri Nov 28 18:59:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163237 at Fri Nov 28 18:59:38 CST 2025 kill -USR1 2163237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163237 killed at Fri Nov 28 18:59:38 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163278 >/dev/null 2>/dev/null selfserv_9351 with PID 2163278 found at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 with PID 2163278 started at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2163278 at Fri Nov 28 18:59:38 CST 2025 kill -USR1 2163278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163278 killed at Fri Nov 28 18:59:38 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163319 >/dev/null 2>/dev/null selfserv_9351 with PID 2163319 found at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 with PID 2163319 started at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163319 at Fri Nov 28 18:59:38 CST 2025 kill -USR1 2163319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163319 killed at Fri Nov 28 18:59:38 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163360 >/dev/null 2>/dev/null selfserv_9351 with PID 2163360 found at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 with PID 2163360 started at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163360 at Fri Nov 28 18:59:38 CST 2025 kill -USR1 2163360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163360 killed at Fri Nov 28 18:59:38 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163401 >/dev/null 2>/dev/null selfserv_9351 with PID 2163401 found at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 with PID 2163401 started at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163401 at Fri Nov 28 18:59:38 CST 2025 kill -USR1 2163401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163401 killed at Fri Nov 28 18:59:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163446 >/dev/null 2>/dev/null selfserv_9351 with PID 2163446 found at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 with PID 2163446 started at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2163446 at Fri Nov 28 18:59:39 CST 2025 kill -USR1 2163446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163446 killed at Fri Nov 28 18:59:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163487 >/dev/null 2>/dev/null selfserv_9351 with PID 2163487 found at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 with PID 2163487 started at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163487 at Fri Nov 28 18:59:39 CST 2025 kill -USR1 2163487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163487 killed at Fri Nov 28 18:59:39 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163528 >/dev/null 2>/dev/null selfserv_9351 with PID 2163528 found at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 with PID 2163528 started at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163528 at Fri Nov 28 18:59:39 CST 2025 kill -USR1 2163528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163528 killed at Fri Nov 28 18:59:39 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163569 >/dev/null 2>/dev/null selfserv_9351 with PID 2163569 found at Fri Nov 28 18:59:39 CST 2025 selfserv_9351 with PID 2163569 started at Fri Nov 28 18:59:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #844: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163569 at Fri Nov 28 18:59:40 CST 2025 kill -USR1 2163569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163569 killed at Fri Nov 28 18:59:40 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163616 >/dev/null 2>/dev/null selfserv_9351 with PID 2163616 found at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 with PID 2163616 started at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2163616 at Fri Nov 28 18:59:40 CST 2025 kill -USR1 2163616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163616 killed at Fri Nov 28 18:59:40 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163657 >/dev/null 2>/dev/null selfserv_9351 with PID 2163657 found at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 with PID 2163657 started at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163657 at Fri Nov 28 18:59:40 CST 2025 kill -USR1 2163657 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163657 killed at Fri Nov 28 18:59:40 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163698 >/dev/null 2>/dev/null selfserv_9351 with PID 2163698 found at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 with PID 2163698 started at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163698 at Fri Nov 28 18:59:40 CST 2025 kill -USR1 2163698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163698 killed at Fri Nov 28 18:59:40 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163743 >/dev/null 2>/dev/null selfserv_9351 with PID 2163743 found at Fri Nov 28 18:59:40 CST 2025 selfserv_9351 with PID 2163743 started at Fri Nov 28 18:59:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163743 at Fri Nov 28 18:59:41 CST 2025 kill -USR1 2163743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163743 killed at Fri Nov 28 18:59:41 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163790 >/dev/null 2>/dev/null selfserv_9351 with PID 2163790 found at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 with PID 2163790 started at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163790 at Fri Nov 28 18:59:41 CST 2025 kill -USR1 2163790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163790 killed at Fri Nov 28 18:59:41 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163837 >/dev/null 2>/dev/null selfserv_9351 with PID 2163837 found at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 with PID 2163837 started at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #850: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163837 at Fri Nov 28 18:59:41 CST 2025 kill -USR1 2163837 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163837 killed at Fri Nov 28 18:59:41 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163888 >/dev/null 2>/dev/null selfserv_9351 with PID 2163888 found at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 with PID 2163888 started at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2163888 at Fri Nov 28 18:59:41 CST 2025 kill -USR1 2163888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163888 killed at Fri Nov 28 18:59:41 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 18:59:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163935 >/dev/null 2>/dev/null selfserv_9351 with PID 2163935 found at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 with PID 2163935 started at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #852: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2163935 at Fri Nov 28 18:59:42 CST 2025 kill -USR1 2163935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163935 killed at Fri Nov 28 18:59:42 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2163982 >/dev/null 2>/dev/null selfserv_9351 with PID 2163982 found at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 with PID 2163982 started at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #853: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2163982 at Fri Nov 28 18:59:42 CST 2025 kill -USR1 2163982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2163982 killed at Fri Nov 28 18:59:42 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164029 >/dev/null 2>/dev/null selfserv_9351 with PID 2164029 found at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 with PID 2164029 started at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164029 at Fri Nov 28 18:59:42 CST 2025 kill -USR1 2164029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164029 killed at Fri Nov 28 18:59:42 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164077 >/dev/null 2>/dev/null selfserv_9351 with PID 2164077 found at Fri Nov 28 18:59:42 CST 2025 selfserv_9351 with PID 2164077 started at Fri Nov 28 18:59:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #855: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164077 at Fri Nov 28 18:59:43 CST 2025 kill -USR1 2164077 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164077 killed at Fri Nov 28 18:59:43 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164124 >/dev/null 2>/dev/null selfserv_9351 with PID 2164124 found at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 with PID 2164124 started at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #856: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2164124 at Fri Nov 28 18:59:43 CST 2025 kill -USR1 2164124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164124 killed at Fri Nov 28 18:59:43 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164171 >/dev/null 2>/dev/null selfserv_9351 with PID 2164171 found at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 with PID 2164171 started at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #857: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2164171 at Fri Nov 28 18:59:43 CST 2025 kill -USR1 2164171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164171 killed at Fri Nov 28 18:59:43 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164218 >/dev/null 2>/dev/null selfserv_9351 with PID 2164218 found at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 with PID 2164218 started at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #858: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2164218 at Fri Nov 28 18:59:43 CST 2025 kill -USR1 2164218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164218 killed at Fri Nov 28 18:59:43 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164249 >/dev/null 2>/dev/null selfserv_9351 with PID 2164249 found at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 with PID 2164249 started at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164249 at Fri Nov 28 18:59:43 CST 2025 kill -USR1 2164249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164249 killed at Fri Nov 28 18:59:43 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 18:59:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164285 >/dev/null 2>/dev/null selfserv_9351 with PID 2164285 found at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 with PID 2164285 started at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2164285 at Fri Nov 28 18:59:44 CST 2025 kill -USR1 2164285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164285 killed at Fri Nov 28 18:59:44 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164316 >/dev/null 2>/dev/null selfserv_9351 with PID 2164316 found at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 with PID 2164316 started at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2164316 at Fri Nov 28 18:59:44 CST 2025 kill -USR1 2164316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164316 killed at Fri Nov 28 18:59:44 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164347 >/dev/null 2>/dev/null selfserv_9351 with PID 2164347 found at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 with PID 2164347 started at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2164347 at Fri Nov 28 18:59:44 CST 2025 kill -USR1 2164347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164347 killed at Fri Nov 28 18:59:44 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164378 >/dev/null 2>/dev/null selfserv_9351 with PID 2164378 found at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 with PID 2164378 started at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2164378 at Fri Nov 28 18:59:44 CST 2025 kill -USR1 2164378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164378 killed at Fri Nov 28 18:59:44 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164415 >/dev/null 2>/dev/null selfserv_9351 with PID 2164415 found at Fri Nov 28 18:59:44 CST 2025 selfserv_9351 with PID 2164415 started at Fri Nov 28 18:59:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #796: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2164415 at Fri Nov 28 18:59:45 CST 2025 kill -USR1 2164415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164415 killed at Fri Nov 28 18:59:45 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 18:59:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164446 >/dev/null 2>/dev/null selfserv_9351 with PID 2164446 found at Fri Nov 28 18:59:45 CST 2025 selfserv_9351 with PID 2164446 started at Fri Nov 28 18:59:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #797: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2164446 at Fri Nov 28 18:59:45 CST 2025 kill -USR1 2164446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164446 killed at Fri Nov 28 18:59:45 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 18:59:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164477 >/dev/null 2>/dev/null selfserv_9351 with PID 2164477 found at Fri Nov 28 18:59:45 CST 2025 selfserv_9351 with PID 2164477 started at Fri Nov 28 18:59:45 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 18:59:45 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 18:59:46 CST 2025 ssl.sh: #798: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2164477 at Fri Nov 28 18:59:46 CST 2025 kill -USR1 2164477 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164477 killed at Fri Nov 28 18:59:46 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164516 >/dev/null 2>/dev/null selfserv_9351 with PID 2164516 found at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 with PID 2164516 started at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164516 at Fri Nov 28 18:59:46 CST 2025 kill -USR1 2164516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164516 killed at Fri Nov 28 18:59:46 CST 2025 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164547 >/dev/null 2>/dev/null selfserv_9351 with PID 2164547 found at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 with PID 2164547 started at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164547 at Fri Nov 28 18:59:46 CST 2025 kill -USR1 2164547 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164547 killed at Fri Nov 28 18:59:46 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164575 >/dev/null 2>/dev/null selfserv_9351 with PID 2164575 found at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 with PID 2164575 started at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2164575 at Fri Nov 28 18:59:46 CST 2025 kill -USR1 2164575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164575 killed at Fri Nov 28 18:59:46 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164603 >/dev/null 2>/dev/null selfserv_9351 with PID 2164603 found at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 with PID 2164603 started at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164603 at Fri Nov 28 18:59:47 CST 2025 kill -USR1 2164603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164603 killed at Fri Nov 28 18:59:47 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164631 >/dev/null 2>/dev/null selfserv_9351 with PID 2164631 found at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 with PID 2164631 started at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2164631 at Fri Nov 28 18:59:47 CST 2025 kill -USR1 2164631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164631 killed at Fri Nov 28 18:59:47 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164659 >/dev/null 2>/dev/null selfserv_9351 with PID 2164659 found at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 with PID 2164659 started at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164659 at Fri Nov 28 18:59:47 CST 2025 kill -USR1 2164659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164659 killed at Fri Nov 28 18:59:47 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164687 >/dev/null 2>/dev/null selfserv_9351 with PID 2164687 found at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 with PID 2164687 started at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164687 at Fri Nov 28 18:59:47 CST 2025 kill -USR1 2164687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164687 killed at Fri Nov 28 18:59:47 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164715 >/dev/null 2>/dev/null selfserv_9351 with PID 2164715 found at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 with PID 2164715 started at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164715 at Fri Nov 28 18:59:47 CST 2025 kill -USR1 2164715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164715 killed at Fri Nov 28 18:59:47 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164743 >/dev/null 2>/dev/null selfserv_9351 with PID 2164743 found at Fri Nov 28 18:59:47 CST 2025 selfserv_9351 with PID 2164743 started at Fri Nov 28 18:59:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164743 at Fri Nov 28 18:59:48 CST 2025 kill -USR1 2164743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164743 killed at Fri Nov 28 18:59:48 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164771 >/dev/null 2>/dev/null selfserv_9351 with PID 2164771 found at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 with PID 2164771 started at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164771 at Fri Nov 28 18:59:48 CST 2025 kill -USR1 2164771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164771 killed at Fri Nov 28 18:59:48 CST 2025 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164799 >/dev/null 2>/dev/null selfserv_9351 with PID 2164799 found at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 with PID 2164799 started at Fri Nov 28 18:59:48 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164799 at Fri Nov 28 18:59:48 CST 2025 kill -USR1 2164799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164799 killed at Fri Nov 28 18:59:48 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164828 >/dev/null 2>/dev/null selfserv_9351 with PID 2164828 found at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 with PID 2164828 started at Fri Nov 28 18:59:48 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2164828 at Fri Nov 28 18:59:48 CST 2025 kill -USR1 2164828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164828 killed at Fri Nov 28 18:59:48 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164857 >/dev/null 2>/dev/null selfserv_9351 with PID 2164857 found at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 with PID 2164857 started at Fri Nov 28 18:59:48 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164857 at Fri Nov 28 18:59:48 CST 2025 kill -USR1 2164857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164857 killed at Fri Nov 28 18:59:48 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164890 >/dev/null 2>/dev/null selfserv_9351 with PID 2164890 found at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 with PID 2164890 started at Fri Nov 28 18:59:48 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2164890 at Fri Nov 28 18:59:48 CST 2025 kill -USR1 2164890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164890 killed at Fri Nov 28 18:59:48 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164919 >/dev/null 2>/dev/null selfserv_9351 with PID 2164919 found at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 with PID 2164919 started at Fri Nov 28 18:59:49 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164919 at Fri Nov 28 18:59:49 CST 2025 kill -USR1 2164919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164919 killed at Fri Nov 28 18:59:49 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164948 >/dev/null 2>/dev/null selfserv_9351 with PID 2164948 found at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 with PID 2164948 started at Fri Nov 28 18:59:49 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164948 at Fri Nov 28 18:59:49 CST 2025 kill -USR1 2164948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164948 killed at Fri Nov 28 18:59:49 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2164977 >/dev/null 2>/dev/null selfserv_9351 with PID 2164977 found at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 with PID 2164977 started at Fri Nov 28 18:59:49 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2164977 at Fri Nov 28 18:59:49 CST 2025 kill -USR1 2164977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2164977 killed at Fri Nov 28 18:59:49 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2165006 >/dev/null 2>/dev/null selfserv_9351 with PID 2165006 found at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 with PID 2165006 started at Fri Nov 28 18:59:49 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2165006 at Fri Nov 28 18:59:49 CST 2025 kill -USR1 2165006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2165006 killed at Fri Nov 28 18:59:49 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2165035 >/dev/null 2>/dev/null selfserv_9351 with PID 2165035 found at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 with PID 2165035 started at Fri Nov 28 18:59:49 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #817: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2165035 at Fri Nov 28 18:59:49 CST 2025 kill -USR1 2165035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2165035 killed at Fri Nov 28 18:59:49 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2165070 >/dev/null 2>/dev/null selfserv_9351 with PID 2165070 found at Fri Nov 28 18:59:49 CST 2025 selfserv_9351 with PID 2165070 started at Fri Nov 28 18:59:49 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2165070 at Fri Nov 28 18:59:53 CST 2025 kill -USR1 2165070 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2165070 killed at Fri Nov 28 18:59:53 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 18:59:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2165572 >/dev/null 2>/dev/null selfserv_9351 with PID 2165572 found at Fri Nov 28 18:59:54 CST 2025 selfserv_9351 with PID 2165572 started at Fri Nov 28 18:59:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #944: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2165572 at Fri Nov 28 18:59:59 CST 2025 kill -USR1 2165572 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2165572 killed at Fri Nov 28 18:59:59 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 18:59:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 18:59:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166325 >/dev/null 2>/dev/null selfserv_9351 with PID 2166325 found at Fri Nov 28 19:00:00 CST 2025 selfserv_9351 with PID 2166325 started at Fri Nov 28 19:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166325 at Fri Nov 28 19:00:00 CST 2025 kill -USR1 2166325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166325 killed at Fri Nov 28 19:00:00 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:00 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166366 >/dev/null 2>/dev/null selfserv_9351 with PID 2166366 found at Fri Nov 28 19:00:00 CST 2025 selfserv_9351 with PID 2166366 started at Fri Nov 28 19:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166366 at Fri Nov 28 19:00:00 CST 2025 kill -USR1 2166366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166366 killed at Fri Nov 28 19:00:00 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:00 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166407 >/dev/null 2>/dev/null selfserv_9351 with PID 2166407 found at Fri Nov 28 19:00:00 CST 2025 selfserv_9351 with PID 2166407 started at Fri Nov 28 19:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166407 at Fri Nov 28 19:00:01 CST 2025 kill -USR1 2166407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166407 killed at Fri Nov 28 19:00:01 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166452 >/dev/null 2>/dev/null selfserv_9351 with PID 2166452 found at Fri Nov 28 19:00:01 CST 2025 selfserv_9351 with PID 2166452 started at Fri Nov 28 19:00:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2166452 at Fri Nov 28 19:00:01 CST 2025 kill -USR1 2166452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166452 killed at Fri Nov 28 19:00:01 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166516 >/dev/null 2>/dev/null selfserv_9351 with PID 2166516 found at Fri Nov 28 19:00:01 CST 2025 selfserv_9351 with PID 2166516 started at Fri Nov 28 19:00:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #949: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2166516 at Fri Nov 28 19:00:01 CST 2025 kill -USR1 2166516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166516 killed at Fri Nov 28 19:00:01 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166607 >/dev/null 2>/dev/null selfserv_9351 with PID 2166607 found at Fri Nov 28 19:00:01 CST 2025 selfserv_9351 with PID 2166607 started at Fri Nov 28 19:00:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166607 at Fri Nov 28 19:00:02 CST 2025 kill -USR1 2166607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166607 killed at Fri Nov 28 19:00:02 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166648 >/dev/null 2>/dev/null selfserv_9351 with PID 2166648 found at Fri Nov 28 19:00:02 CST 2025 selfserv_9351 with PID 2166648 started at Fri Nov 28 19:00:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166648 at Fri Nov 28 19:00:02 CST 2025 kill -USR1 2166648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166648 killed at Fri Nov 28 19:00:02 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166689 >/dev/null 2>/dev/null selfserv_9351 with PID 2166689 found at Fri Nov 28 19:00:02 CST 2025 selfserv_9351 with PID 2166689 started at Fri Nov 28 19:00:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166689 at Fri Nov 28 19:00:02 CST 2025 kill -USR1 2166689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166689 killed at Fri Nov 28 19:00:02 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166732 >/dev/null 2>/dev/null selfserv_9351 with PID 2166732 found at Fri Nov 28 19:00:03 CST 2025 selfserv_9351 with PID 2166732 started at Fri Nov 28 19:00:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166732 at Fri Nov 28 19:00:03 CST 2025 kill -USR1 2166732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166732 killed at Fri Nov 28 19:00:03 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166773 >/dev/null 2>/dev/null selfserv_9351 with PID 2166773 found at Fri Nov 28 19:00:03 CST 2025 selfserv_9351 with PID 2166773 started at Fri Nov 28 19:00:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2166773 at Fri Nov 28 19:00:03 CST 2025 kill -USR1 2166773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166773 killed at Fri Nov 28 19:00:03 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166819 >/dev/null 2>/dev/null selfserv_9351 with PID 2166819 found at Fri Nov 28 19:00:03 CST 2025 selfserv_9351 with PID 2166819 started at Fri Nov 28 19:00:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #955: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2166819 at Fri Nov 28 19:00:04 CST 2025 kill -USR1 2166819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166819 killed at Fri Nov 28 19:00:04 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166860 >/dev/null 2>/dev/null selfserv_9351 with PID 2166860 found at Fri Nov 28 19:00:04 CST 2025 selfserv_9351 with PID 2166860 started at Fri Nov 28 19:00:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166860 at Fri Nov 28 19:00:04 CST 2025 kill -USR1 2166860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166860 killed at Fri Nov 28 19:00:04 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166901 >/dev/null 2>/dev/null selfserv_9351 with PID 2166901 found at Fri Nov 28 19:00:04 CST 2025 selfserv_9351 with PID 2166901 started at Fri Nov 28 19:00:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166901 at Fri Nov 28 19:00:04 CST 2025 kill -USR1 2166901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166901 killed at Fri Nov 28 19:00:04 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166948 >/dev/null 2>/dev/null selfserv_9351 with PID 2166948 found at Fri Nov 28 19:00:05 CST 2025 selfserv_9351 with PID 2166948 started at Fri Nov 28 19:00:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166948 at Fri Nov 28 19:00:05 CST 2025 kill -USR1 2166948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166948 killed at Fri Nov 28 19:00:05 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2166989 >/dev/null 2>/dev/null selfserv_9351 with PID 2166989 found at Fri Nov 28 19:00:05 CST 2025 selfserv_9351 with PID 2166989 started at Fri Nov 28 19:00:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2166989 at Fri Nov 28 19:00:05 CST 2025 kill -USR1 2166989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2166989 killed at Fri Nov 28 19:00:05 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167030 >/dev/null 2>/dev/null selfserv_9351 with PID 2167030 found at Fri Nov 28 19:00:05 CST 2025 selfserv_9351 with PID 2167030 started at Fri Nov 28 19:00:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167030 at Fri Nov 28 19:00:06 CST 2025 kill -USR1 2167030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167030 killed at Fri Nov 28 19:00:06 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167072 >/dev/null 2>/dev/null selfserv_9351 with PID 2167072 found at Fri Nov 28 19:00:06 CST 2025 selfserv_9351 with PID 2167072 started at Fri Nov 28 19:00:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #961: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167072 at Fri Nov 28 19:00:06 CST 2025 kill -USR1 2167072 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167072 killed at Fri Nov 28 19:00:06 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167113 >/dev/null 2>/dev/null selfserv_9351 with PID 2167113 found at Fri Nov 28 19:00:06 CST 2025 selfserv_9351 with PID 2167113 started at Fri Nov 28 19:00:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167113 at Fri Nov 28 19:00:06 CST 2025 kill -USR1 2167113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167113 killed at Fri Nov 28 19:00:06 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167154 >/dev/null 2>/dev/null selfserv_9351 with PID 2167154 found at Fri Nov 28 19:00:06 CST 2025 selfserv_9351 with PID 2167154 started at Fri Nov 28 19:00:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167154 at Fri Nov 28 19:00:07 CST 2025 kill -USR1 2167154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167154 killed at Fri Nov 28 19:00:07 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167195 >/dev/null 2>/dev/null selfserv_9351 with PID 2167195 found at Fri Nov 28 19:00:07 CST 2025 selfserv_9351 with PID 2167195 started at Fri Nov 28 19:00:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167195 at Fri Nov 28 19:00:07 CST 2025 kill -USR1 2167195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167195 killed at Fri Nov 28 19:00:07 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167236 >/dev/null 2>/dev/null selfserv_9351 with PID 2167236 found at Fri Nov 28 19:00:07 CST 2025 selfserv_9351 with PID 2167236 started at Fri Nov 28 19:00:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #965: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167236 at Fri Nov 28 19:00:08 CST 2025 kill -USR1 2167236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167236 killed at Fri Nov 28 19:00:08 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:08 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167278 >/dev/null 2>/dev/null selfserv_9351 with PID 2167278 found at Fri Nov 28 19:00:08 CST 2025 selfserv_9351 with PID 2167278 started at Fri Nov 28 19:00:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167278 at Fri Nov 28 19:00:08 CST 2025 kill -USR1 2167278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167278 killed at Fri Nov 28 19:00:08 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:08 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167319 >/dev/null 2>/dev/null selfserv_9351 with PID 2167319 found at Fri Nov 28 19:00:08 CST 2025 selfserv_9351 with PID 2167319 started at Fri Nov 28 19:00:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167319 at Fri Nov 28 19:00:08 CST 2025 kill -USR1 2167319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167319 killed at Fri Nov 28 19:00:08 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:08 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167362 >/dev/null 2>/dev/null selfserv_9351 with PID 2167362 found at Fri Nov 28 19:00:08 CST 2025 selfserv_9351 with PID 2167362 started at Fri Nov 28 19:00:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167362 at Fri Nov 28 19:00:09 CST 2025 kill -USR1 2167362 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167362 killed at Fri Nov 28 19:00:09 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167406 >/dev/null 2>/dev/null selfserv_9351 with PID 2167406 found at Fri Nov 28 19:00:09 CST 2025 selfserv_9351 with PID 2167406 started at Fri Nov 28 19:00:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167406 at Fri Nov 28 19:00:09 CST 2025 kill -USR1 2167406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167406 killed at Fri Nov 28 19:00:09 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167447 >/dev/null 2>/dev/null selfserv_9351 with PID 2167447 found at Fri Nov 28 19:00:09 CST 2025 selfserv_9351 with PID 2167447 started at Fri Nov 28 19:00:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167447 at Fri Nov 28 19:00:09 CST 2025 kill -USR1 2167447 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167447 killed at Fri Nov 28 19:00:09 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167494 >/dev/null 2>/dev/null selfserv_9351 with PID 2167494 found at Fri Nov 28 19:00:10 CST 2025 selfserv_9351 with PID 2167494 started at Fri Nov 28 19:00:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167494 at Fri Nov 28 19:00:10 CST 2025 kill -USR1 2167494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167494 killed at Fri Nov 28 19:00:10 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167535 >/dev/null 2>/dev/null selfserv_9351 with PID 2167535 found at Fri Nov 28 19:00:10 CST 2025 selfserv_9351 with PID 2167535 started at Fri Nov 28 19:00:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167535 at Fri Nov 28 19:00:10 CST 2025 kill -USR1 2167535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167535 killed at Fri Nov 28 19:00:10 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167580 >/dev/null 2>/dev/null selfserv_9351 with PID 2167580 found at Fri Nov 28 19:00:10 CST 2025 selfserv_9351 with PID 2167580 started at Fri Nov 28 19:00:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #973: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167580 at Fri Nov 28 19:00:11 CST 2025 kill -USR1 2167580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167580 killed at Fri Nov 28 19:00:11 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167621 >/dev/null 2>/dev/null selfserv_9351 with PID 2167621 found at Fri Nov 28 19:00:11 CST 2025 selfserv_9351 with PID 2167621 started at Fri Nov 28 19:00:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167621 at Fri Nov 28 19:00:11 CST 2025 kill -USR1 2167621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167621 killed at Fri Nov 28 19:00:11 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167662 >/dev/null 2>/dev/null selfserv_9351 with PID 2167662 found at Fri Nov 28 19:00:11 CST 2025 selfserv_9351 with PID 2167662 started at Fri Nov 28 19:00:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167662 at Fri Nov 28 19:00:12 CST 2025 kill -USR1 2167662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167662 killed at Fri Nov 28 19:00:12 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167707 >/dev/null 2>/dev/null selfserv_9351 with PID 2167707 found at Fri Nov 28 19:00:12 CST 2025 selfserv_9351 with PID 2167707 started at Fri Nov 28 19:00:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167707 at Fri Nov 28 19:00:12 CST 2025 kill -USR1 2167707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167707 killed at Fri Nov 28 19:00:12 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167748 >/dev/null 2>/dev/null selfserv_9351 with PID 2167748 found at Fri Nov 28 19:00:12 CST 2025 selfserv_9351 with PID 2167748 started at Fri Nov 28 19:00:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167748 at Fri Nov 28 19:00:12 CST 2025 kill -USR1 2167748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167748 killed at Fri Nov 28 19:00:12 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167790 >/dev/null 2>/dev/null selfserv_9351 with PID 2167790 found at Fri Nov 28 19:00:12 CST 2025 selfserv_9351 with PID 2167790 started at Fri Nov 28 19:00:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #978: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2167790 at Fri Nov 28 19:00:13 CST 2025 kill -USR1 2167790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167790 killed at Fri Nov 28 19:00:13 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167831 >/dev/null 2>/dev/null selfserv_9351 with PID 2167831 found at Fri Nov 28 19:00:13 CST 2025 selfserv_9351 with PID 2167831 started at Fri Nov 28 19:00:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167831 at Fri Nov 28 19:00:13 CST 2025 kill -USR1 2167831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167831 killed at Fri Nov 28 19:00:13 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167872 >/dev/null 2>/dev/null selfserv_9351 with PID 2167872 found at Fri Nov 28 19:00:13 CST 2025 selfserv_9351 with PID 2167872 started at Fri Nov 28 19:00:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167872 at Fri Nov 28 19:00:14 CST 2025 kill -USR1 2167872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167872 killed at Fri Nov 28 19:00:14 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167918 >/dev/null 2>/dev/null selfserv_9351 with PID 2167918 found at Fri Nov 28 19:00:14 CST 2025 selfserv_9351 with PID 2167918 started at Fri Nov 28 19:00:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167918 at Fri Nov 28 19:00:14 CST 2025 kill -USR1 2167918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167918 killed at Fri Nov 28 19:00:14 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2167959 >/dev/null 2>/dev/null selfserv_9351 with PID 2167959 found at Fri Nov 28 19:00:14 CST 2025 selfserv_9351 with PID 2167959 started at Fri Nov 28 19:00:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2167959 at Fri Nov 28 19:00:14 CST 2025 kill -USR1 2167959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2167959 killed at Fri Nov 28 19:00:14 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168006 >/dev/null 2>/dev/null selfserv_9351 with PID 2168006 found at Fri Nov 28 19:00:14 CST 2025 selfserv_9351 with PID 2168006 started at Fri Nov 28 19:00:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #983: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2168006 at Fri Nov 28 19:00:15 CST 2025 kill -USR1 2168006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168006 killed at Fri Nov 28 19:00:15 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168047 >/dev/null 2>/dev/null selfserv_9351 with PID 2168047 found at Fri Nov 28 19:00:15 CST 2025 selfserv_9351 with PID 2168047 started at Fri Nov 28 19:00:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168047 at Fri Nov 28 19:00:15 CST 2025 kill -USR1 2168047 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168047 killed at Fri Nov 28 19:00:15 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168088 >/dev/null 2>/dev/null selfserv_9351 with PID 2168088 found at Fri Nov 28 19:00:15 CST 2025 selfserv_9351 with PID 2168088 started at Fri Nov 28 19:00:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168088 at Fri Nov 28 19:00:15 CST 2025 kill -USR1 2168088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168088 killed at Fri Nov 28 19:00:15 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168131 >/dev/null 2>/dev/null selfserv_9351 with PID 2168131 found at Fri Nov 28 19:00:16 CST 2025 selfserv_9351 with PID 2168131 started at Fri Nov 28 19:00:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168131 at Fri Nov 28 19:00:16 CST 2025 kill -USR1 2168131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168131 killed at Fri Nov 28 19:00:16 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168172 >/dev/null 2>/dev/null selfserv_9351 with PID 2168172 found at Fri Nov 28 19:00:16 CST 2025 selfserv_9351 with PID 2168172 started at Fri Nov 28 19:00:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #987: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2168172 at Fri Nov 28 19:00:16 CST 2025 kill -USR1 2168172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168172 killed at Fri Nov 28 19:00:16 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168214 >/dev/null 2>/dev/null selfserv_9351 with PID 2168214 found at Fri Nov 28 19:00:16 CST 2025 selfserv_9351 with PID 2168214 started at Fri Nov 28 19:00:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168214 at Fri Nov 28 19:00:17 CST 2025 kill -USR1 2168214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168214 killed at Fri Nov 28 19:00:17 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168255 >/dev/null 2>/dev/null selfserv_9351 with PID 2168255 found at Fri Nov 28 19:00:17 CST 2025 selfserv_9351 with PID 2168255 started at Fri Nov 28 19:00:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168255 at Fri Nov 28 19:00:17 CST 2025 kill -USR1 2168255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168255 killed at Fri Nov 28 19:00:17 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168296 >/dev/null 2>/dev/null selfserv_9351 with PID 2168296 found at Fri Nov 28 19:00:17 CST 2025 selfserv_9351 with PID 2168296 started at Fri Nov 28 19:00:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168296 at Fri Nov 28 19:00:17 CST 2025 kill -USR1 2168296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168296 killed at Fri Nov 28 19:00:17 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168338 >/dev/null 2>/dev/null selfserv_9351 with PID 2168338 found at Fri Nov 28 19:00:18 CST 2025 selfserv_9351 with PID 2168338 started at Fri Nov 28 19:00:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2168338 at Fri Nov 28 19:00:18 CST 2025 kill -USR1 2168338 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168338 killed at Fri Nov 28 19:00:18 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168379 >/dev/null 2>/dev/null selfserv_9351 with PID 2168379 found at Fri Nov 28 19:00:18 CST 2025 selfserv_9351 with PID 2168379 started at Fri Nov 28 19:00:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168379 at Fri Nov 28 19:00:18 CST 2025 kill -USR1 2168379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168379 killed at Fri Nov 28 19:00:18 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168424 >/dev/null 2>/dev/null selfserv_9351 with PID 2168424 found at Fri Nov 28 19:00:18 CST 2025 selfserv_9351 with PID 2168424 started at Fri Nov 28 19:00:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168424 at Fri Nov 28 19:00:19 CST 2025 kill -USR1 2168424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168424 killed at Fri Nov 28 19:00:19 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168466 >/dev/null 2>/dev/null selfserv_9351 with PID 2168466 found at Fri Nov 28 19:00:19 CST 2025 selfserv_9351 with PID 2168466 started at Fri Nov 28 19:00:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168466 at Fri Nov 28 19:00:19 CST 2025 kill -USR1 2168466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168466 killed at Fri Nov 28 19:00:19 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168507 >/dev/null 2>/dev/null selfserv_9351 with PID 2168507 found at Fri Nov 28 19:00:19 CST 2025 selfserv_9351 with PID 2168507 started at Fri Nov 28 19:00:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2168507 at Fri Nov 28 19:00:19 CST 2025 kill -USR1 2168507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168507 killed at Fri Nov 28 19:00:19 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168554 >/dev/null 2>/dev/null selfserv_9351 with PID 2168554 found at Fri Nov 28 19:00:19 CST 2025 selfserv_9351 with PID 2168554 started at Fri Nov 28 19:00:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168554 at Fri Nov 28 19:00:20 CST 2025 kill -USR1 2168554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168554 killed at Fri Nov 28 19:00:20 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168595 >/dev/null 2>/dev/null selfserv_9351 with PID 2168595 found at Fri Nov 28 19:00:20 CST 2025 selfserv_9351 with PID 2168595 started at Fri Nov 28 19:00:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168595 at Fri Nov 28 19:00:20 CST 2025 kill -USR1 2168595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168595 killed at Fri Nov 28 19:00:20 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168636 >/dev/null 2>/dev/null selfserv_9351 with PID 2168636 found at Fri Nov 28 19:00:20 CST 2025 selfserv_9351 with PID 2168636 started at Fri Nov 28 19:00:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168636 at Fri Nov 28 19:00:21 CST 2025 kill -USR1 2168636 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168636 killed at Fri Nov 28 19:00:21 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168682 >/dev/null 2>/dev/null selfserv_9351 with PID 2168682 found at Fri Nov 28 19:00:21 CST 2025 selfserv_9351 with PID 2168682 started at Fri Nov 28 19:00:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2168682 at Fri Nov 28 19:00:21 CST 2025 kill -USR1 2168682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168682 killed at Fri Nov 28 19:00:21 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168723 >/dev/null 2>/dev/null selfserv_9351 with PID 2168723 found at Fri Nov 28 19:00:21 CST 2025 selfserv_9351 with PID 2168723 started at Fri Nov 28 19:00:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168723 at Fri Nov 28 19:00:21 CST 2025 kill -USR1 2168723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168723 killed at Fri Nov 28 19:00:21 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168771 >/dev/null 2>/dev/null selfserv_9351 with PID 2168771 found at Fri Nov 28 19:00:22 CST 2025 selfserv_9351 with PID 2168771 started at Fri Nov 28 19:00:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168771 at Fri Nov 28 19:00:22 CST 2025 kill -USR1 2168771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168771 killed at Fri Nov 28 19:00:22 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168812 >/dev/null 2>/dev/null selfserv_9351 with PID 2168812 found at Fri Nov 28 19:00:22 CST 2025 selfserv_9351 with PID 2168812 started at Fri Nov 28 19:00:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1002: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168812 at Fri Nov 28 19:00:22 CST 2025 kill -USR1 2168812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168812 killed at Fri Nov 28 19:00:22 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:00:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168902 >/dev/null 2>/dev/null selfserv_9351 with PID 2168902 found at Fri Nov 28 19:00:22 CST 2025 selfserv_9351 with PID 2168902 started at Fri Nov 28 19:00:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168902 at Fri Nov 28 19:00:23 CST 2025 kill -USR1 2168902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168902 killed at Fri Nov 28 19:00:23 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168933 >/dev/null 2>/dev/null selfserv_9351 with PID 2168933 found at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 with PID 2168933 started at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168933 at Fri Nov 28 19:00:23 CST 2025 kill -USR1 2168933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168933 killed at Fri Nov 28 19:00:23 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168961 >/dev/null 2>/dev/null selfserv_9351 with PID 2168961 found at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 with PID 2168961 started at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2168961 at Fri Nov 28 19:00:23 CST 2025 kill -USR1 2168961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168961 killed at Fri Nov 28 19:00:23 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2168989 >/dev/null 2>/dev/null selfserv_9351 with PID 2168989 found at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 with PID 2168989 started at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2168989 at Fri Nov 28 19:00:23 CST 2025 kill -USR1 2168989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2168989 killed at Fri Nov 28 19:00:23 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169017 >/dev/null 2>/dev/null selfserv_9351 with PID 2169017 found at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 with PID 2169017 started at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2169017 at Fri Nov 28 19:00:23 CST 2025 kill -USR1 2169017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169017 killed at Fri Nov 28 19:00:23 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169051 >/dev/null 2>/dev/null selfserv_9351 with PID 2169051 found at Fri Nov 28 19:00:23 CST 2025 selfserv_9351 with PID 2169051 started at Fri Nov 28 19:00:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169051 at Fri Nov 28 19:00:24 CST 2025 kill -USR1 2169051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169051 killed at Fri Nov 28 19:00:24 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169079 >/dev/null 2>/dev/null selfserv_9351 with PID 2169079 found at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 with PID 2169079 started at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169079 at Fri Nov 28 19:00:24 CST 2025 kill -USR1 2169079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169079 killed at Fri Nov 28 19:00:24 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169107 >/dev/null 2>/dev/null selfserv_9351 with PID 2169107 found at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 with PID 2169107 started at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169107 at Fri Nov 28 19:00:24 CST 2025 kill -USR1 2169107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169107 killed at Fri Nov 28 19:00:24 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169135 >/dev/null 2>/dev/null selfserv_9351 with PID 2169135 found at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 with PID 2169135 started at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169135 at Fri Nov 28 19:00:24 CST 2025 kill -USR1 2169135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169135 killed at Fri Nov 28 19:00:24 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169163 >/dev/null 2>/dev/null selfserv_9351 with PID 2169163 found at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 with PID 2169163 started at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169163 at Fri Nov 28 19:00:24 CST 2025 kill -USR1 2169163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169163 killed at Fri Nov 28 19:00:24 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169197 >/dev/null 2>/dev/null selfserv_9351 with PID 2169197 found at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 with PID 2169197 started at Fri Nov 28 19:00:25 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169197 at Fri Nov 28 19:00:25 CST 2025 kill -USR1 2169197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169197 killed at Fri Nov 28 19:00:25 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169226 >/dev/null 2>/dev/null selfserv_9351 with PID 2169226 found at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 with PID 2169226 started at Fri Nov 28 19:00:25 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2169226 at Fri Nov 28 19:00:25 CST 2025 kill -USR1 2169226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169226 killed at Fri Nov 28 19:00:25 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169255 >/dev/null 2>/dev/null selfserv_9351 with PID 2169255 found at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 with PID 2169255 started at Fri Nov 28 19:00:25 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169255 at Fri Nov 28 19:00:25 CST 2025 kill -USR1 2169255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169255 killed at Fri Nov 28 19:00:25 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169284 >/dev/null 2>/dev/null selfserv_9351 with PID 2169284 found at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 with PID 2169284 started at Fri Nov 28 19:00:25 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2169284 at Fri Nov 28 19:00:25 CST 2025 kill -USR1 2169284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169284 killed at Fri Nov 28 19:00:25 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169315 >/dev/null 2>/dev/null selfserv_9351 with PID 2169315 found at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 with PID 2169315 started at Fri Nov 28 19:00:25 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169315 at Fri Nov 28 19:00:25 CST 2025 kill -USR1 2169315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169315 killed at Fri Nov 28 19:00:25 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169344 >/dev/null 2>/dev/null selfserv_9351 with PID 2169344 found at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 with PID 2169344 started at Fri Nov 28 19:00:26 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169344 at Fri Nov 28 19:00:26 CST 2025 kill -USR1 2169344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169344 killed at Fri Nov 28 19:00:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169373 >/dev/null 2>/dev/null selfserv_9351 with PID 2169373 found at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 with PID 2169373 started at Fri Nov 28 19:00:26 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169373 at Fri Nov 28 19:00:26 CST 2025 kill -USR1 2169373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169373 killed at Fri Nov 28 19:00:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169402 >/dev/null 2>/dev/null selfserv_9351 with PID 2169402 found at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 with PID 2169402 started at Fri Nov 28 19:00:26 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169402 at Fri Nov 28 19:00:26 CST 2025 kill -USR1 2169402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169402 killed at Fri Nov 28 19:00:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2169431 >/dev/null 2>/dev/null selfserv_9351 with PID 2169431 found at Fri Nov 28 19:00:26 CST 2025 selfserv_9351 with PID 2169431 started at Fri Nov 28 19:00:26 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #963: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169431 at Fri Nov 28 19:00:26 CST 2025 kill -USR1 2169431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169431 killed at Fri Nov 28 19:00:26 CST 2025 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #964: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -list ssl.sh: #965: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #966: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #967: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -list ssl.sh: #968: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #969: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:00:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2169498 >/dev/null 2>/dev/null selfserv_9351 with PID 2169498 found at Fri Nov 28 19:00:27 CST 2025 selfserv_9351 with PID 2169498 started at Fri Nov 28 19:00:27 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2169498 at Fri Nov 28 19:00:31 CST 2025 kill -USR1 2169498 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169498 killed at Fri Nov 28 19:00:31 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:00:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2169999 >/dev/null 2>/dev/null selfserv_9351 with PID 2169999 found at Fri Nov 28 19:00:31 CST 2025 selfserv_9351 with PID 2169999 started at Fri Nov 28 19:00:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1096: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2169999 at Fri Nov 28 19:00:36 CST 2025 kill -USR1 2169999 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2169999 killed at Fri Nov 28 19:00:36 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:00:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170727 >/dev/null 2>/dev/null selfserv_9351 with PID 2170727 found at Fri Nov 28 19:00:36 CST 2025 selfserv_9351 with PID 2170727 started at Fri Nov 28 19:00:36 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2170727 at Fri Nov 28 19:00:37 CST 2025 kill -USR1 2170727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170727 killed at Fri Nov 28 19:00:37 CST 2025 ssl.sh: SSL Client Authentication - server fips/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170781 >/dev/null 2>/dev/null selfserv_9351 with PID 2170781 found at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 with PID 2170781 started at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2170781 at Fri Nov 28 19:00:37 CST 2025 kill -USR1 2170781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170781 killed at Fri Nov 28 19:00:37 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170822 >/dev/null 2>/dev/null selfserv_9351 with PID 2170822 found at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 with PID 2170822 started at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2170822 at Fri Nov 28 19:00:37 CST 2025 kill -USR1 2170822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170822 killed at Fri Nov 28 19:00:37 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170863 >/dev/null 2>/dev/null selfserv_9351 with PID 2170863 found at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 with PID 2170863 started at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2170863 at Fri Nov 28 19:00:37 CST 2025 kill -USR1 2170863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170863 killed at Fri Nov 28 19:00:37 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170904 >/dev/null 2>/dev/null selfserv_9351 with PID 2170904 found at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 with PID 2170904 started at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2170904 at Fri Nov 28 19:00:38 CST 2025 kill -USR1 2170904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170904 killed at Fri Nov 28 19:00:38 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170945 >/dev/null 2>/dev/null selfserv_9351 with PID 2170945 found at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 with PID 2170945 started at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1101: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2170945 at Fri Nov 28 19:00:38 CST 2025 kill -USR1 2170945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170945 killed at Fri Nov 28 19:00:38 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2170986 >/dev/null 2>/dev/null selfserv_9351 with PID 2170986 found at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 with PID 2170986 started at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2170986 at Fri Nov 28 19:00:38 CST 2025 kill -USR1 2170986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2170986 killed at Fri Nov 28 19:00:38 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171027 >/dev/null 2>/dev/null selfserv_9351 with PID 2171027 found at Fri Nov 28 19:00:38 CST 2025 selfserv_9351 with PID 2171027 started at Fri Nov 28 19:00:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171027 at Fri Nov 28 19:00:39 CST 2025 kill -USR1 2171027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171027 killed at Fri Nov 28 19:00:39 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171072 >/dev/null 2>/dev/null selfserv_9351 with PID 2171072 found at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 with PID 2171072 started at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171072 at Fri Nov 28 19:00:39 CST 2025 kill -USR1 2171072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171072 killed at Fri Nov 28 19:00:39 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171113 >/dev/null 2>/dev/null selfserv_9351 with PID 2171113 found at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 with PID 2171113 started at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171113 at Fri Nov 28 19:00:39 CST 2025 kill -USR1 2171113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171113 killed at Fri Nov 28 19:00:39 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171154 >/dev/null 2>/dev/null selfserv_9351 with PID 2171154 found at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 with PID 2171154 started at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171154 at Fri Nov 28 19:00:39 CST 2025 kill -USR1 2171154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171154 killed at Fri Nov 28 19:00:39 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171201 >/dev/null 2>/dev/null selfserv_9351 with PID 2171201 found at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 with PID 2171201 started at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1107: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171201 at Fri Nov 28 19:00:40 CST 2025 kill -USR1 2171201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171201 killed at Fri Nov 28 19:00:40 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171242 >/dev/null 2>/dev/null selfserv_9351 with PID 2171242 found at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 with PID 2171242 started at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171242 at Fri Nov 28 19:00:40 CST 2025 kill -USR1 2171242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171242 killed at Fri Nov 28 19:00:40 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171283 >/dev/null 2>/dev/null selfserv_9351 with PID 2171283 found at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 with PID 2171283 started at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171283 at Fri Nov 28 19:00:40 CST 2025 kill -USR1 2171283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171283 killed at Fri Nov 28 19:00:40 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171328 >/dev/null 2>/dev/null selfserv_9351 with PID 2171328 found at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 with PID 2171328 started at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171328 at Fri Nov 28 19:00:40 CST 2025 kill -USR1 2171328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171328 killed at Fri Nov 28 19:00:40 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171369 >/dev/null 2>/dev/null selfserv_9351 with PID 2171369 found at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 with PID 2171369 started at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171369 at Fri Nov 28 19:00:41 CST 2025 kill -USR1 2171369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171369 killed at Fri Nov 28 19:00:41 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171410 >/dev/null 2>/dev/null selfserv_9351 with PID 2171410 found at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 with PID 2171410 started at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171410 at Fri Nov 28 19:00:41 CST 2025 kill -USR1 2171410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171410 killed at Fri Nov 28 19:00:41 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171451 >/dev/null 2>/dev/null selfserv_9351 with PID 2171451 found at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 with PID 2171451 started at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1113: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171451 at Fri Nov 28 19:00:41 CST 2025 kill -USR1 2171451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171451 killed at Fri Nov 28 19:00:41 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171496 >/dev/null 2>/dev/null selfserv_9351 with PID 2171496 found at Fri Nov 28 19:00:41 CST 2025 selfserv_9351 with PID 2171496 started at Fri Nov 28 19:00:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171496 at Fri Nov 28 19:00:42 CST 2025 kill -USR1 2171496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171496 killed at Fri Nov 28 19:00:42 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171537 >/dev/null 2>/dev/null selfserv_9351 with PID 2171537 found at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 with PID 2171537 started at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171537 at Fri Nov 28 19:00:42 CST 2025 kill -USR1 2171537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171537 killed at Fri Nov 28 19:00:42 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171578 >/dev/null 2>/dev/null selfserv_9351 with PID 2171578 found at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 with PID 2171578 started at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171578 at Fri Nov 28 19:00:42 CST 2025 kill -USR1 2171578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171578 killed at Fri Nov 28 19:00:42 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171619 >/dev/null 2>/dev/null selfserv_9351 with PID 2171619 found at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 with PID 2171619 started at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1117: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171619 at Fri Nov 28 19:00:42 CST 2025 kill -USR1 2171619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171619 killed at Fri Nov 28 19:00:42 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171661 >/dev/null 2>/dev/null selfserv_9351 with PID 2171661 found at Fri Nov 28 19:00:42 CST 2025 selfserv_9351 with PID 2171661 started at Fri Nov 28 19:00:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171661 at Fri Nov 28 19:00:43 CST 2025 kill -USR1 2171661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171661 killed at Fri Nov 28 19:00:43 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171702 >/dev/null 2>/dev/null selfserv_9351 with PID 2171702 found at Fri Nov 28 19:00:43 CST 2025 selfserv_9351 with PID 2171702 started at Fri Nov 28 19:00:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171702 at Fri Nov 28 19:00:43 CST 2025 kill -USR1 2171702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171702 killed at Fri Nov 28 19:00:43 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171743 >/dev/null 2>/dev/null selfserv_9351 with PID 2171743 found at Fri Nov 28 19:00:43 CST 2025 selfserv_9351 with PID 2171743 started at Fri Nov 28 19:00:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171743 at Fri Nov 28 19:00:43 CST 2025 kill -USR1 2171743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171743 killed at Fri Nov 28 19:00:43 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171784 >/dev/null 2>/dev/null selfserv_9351 with PID 2171784 found at Fri Nov 28 19:00:43 CST 2025 selfserv_9351 with PID 2171784 started at Fri Nov 28 19:00:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171784 at Fri Nov 28 19:00:44 CST 2025 kill -USR1 2171784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171784 killed at Fri Nov 28 19:00:44 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171830 >/dev/null 2>/dev/null selfserv_9351 with PID 2171830 found at Fri Nov 28 19:00:44 CST 2025 selfserv_9351 with PID 2171830 started at Fri Nov 28 19:00:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171830 at Fri Nov 28 19:00:44 CST 2025 kill -USR1 2171830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171830 killed at Fri Nov 28 19:00:44 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171871 >/dev/null 2>/dev/null selfserv_9351 with PID 2171871 found at Fri Nov 28 19:00:44 CST 2025 selfserv_9351 with PID 2171871 started at Fri Nov 28 19:00:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2171871 at Fri Nov 28 19:00:44 CST 2025 kill -USR1 2171871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171871 killed at Fri Nov 28 19:00:44 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171918 >/dev/null 2>/dev/null selfserv_9351 with PID 2171918 found at Fri Nov 28 19:00:44 CST 2025 selfserv_9351 with PID 2171918 started at Fri Nov 28 19:00:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171918 at Fri Nov 28 19:00:45 CST 2025 kill -USR1 2171918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171918 killed at Fri Nov 28 19:00:45 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2171959 >/dev/null 2>/dev/null selfserv_9351 with PID 2171959 found at Fri Nov 28 19:00:45 CST 2025 selfserv_9351 with PID 2171959 started at Fri Nov 28 19:00:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1125: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2171959 at Fri Nov 28 19:00:45 CST 2025 kill -USR1 2171959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2171959 killed at Fri Nov 28 19:00:45 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172000 >/dev/null 2>/dev/null selfserv_9351 with PID 2172000 found at Fri Nov 28 19:00:45 CST 2025 selfserv_9351 with PID 2172000 started at Fri Nov 28 19:00:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172000 at Fri Nov 28 19:00:45 CST 2025 kill -USR1 2172000 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172000 killed at Fri Nov 28 19:00:45 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172042 >/dev/null 2>/dev/null selfserv_9351 with PID 2172042 found at Fri Nov 28 19:00:45 CST 2025 selfserv_9351 with PID 2172042 started at Fri Nov 28 19:00:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172042 at Fri Nov 28 19:00:46 CST 2025 kill -USR1 2172042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172042 killed at Fri Nov 28 19:00:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172083 >/dev/null 2>/dev/null selfserv_9351 with PID 2172083 found at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 with PID 2172083 started at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172083 at Fri Nov 28 19:00:46 CST 2025 kill -USR1 2172083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172083 killed at Fri Nov 28 19:00:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172124 >/dev/null 2>/dev/null selfserv_9351 with PID 2172124 found at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 with PID 2172124 started at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172124 at Fri Nov 28 19:00:46 CST 2025 kill -USR1 2172124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172124 killed at Fri Nov 28 19:00:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172165 >/dev/null 2>/dev/null selfserv_9351 with PID 2172165 found at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 with PID 2172165 started at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1130: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2172165 at Fri Nov 28 19:00:46 CST 2025 kill -USR1 2172165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172165 killed at Fri Nov 28 19:00:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172206 >/dev/null 2>/dev/null selfserv_9351 with PID 2172206 found at Fri Nov 28 19:00:46 CST 2025 selfserv_9351 with PID 2172206 started at Fri Nov 28 19:00:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172206 at Fri Nov 28 19:00:47 CST 2025 kill -USR1 2172206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172206 killed at Fri Nov 28 19:00:47 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172247 >/dev/null 2>/dev/null selfserv_9351 with PID 2172247 found at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 with PID 2172247 started at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172247 at Fri Nov 28 19:00:47 CST 2025 kill -USR1 2172247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172247 killed at Fri Nov 28 19:00:47 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172288 >/dev/null 2>/dev/null selfserv_9351 with PID 2172288 found at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 with PID 2172288 started at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172288 at Fri Nov 28 19:00:47 CST 2025 kill -USR1 2172288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172288 killed at Fri Nov 28 19:00:47 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172329 >/dev/null 2>/dev/null selfserv_9351 with PID 2172329 found at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 with PID 2172329 started at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172329 at Fri Nov 28 19:00:47 CST 2025 kill -USR1 2172329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172329 killed at Fri Nov 28 19:00:47 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172370 >/dev/null 2>/dev/null selfserv_9351 with PID 2172370 found at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 with PID 2172370 started at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1135: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2172370 at Fri Nov 28 19:00:48 CST 2025 kill -USR1 2172370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172370 killed at Fri Nov 28 19:00:48 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172411 >/dev/null 2>/dev/null selfserv_9351 with PID 2172411 found at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 with PID 2172411 started at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172411 at Fri Nov 28 19:00:48 CST 2025 kill -USR1 2172411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172411 killed at Fri Nov 28 19:00:48 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172452 >/dev/null 2>/dev/null selfserv_9351 with PID 2172452 found at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 with PID 2172452 started at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172452 at Fri Nov 28 19:00:48 CST 2025 kill -USR1 2172452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172452 killed at Fri Nov 28 19:00:48 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172493 >/dev/null 2>/dev/null selfserv_9351 with PID 2172493 found at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 with PID 2172493 started at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172493 at Fri Nov 28 19:00:48 CST 2025 kill -USR1 2172493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172493 killed at Fri Nov 28 19:00:48 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172538 >/dev/null 2>/dev/null selfserv_9351 with PID 2172538 found at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 with PID 2172538 started at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1139: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2172538 at Fri Nov 28 19:00:49 CST 2025 kill -USR1 2172538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172538 killed at Fri Nov 28 19:00:49 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172579 >/dev/null 2>/dev/null selfserv_9351 with PID 2172579 found at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 with PID 2172579 started at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172579 at Fri Nov 28 19:00:49 CST 2025 kill -USR1 2172579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172579 killed at Fri Nov 28 19:00:49 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172620 >/dev/null 2>/dev/null selfserv_9351 with PID 2172620 found at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 with PID 2172620 started at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172620 at Fri Nov 28 19:00:49 CST 2025 kill -USR1 2172620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172620 killed at Fri Nov 28 19:00:49 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172667 >/dev/null 2>/dev/null selfserv_9351 with PID 2172667 found at Fri Nov 28 19:00:49 CST 2025 selfserv_9351 with PID 2172667 started at Fri Nov 28 19:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172667 at Fri Nov 28 19:00:50 CST 2025 kill -USR1 2172667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172667 killed at Fri Nov 28 19:00:50 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172708 >/dev/null 2>/dev/null selfserv_9351 with PID 2172708 found at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 with PID 2172708 started at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2172708 at Fri Nov 28 19:00:50 CST 2025 kill -USR1 2172708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172708 killed at Fri Nov 28 19:00:50 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172749 >/dev/null 2>/dev/null selfserv_9351 with PID 2172749 found at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 with PID 2172749 started at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172749 at Fri Nov 28 19:00:50 CST 2025 kill -USR1 2172749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172749 killed at Fri Nov 28 19:00:50 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172790 >/dev/null 2>/dev/null selfserv_9351 with PID 2172790 found at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 with PID 2172790 started at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172790 at Fri Nov 28 19:00:50 CST 2025 kill -USR1 2172790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172790 killed at Fri Nov 28 19:00:50 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172831 >/dev/null 2>/dev/null selfserv_9351 with PID 2172831 found at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 with PID 2172831 started at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172831 at Fri Nov 28 19:00:50 CST 2025 kill -USR1 2172831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172831 killed at Fri Nov 28 19:00:50 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172876 >/dev/null 2>/dev/null selfserv_9351 with PID 2172876 found at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 with PID 2172876 started at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2172876 at Fri Nov 28 19:00:51 CST 2025 kill -USR1 2172876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172876 killed at Fri Nov 28 19:00:51 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172917 >/dev/null 2>/dev/null selfserv_9351 with PID 2172917 found at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 with PID 2172917 started at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172917 at Fri Nov 28 19:00:51 CST 2025 kill -USR1 2172917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172917 killed at Fri Nov 28 19:00:51 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2172958 >/dev/null 2>/dev/null selfserv_9351 with PID 2172958 found at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 with PID 2172958 started at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2172958 at Fri Nov 28 19:00:51 CST 2025 kill -USR1 2172958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2172958 killed at Fri Nov 28 19:00:51 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173003 >/dev/null 2>/dev/null selfserv_9351 with PID 2173003 found at Fri Nov 28 19:00:51 CST 2025 selfserv_9351 with PID 2173003 started at Fri Nov 28 19:00:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1150: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173003 at Fri Nov 28 19:00:52 CST 2025 kill -USR1 2173003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173003 killed at Fri Nov 28 19:00:52 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:00:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173044 >/dev/null 2>/dev/null selfserv_9351 with PID 2173044 found at Fri Nov 28 19:00:52 CST 2025 selfserv_9351 with PID 2173044 started at Fri Nov 28 19:00:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2173044 at Fri Nov 28 19:00:52 CST 2025 kill -USR1 2173044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173044 killed at Fri Nov 28 19:00:52 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173085 >/dev/null 2>/dev/null selfserv_9351 with PID 2173085 found at Fri Nov 28 19:00:52 CST 2025 selfserv_9351 with PID 2173085 started at Fri Nov 28 19:00:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173085 at Fri Nov 28 19:00:52 CST 2025 kill -USR1 2173085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173085 killed at Fri Nov 28 19:00:52 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173127 >/dev/null 2>/dev/null selfserv_9351 with PID 2173127 found at Fri Nov 28 19:00:52 CST 2025 selfserv_9351 with PID 2173127 started at Fri Nov 28 19:00:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173127 at Fri Nov 28 19:00:53 CST 2025 kill -USR1 2173127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173127 killed at Fri Nov 28 19:00:53 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:00:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173168 >/dev/null 2>/dev/null selfserv_9351 with PID 2173168 found at Fri Nov 28 19:00:53 CST 2025 selfserv_9351 with PID 2173168 started at Fri Nov 28 19:00:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173168 at Fri Nov 28 19:00:53 CST 2025 kill -USR1 2173168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173168 killed at Fri Nov 28 19:00:53 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:00:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173215 >/dev/null 2>/dev/null selfserv_9351 with PID 2173215 found at Fri Nov 28 19:00:53 CST 2025 selfserv_9351 with PID 2173215 started at Fri Nov 28 19:00:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173215 at Fri Nov 28 19:00:53 CST 2025 kill -USR1 2173215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173215 killed at Fri Nov 28 19:00:53 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:00:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173268 >/dev/null 2>/dev/null selfserv_9351 with PID 2173268 found at Fri Nov 28 19:00:53 CST 2025 selfserv_9351 with PID 2173268 started at Fri Nov 28 19:00:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1156: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173268 at Fri Nov 28 19:00:54 CST 2025 kill -USR1 2173268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173268 killed at Fri Nov 28 19:00:54 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173315 >/dev/null 2>/dev/null selfserv_9351 with PID 2173315 found at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 with PID 2173315 started at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2173315 at Fri Nov 28 19:00:54 CST 2025 kill -USR1 2173315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173315 killed at Fri Nov 28 19:00:54 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173362 >/dev/null 2>/dev/null selfserv_9351 with PID 2173362 found at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 with PID 2173362 started at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1158: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173362 at Fri Nov 28 19:00:54 CST 2025 kill -USR1 2173362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173362 killed at Fri Nov 28 19:00:54 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173409 >/dev/null 2>/dev/null selfserv_9351 with PID 2173409 found at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 with PID 2173409 started at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1159: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2173409 at Fri Nov 28 19:00:54 CST 2025 kill -USR1 2173409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173409 killed at Fri Nov 28 19:00:54 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173462 >/dev/null 2>/dev/null selfserv_9351 with PID 2173462 found at Fri Nov 28 19:00:54 CST 2025 selfserv_9351 with PID 2173462 started at Fri Nov 28 19:00:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173462 at Fri Nov 28 19:00:55 CST 2025 kill -USR1 2173462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173462 killed at Fri Nov 28 19:00:55 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173509 >/dev/null 2>/dev/null selfserv_9351 with PID 2173509 found at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 with PID 2173509 started at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1161: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173509 at Fri Nov 28 19:00:55 CST 2025 kill -USR1 2173509 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173509 killed at Fri Nov 28 19:00:55 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173556 >/dev/null 2>/dev/null selfserv_9351 with PID 2173556 found at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 with PID 2173556 started at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1162: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2173556 at Fri Nov 28 19:00:55 CST 2025 kill -USR1 2173556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173556 killed at Fri Nov 28 19:00:55 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173603 >/dev/null 2>/dev/null selfserv_9351 with PID 2173603 found at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 with PID 2173603 started at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1163: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2173603 at Fri Nov 28 19:00:55 CST 2025 kill -USR1 2173603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173603 killed at Fri Nov 28 19:00:55 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173651 >/dev/null 2>/dev/null selfserv_9351 with PID 2173651 found at Fri Nov 28 19:00:55 CST 2025 selfserv_9351 with PID 2173651 started at Fri Nov 28 19:00:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1164: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2173651 at Fri Nov 28 19:00:56 CST 2025 kill -USR1 2173651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173651 killed at Fri Nov 28 19:00:56 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173682 >/dev/null 2>/dev/null selfserv_9351 with PID 2173682 found at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 with PID 2173682 started at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173682 at Fri Nov 28 19:00:56 CST 2025 kill -USR1 2173682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173682 killed at Fri Nov 28 19:00:56 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173713 >/dev/null 2>/dev/null selfserv_9351 with PID 2173713 found at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 with PID 2173713 started at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2173713 at Fri Nov 28 19:00:56 CST 2025 kill -USR1 2173713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173713 killed at Fri Nov 28 19:00:56 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173744 >/dev/null 2>/dev/null selfserv_9351 with PID 2173744 found at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 with PID 2173744 started at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2173744 at Fri Nov 28 19:00:56 CST 2025 kill -USR1 2173744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173744 killed at Fri Nov 28 19:00:56 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173775 >/dev/null 2>/dev/null selfserv_9351 with PID 2173775 found at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 with PID 2173775 started at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2173775 at Fri Nov 28 19:00:56 CST 2025 kill -USR1 2173775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173775 killed at Fri Nov 28 19:00:56 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:00:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173806 >/dev/null 2>/dev/null selfserv_9351 with PID 2173806 found at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 with PID 2173806 started at Fri Nov 28 19:00:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2173806 at Fri Nov 28 19:00:57 CST 2025 kill -USR1 2173806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173806 killed at Fri Nov 28 19:00:57 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173837 >/dev/null 2>/dev/null selfserv_9351 with PID 2173837 found at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 with PID 2173837 started at Fri Nov 28 19:00:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1102: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2173837 at Fri Nov 28 19:00:57 CST 2025 kill -USR1 2173837 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173837 killed at Fri Nov 28 19:00:57 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173868 >/dev/null 2>/dev/null selfserv_9351 with PID 2173868 found at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 with PID 2173868 started at Fri Nov 28 19:00:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1103: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2173868 at Fri Nov 28 19:00:57 CST 2025 kill -USR1 2173868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173868 killed at Fri Nov 28 19:00:57 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173899 >/dev/null 2>/dev/null selfserv_9351 with PID 2173899 found at Fri Nov 28 19:00:57 CST 2025 selfserv_9351 with PID 2173899 started at Fri Nov 28 19:00:57 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:00:57 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:00:58 CST 2025 ssl.sh: #1104: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2173899 at Fri Nov 28 19:00:58 CST 2025 kill -USR1 2173899 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173899 killed at Fri Nov 28 19:00:58 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:00:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173949 >/dev/null 2>/dev/null selfserv_9351 with PID 2173949 found at Fri Nov 28 19:00:58 CST 2025 selfserv_9351 with PID 2173949 started at Fri Nov 28 19:00:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173949 at Fri Nov 28 19:00:58 CST 2025 kill -USR1 2173949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173949 killed at Fri Nov 28 19:00:58 CST 2025 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2173984 >/dev/null 2>/dev/null selfserv_9351 with PID 2173984 found at Fri Nov 28 19:00:58 CST 2025 selfserv_9351 with PID 2173984 started at Fri Nov 28 19:00:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2173984 at Fri Nov 28 19:00:59 CST 2025 kill -USR1 2173984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2173984 killed at Fri Nov 28 19:00:59 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174012 >/dev/null 2>/dev/null selfserv_9351 with PID 2174012 found at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 with PID 2174012 started at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2174012 at Fri Nov 28 19:00:59 CST 2025 kill -USR1 2174012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174012 killed at Fri Nov 28 19:00:59 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174040 >/dev/null 2>/dev/null selfserv_9351 with PID 2174040 found at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 with PID 2174040 started at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174040 at Fri Nov 28 19:00:59 CST 2025 kill -USR1 2174040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174040 killed at Fri Nov 28 19:00:59 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174068 >/dev/null 2>/dev/null selfserv_9351 with PID 2174068 found at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 with PID 2174068 started at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2174068 at Fri Nov 28 19:00:59 CST 2025 kill -USR1 2174068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174068 killed at Fri Nov 28 19:00:59 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174096 >/dev/null 2>/dev/null selfserv_9351 with PID 2174096 found at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 with PID 2174096 started at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174096 at Fri Nov 28 19:00:59 CST 2025 kill -USR1 2174096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174096 killed at Fri Nov 28 19:00:59 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174130 >/dev/null 2>/dev/null selfserv_9351 with PID 2174130 found at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 with PID 2174130 started at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174130 at Fri Nov 28 19:00:59 CST 2025 kill -USR1 2174130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174130 killed at Fri Nov 28 19:00:59 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:00:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:00:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174158 >/dev/null 2>/dev/null selfserv_9351 with PID 2174158 found at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 with PID 2174158 started at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174158 at Fri Nov 28 19:01:00 CST 2025 kill -USR1 2174158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174158 killed at Fri Nov 28 19:01:00 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174186 >/dev/null 2>/dev/null selfserv_9351 with PID 2174186 found at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 with PID 2174186 started at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174186 at Fri Nov 28 19:01:00 CST 2025 kill -USR1 2174186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174186 killed at Fri Nov 28 19:01:00 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174214 >/dev/null 2>/dev/null selfserv_9351 with PID 2174214 found at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 with PID 2174214 started at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174214 at Fri Nov 28 19:01:00 CST 2025 kill -USR1 2174214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174214 killed at Fri Nov 28 19:01:00 CST 2025 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174242 >/dev/null 2>/dev/null selfserv_9351 with PID 2174242 found at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 with PID 2174242 started at Fri Nov 28 19:01:00 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174242 at Fri Nov 28 19:01:00 CST 2025 kill -USR1 2174242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174242 killed at Fri Nov 28 19:01:00 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174271 >/dev/null 2>/dev/null selfserv_9351 with PID 2174271 found at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 with PID 2174271 started at Fri Nov 28 19:01:00 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2174271 at Fri Nov 28 19:01:00 CST 2025 kill -USR1 2174271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174271 killed at Fri Nov 28 19:01:00 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174304 >/dev/null 2>/dev/null selfserv_9351 with PID 2174304 found at Fri Nov 28 19:01:00 CST 2025 selfserv_9351 with PID 2174304 started at Fri Nov 28 19:01:00 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174304 at Fri Nov 28 19:01:01 CST 2025 kill -USR1 2174304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174304 killed at Fri Nov 28 19:01:01 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174333 >/dev/null 2>/dev/null selfserv_9351 with PID 2174333 found at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 with PID 2174333 started at Fri Nov 28 19:01:01 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2174333 at Fri Nov 28 19:01:01 CST 2025 kill -USR1 2174333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174333 killed at Fri Nov 28 19:01:01 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174362 >/dev/null 2>/dev/null selfserv_9351 with PID 2174362 found at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 with PID 2174362 started at Fri Nov 28 19:01:01 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174362 at Fri Nov 28 19:01:01 CST 2025 kill -USR1 2174362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174362 killed at Fri Nov 28 19:01:01 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174391 >/dev/null 2>/dev/null selfserv_9351 with PID 2174391 found at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 with PID 2174391 started at Fri Nov 28 19:01:01 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174391 at Fri Nov 28 19:01:01 CST 2025 kill -USR1 2174391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174391 killed at Fri Nov 28 19:01:01 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174420 >/dev/null 2>/dev/null selfserv_9351 with PID 2174420 found at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 with PID 2174420 started at Fri Nov 28 19:01:01 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174420 at Fri Nov 28 19:01:01 CST 2025 kill -USR1 2174420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174420 killed at Fri Nov 28 19:01:01 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174476 >/dev/null 2>/dev/null selfserv_9351 with PID 2174476 found at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 with PID 2174476 started at Fri Nov 28 19:01:01 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174476 at Fri Nov 28 19:01:01 CST 2025 kill -USR1 2174476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174476 killed at Fri Nov 28 19:01:01 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2174505 >/dev/null 2>/dev/null selfserv_9351 with PID 2174505 found at Fri Nov 28 19:01:02 CST 2025 selfserv_9351 with PID 2174505 started at Fri Nov 28 19:01:02 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1123: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2174505 at Fri Nov 28 19:01:02 CST 2025 kill -USR1 2174505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174505 killed at Fri Nov 28 19:01:02 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:01:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2174534 >/dev/null 2>/dev/null selfserv_9351 with PID 2174534 found at Fri Nov 28 19:01:02 CST 2025 selfserv_9351 with PID 2174534 started at Fri Nov 28 19:01:02 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2174534 at Fri Nov 28 19:01:06 CST 2025 kill -USR1 2174534 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2174534 killed at Fri Nov 28 19:01:06 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:01:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2175071 >/dev/null 2>/dev/null selfserv_9351 with PID 2175071 found at Fri Nov 28 19:01:06 CST 2025 selfserv_9351 with PID 2175071 started at Fri Nov 28 19:01:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1250: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2175071 at Fri Nov 28 19:01:12 CST 2025 kill -USR1 2175071 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2175071 killed at Fri Nov 28 19:01:12 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2175815 >/dev/null 2>/dev/null selfserv_9351 with PID 2175815 found at Fri Nov 28 19:01:12 CST 2025 selfserv_9351 with PID 2175815 started at Fri Nov 28 19:01:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2175815 at Fri Nov 28 19:01:13 CST 2025 kill -USR1 2175815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2175815 killed at Fri Nov 28 19:01:13 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2175857 >/dev/null 2>/dev/null selfserv_9351 with PID 2175857 found at Fri Nov 28 19:01:13 CST 2025 selfserv_9351 with PID 2175857 started at Fri Nov 28 19:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2175857 at Fri Nov 28 19:01:13 CST 2025 kill -USR1 2175857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2175857 killed at Fri Nov 28 19:01:13 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2175898 >/dev/null 2>/dev/null selfserv_9351 with PID 2175898 found at Fri Nov 28 19:01:13 CST 2025 selfserv_9351 with PID 2175898 started at Fri Nov 28 19:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2175898 at Fri Nov 28 19:01:13 CST 2025 kill -USR1 2175898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2175898 killed at Fri Nov 28 19:01:13 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2175944 >/dev/null 2>/dev/null selfserv_9351 with PID 2175944 found at Fri Nov 28 19:01:13 CST 2025 selfserv_9351 with PID 2175944 started at Fri Nov 28 19:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2175944 at Fri Nov 28 19:01:14 CST 2025 kill -USR1 2175944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2175944 killed at Fri Nov 28 19:01:14 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2175985 >/dev/null 2>/dev/null selfserv_9351 with PID 2175985 found at Fri Nov 28 19:01:14 CST 2025 selfserv_9351 with PID 2175985 started at Fri Nov 28 19:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1255: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2175985 at Fri Nov 28 19:01:14 CST 2025 kill -USR1 2175985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2175985 killed at Fri Nov 28 19:01:14 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176026 >/dev/null 2>/dev/null selfserv_9351 with PID 2176026 found at Fri Nov 28 19:01:14 CST 2025 selfserv_9351 with PID 2176026 started at Fri Nov 28 19:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176026 at Fri Nov 28 19:01:15 CST 2025 kill -USR1 2176026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176026 killed at Fri Nov 28 19:01:15 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176073 >/dev/null 2>/dev/null selfserv_9351 with PID 2176073 found at Fri Nov 28 19:01:15 CST 2025 selfserv_9351 with PID 2176073 started at Fri Nov 28 19:01:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176073 at Fri Nov 28 19:01:15 CST 2025 kill -USR1 2176073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176073 killed at Fri Nov 28 19:01:15 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176114 >/dev/null 2>/dev/null selfserv_9351 with PID 2176114 found at Fri Nov 28 19:01:15 CST 2025 selfserv_9351 with PID 2176114 started at Fri Nov 28 19:01:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176114 at Fri Nov 28 19:01:15 CST 2025 kill -USR1 2176114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176114 killed at Fri Nov 28 19:01:15 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176157 >/dev/null 2>/dev/null selfserv_9351 with PID 2176157 found at Fri Nov 28 19:01:15 CST 2025 selfserv_9351 with PID 2176157 started at Fri Nov 28 19:01:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176157 at Fri Nov 28 19:01:16 CST 2025 kill -USR1 2176157 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176157 killed at Fri Nov 28 19:01:16 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176198 >/dev/null 2>/dev/null selfserv_9351 with PID 2176198 found at Fri Nov 28 19:01:16 CST 2025 selfserv_9351 with PID 2176198 started at Fri Nov 28 19:01:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176198 at Fri Nov 28 19:01:16 CST 2025 kill -USR1 2176198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176198 killed at Fri Nov 28 19:01:16 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176239 >/dev/null 2>/dev/null selfserv_9351 with PID 2176239 found at Fri Nov 28 19:01:16 CST 2025 selfserv_9351 with PID 2176239 started at Fri Nov 28 19:01:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1261: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176239 at Fri Nov 28 19:01:17 CST 2025 kill -USR1 2176239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176239 killed at Fri Nov 28 19:01:17 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176281 >/dev/null 2>/dev/null selfserv_9351 with PID 2176281 found at Fri Nov 28 19:01:17 CST 2025 selfserv_9351 with PID 2176281 started at Fri Nov 28 19:01:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176281 at Fri Nov 28 19:01:17 CST 2025 kill -USR1 2176281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176281 killed at Fri Nov 28 19:01:17 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176322 >/dev/null 2>/dev/null selfserv_9351 with PID 2176322 found at Fri Nov 28 19:01:17 CST 2025 selfserv_9351 with PID 2176322 started at Fri Nov 28 19:01:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176322 at Fri Nov 28 19:01:17 CST 2025 kill -USR1 2176322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176322 killed at Fri Nov 28 19:01:17 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176364 >/dev/null 2>/dev/null selfserv_9351 with PID 2176364 found at Fri Nov 28 19:01:18 CST 2025 selfserv_9351 with PID 2176364 started at Fri Nov 28 19:01:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176364 at Fri Nov 28 19:01:18 CST 2025 kill -USR1 2176364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176364 killed at Fri Nov 28 19:01:18 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176405 >/dev/null 2>/dev/null selfserv_9351 with PID 2176405 found at Fri Nov 28 19:01:18 CST 2025 selfserv_9351 with PID 2176405 started at Fri Nov 28 19:01:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176405 at Fri Nov 28 19:01:18 CST 2025 kill -USR1 2176405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176405 killed at Fri Nov 28 19:01:18 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176446 >/dev/null 2>/dev/null selfserv_9351 with PID 2176446 found at Fri Nov 28 19:01:18 CST 2025 selfserv_9351 with PID 2176446 started at Fri Nov 28 19:01:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176446 at Fri Nov 28 19:01:19 CST 2025 kill -USR1 2176446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176446 killed at Fri Nov 28 19:01:19 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176491 >/dev/null 2>/dev/null selfserv_9351 with PID 2176491 found at Fri Nov 28 19:01:19 CST 2025 selfserv_9351 with PID 2176491 started at Fri Nov 28 19:01:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1267: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176491 at Fri Nov 28 19:01:19 CST 2025 kill -USR1 2176491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176491 killed at Fri Nov 28 19:01:19 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176532 >/dev/null 2>/dev/null selfserv_9351 with PID 2176532 found at Fri Nov 28 19:01:19 CST 2025 selfserv_9351 with PID 2176532 started at Fri Nov 28 19:01:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176532 at Fri Nov 28 19:01:19 CST 2025 kill -USR1 2176532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176532 killed at Fri Nov 28 19:01:19 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176579 >/dev/null 2>/dev/null selfserv_9351 with PID 2176579 found at Fri Nov 28 19:01:19 CST 2025 selfserv_9351 with PID 2176579 started at Fri Nov 28 19:01:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176579 at Fri Nov 28 19:01:20 CST 2025 kill -USR1 2176579 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176579 killed at Fri Nov 28 19:01:20 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176620 >/dev/null 2>/dev/null selfserv_9351 with PID 2176620 found at Fri Nov 28 19:01:20 CST 2025 selfserv_9351 with PID 2176620 started at Fri Nov 28 19:01:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176620 at Fri Nov 28 19:01:20 CST 2025 kill -USR1 2176620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176620 killed at Fri Nov 28 19:01:20 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176661 >/dev/null 2>/dev/null selfserv_9351 with PID 2176661 found at Fri Nov 28 19:01:20 CST 2025 selfserv_9351 with PID 2176661 started at Fri Nov 28 19:01:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1271: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176661 at Fri Nov 28 19:01:21 CST 2025 kill -USR1 2176661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176661 killed at Fri Nov 28 19:01:21 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176707 >/dev/null 2>/dev/null selfserv_9351 with PID 2176707 found at Fri Nov 28 19:01:21 CST 2025 selfserv_9351 with PID 2176707 started at Fri Nov 28 19:01:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176707 at Fri Nov 28 19:01:21 CST 2025 kill -USR1 2176707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176707 killed at Fri Nov 28 19:01:21 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176748 >/dev/null 2>/dev/null selfserv_9351 with PID 2176748 found at Fri Nov 28 19:01:21 CST 2025 selfserv_9351 with PID 2176748 started at Fri Nov 28 19:01:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176748 at Fri Nov 28 19:01:21 CST 2025 kill -USR1 2176748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176748 killed at Fri Nov 28 19:01:21 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176795 >/dev/null 2>/dev/null selfserv_9351 with PID 2176795 found at Fri Nov 28 19:01:21 CST 2025 selfserv_9351 with PID 2176795 started at Fri Nov 28 19:01:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176795 at Fri Nov 28 19:01:22 CST 2025 kill -USR1 2176795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176795 killed at Fri Nov 28 19:01:22 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176837 >/dev/null 2>/dev/null selfserv_9351 with PID 2176837 found at Fri Nov 28 19:01:22 CST 2025 selfserv_9351 with PID 2176837 started at Fri Nov 28 19:01:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176837 at Fri Nov 28 19:01:22 CST 2025 kill -USR1 2176837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176837 killed at Fri Nov 28 19:01:22 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176896 >/dev/null 2>/dev/null selfserv_9351 with PID 2176896 found at Fri Nov 28 19:01:22 CST 2025 selfserv_9351 with PID 2176896 started at Fri Nov 28 19:01:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176896 at Fri Nov 28 19:01:23 CST 2025 kill -USR1 2176896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176896 killed at Fri Nov 28 19:01:23 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176938 >/dev/null 2>/dev/null selfserv_9351 with PID 2176938 found at Fri Nov 28 19:01:23 CST 2025 selfserv_9351 with PID 2176938 started at Fri Nov 28 19:01:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1277: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2176938 at Fri Nov 28 19:01:23 CST 2025 kill -USR1 2176938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176938 killed at Fri Nov 28 19:01:23 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2176979 >/dev/null 2>/dev/null selfserv_9351 with PID 2176979 found at Fri Nov 28 19:01:23 CST 2025 selfserv_9351 with PID 2176979 started at Fri Nov 28 19:01:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2176979 at Fri Nov 28 19:01:24 CST 2025 kill -USR1 2176979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2176979 killed at Fri Nov 28 19:01:24 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177026 >/dev/null 2>/dev/null selfserv_9351 with PID 2177026 found at Fri Nov 28 19:01:24 CST 2025 selfserv_9351 with PID 2177026 started at Fri Nov 28 19:01:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1279: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2177026 at Fri Nov 28 19:01:24 CST 2025 kill -USR1 2177026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177026 killed at Fri Nov 28 19:01:24 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177067 >/dev/null 2>/dev/null selfserv_9351 with PID 2177067 found at Fri Nov 28 19:01:24 CST 2025 selfserv_9351 with PID 2177067 started at Fri Nov 28 19:01:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177067 at Fri Nov 28 19:01:25 CST 2025 kill -USR1 2177067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177067 killed at Fri Nov 28 19:01:25 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177114 >/dev/null 2>/dev/null selfserv_9351 with PID 2177114 found at Fri Nov 28 19:01:25 CST 2025 selfserv_9351 with PID 2177114 started at Fri Nov 28 19:01:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177114 at Fri Nov 28 19:01:25 CST 2025 kill -USR1 2177114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177114 killed at Fri Nov 28 19:01:25 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177155 >/dev/null 2>/dev/null selfserv_9351 with PID 2177155 found at Fri Nov 28 19:01:25 CST 2025 selfserv_9351 with PID 2177155 started at Fri Nov 28 19:01:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177155 at Fri Nov 28 19:01:25 CST 2025 kill -USR1 2177155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177155 killed at Fri Nov 28 19:01:25 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177197 >/dev/null 2>/dev/null selfserv_9351 with PID 2177197 found at Fri Nov 28 19:01:25 CST 2025 selfserv_9351 with PID 2177197 started at Fri Nov 28 19:01:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177197 at Fri Nov 28 19:01:26 CST 2025 kill -USR1 2177197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177197 killed at Fri Nov 28 19:01:26 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177238 >/dev/null 2>/dev/null selfserv_9351 with PID 2177238 found at Fri Nov 28 19:01:26 CST 2025 selfserv_9351 with PID 2177238 started at Fri Nov 28 19:01:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1284: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2177238 at Fri Nov 28 19:01:26 CST 2025 kill -USR1 2177238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177238 killed at Fri Nov 28 19:01:26 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177279 >/dev/null 2>/dev/null selfserv_9351 with PID 2177279 found at Fri Nov 28 19:01:26 CST 2025 selfserv_9351 with PID 2177279 started at Fri Nov 28 19:01:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177279 at Fri Nov 28 19:01:26 CST 2025 kill -USR1 2177279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177279 killed at Fri Nov 28 19:01:26 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177320 >/dev/null 2>/dev/null selfserv_9351 with PID 2177320 found at Fri Nov 28 19:01:27 CST 2025 selfserv_9351 with PID 2177320 started at Fri Nov 28 19:01:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177320 at Fri Nov 28 19:01:27 CST 2025 kill -USR1 2177320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177320 killed at Fri Nov 28 19:01:27 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177361 >/dev/null 2>/dev/null selfserv_9351 with PID 2177361 found at Fri Nov 28 19:01:27 CST 2025 selfserv_9351 with PID 2177361 started at Fri Nov 28 19:01:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177361 at Fri Nov 28 19:01:27 CST 2025 kill -USR1 2177361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177361 killed at Fri Nov 28 19:01:27 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177402 >/dev/null 2>/dev/null selfserv_9351 with PID 2177402 found at Fri Nov 28 19:01:27 CST 2025 selfserv_9351 with PID 2177402 started at Fri Nov 28 19:01:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177402 at Fri Nov 28 19:01:28 CST 2025 kill -USR1 2177402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177402 killed at Fri Nov 28 19:01:28 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:28 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177443 >/dev/null 2>/dev/null selfserv_9351 with PID 2177443 found at Fri Nov 28 19:01:28 CST 2025 selfserv_9351 with PID 2177443 started at Fri Nov 28 19:01:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1289: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2177443 at Fri Nov 28 19:01:28 CST 2025 kill -USR1 2177443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177443 killed at Fri Nov 28 19:01:28 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:28 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177484 >/dev/null 2>/dev/null selfserv_9351 with PID 2177484 found at Fri Nov 28 19:01:28 CST 2025 selfserv_9351 with PID 2177484 started at Fri Nov 28 19:01:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177484 at Fri Nov 28 19:01:29 CST 2025 kill -USR1 2177484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177484 killed at Fri Nov 28 19:01:29 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177529 >/dev/null 2>/dev/null selfserv_9351 with PID 2177529 found at Fri Nov 28 19:01:29 CST 2025 selfserv_9351 with PID 2177529 started at Fri Nov 28 19:01:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177529 at Fri Nov 28 19:01:29 CST 2025 kill -USR1 2177529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177529 killed at Fri Nov 28 19:01:29 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177570 >/dev/null 2>/dev/null selfserv_9351 with PID 2177570 found at Fri Nov 28 19:01:29 CST 2025 selfserv_9351 with PID 2177570 started at Fri Nov 28 19:01:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177570 at Fri Nov 28 19:01:29 CST 2025 kill -USR1 2177570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177570 killed at Fri Nov 28 19:01:29 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177617 >/dev/null 2>/dev/null selfserv_9351 with PID 2177617 found at Fri Nov 28 19:01:29 CST 2025 selfserv_9351 with PID 2177617 started at Fri Nov 28 19:01:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1293: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2177617 at Fri Nov 28 19:01:30 CST 2025 kill -USR1 2177617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177617 killed at Fri Nov 28 19:01:30 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177658 >/dev/null 2>/dev/null selfserv_9351 with PID 2177658 found at Fri Nov 28 19:01:30 CST 2025 selfserv_9351 with PID 2177658 started at Fri Nov 28 19:01:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177658 at Fri Nov 28 19:01:30 CST 2025 kill -USR1 2177658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177658 killed at Fri Nov 28 19:01:30 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177699 >/dev/null 2>/dev/null selfserv_9351 with PID 2177699 found at Fri Nov 28 19:01:30 CST 2025 selfserv_9351 with PID 2177699 started at Fri Nov 28 19:01:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177699 at Fri Nov 28 19:01:31 CST 2025 kill -USR1 2177699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177699 killed at Fri Nov 28 19:01:31 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177744 >/dev/null 2>/dev/null selfserv_9351 with PID 2177744 found at Fri Nov 28 19:01:31 CST 2025 selfserv_9351 with PID 2177744 started at Fri Nov 28 19:01:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177744 at Fri Nov 28 19:01:31 CST 2025 kill -USR1 2177744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177744 killed at Fri Nov 28 19:01:31 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177785 >/dev/null 2>/dev/null selfserv_9351 with PID 2177785 found at Fri Nov 28 19:01:31 CST 2025 selfserv_9351 with PID 2177785 started at Fri Nov 28 19:01:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2177785 at Fri Nov 28 19:01:31 CST 2025 kill -USR1 2177785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177785 killed at Fri Nov 28 19:01:31 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177830 >/dev/null 2>/dev/null selfserv_9351 with PID 2177830 found at Fri Nov 28 19:01:31 CST 2025 selfserv_9351 with PID 2177830 started at Fri Nov 28 19:01:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177830 at Fri Nov 28 19:01:32 CST 2025 kill -USR1 2177830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177830 killed at Fri Nov 28 19:01:32 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177871 >/dev/null 2>/dev/null selfserv_9351 with PID 2177871 found at Fri Nov 28 19:01:32 CST 2025 selfserv_9351 with PID 2177871 started at Fri Nov 28 19:01:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177871 at Fri Nov 28 19:01:32 CST 2025 kill -USR1 2177871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177871 killed at Fri Nov 28 19:01:32 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177912 >/dev/null 2>/dev/null selfserv_9351 with PID 2177912 found at Fri Nov 28 19:01:32 CST 2025 selfserv_9351 with PID 2177912 started at Fri Nov 28 19:01:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177912 at Fri Nov 28 19:01:33 CST 2025 kill -USR1 2177912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177912 killed at Fri Nov 28 19:01:33 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177954 >/dev/null 2>/dev/null selfserv_9351 with PID 2177954 found at Fri Nov 28 19:01:33 CST 2025 selfserv_9351 with PID 2177954 started at Fri Nov 28 19:01:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2177954 at Fri Nov 28 19:01:33 CST 2025 kill -USR1 2177954 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177954 killed at Fri Nov 28 19:01:33 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2177995 >/dev/null 2>/dev/null selfserv_9351 with PID 2177995 found at Fri Nov 28 19:01:33 CST 2025 selfserv_9351 with PID 2177995 started at Fri Nov 28 19:01:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2177995 at Fri Nov 28 19:01:33 CST 2025 kill -USR1 2177995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2177995 killed at Fri Nov 28 19:01:33 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178041 >/dev/null 2>/dev/null selfserv_9351 with PID 2178041 found at Fri Nov 28 19:01:33 CST 2025 selfserv_9351 with PID 2178041 started at Fri Nov 28 19:01:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178041 at Fri Nov 28 19:01:34 CST 2025 kill -USR1 2178041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178041 killed at Fri Nov 28 19:01:34 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178082 >/dev/null 2>/dev/null selfserv_9351 with PID 2178082 found at Fri Nov 28 19:01:34 CST 2025 selfserv_9351 with PID 2178082 started at Fri Nov 28 19:01:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1304: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178082 at Fri Nov 28 19:01:34 CST 2025 kill -USR1 2178082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178082 killed at Fri Nov 28 19:01:34 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178129 >/dev/null 2>/dev/null selfserv_9351 with PID 2178129 found at Fri Nov 28 19:01:34 CST 2025 selfserv_9351 with PID 2178129 started at Fri Nov 28 19:01:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2178129 at Fri Nov 28 19:01:35 CST 2025 kill -USR1 2178129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178129 killed at Fri Nov 28 19:01:35 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178170 >/dev/null 2>/dev/null selfserv_9351 with PID 2178170 found at Fri Nov 28 19:01:35 CST 2025 selfserv_9351 with PID 2178170 started at Fri Nov 28 19:01:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178170 at Fri Nov 28 19:01:35 CST 2025 kill -USR1 2178170 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178170 killed at Fri Nov 28 19:01:35 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178211 >/dev/null 2>/dev/null selfserv_9351 with PID 2178211 found at Fri Nov 28 19:01:35 CST 2025 selfserv_9351 with PID 2178211 started at Fri Nov 28 19:01:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178211 at Fri Nov 28 19:01:36 CST 2025 kill -USR1 2178211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178211 killed at Fri Nov 28 19:01:36 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178253 >/dev/null 2>/dev/null selfserv_9351 with PID 2178253 found at Fri Nov 28 19:01:36 CST 2025 selfserv_9351 with PID 2178253 started at Fri Nov 28 19:01:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1308: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178253 at Fri Nov 28 19:01:36 CST 2025 kill -USR1 2178253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178253 killed at Fri Nov 28 19:01:36 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:01:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178324 >/dev/null 2>/dev/null selfserv_9351 with PID 2178324 found at Fri Nov 28 19:01:36 CST 2025 selfserv_9351 with PID 2178324 started at Fri Nov 28 19:01:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178324 at Fri Nov 28 19:01:36 CST 2025 kill -USR1 2178324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178324 killed at Fri Nov 28 19:01:36 CST 2025 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178355 >/dev/null 2>/dev/null selfserv_9351 with PID 2178355 found at Fri Nov 28 19:01:36 CST 2025 selfserv_9351 with PID 2178355 started at Fri Nov 28 19:01:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178355 at Fri Nov 28 19:01:37 CST 2025 kill -USR1 2178355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178355 killed at Fri Nov 28 19:01:37 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178383 >/dev/null 2>/dev/null selfserv_9351 with PID 2178383 found at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 with PID 2178383 started at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2178383 at Fri Nov 28 19:01:37 CST 2025 kill -USR1 2178383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178383 killed at Fri Nov 28 19:01:37 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178411 >/dev/null 2>/dev/null selfserv_9351 with PID 2178411 found at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 with PID 2178411 started at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178411 at Fri Nov 28 19:01:37 CST 2025 kill -USR1 2178411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178411 killed at Fri Nov 28 19:01:37 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178439 >/dev/null 2>/dev/null selfserv_9351 with PID 2178439 found at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 with PID 2178439 started at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2178439 at Fri Nov 28 19:01:37 CST 2025 kill -USR1 2178439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178439 killed at Fri Nov 28 19:01:37 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178467 >/dev/null 2>/dev/null selfserv_9351 with PID 2178467 found at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 with PID 2178467 started at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178467 at Fri Nov 28 19:01:37 CST 2025 kill -USR1 2178467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178467 killed at Fri Nov 28 19:01:37 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178495 >/dev/null 2>/dev/null selfserv_9351 with PID 2178495 found at Fri Nov 28 19:01:37 CST 2025 selfserv_9351 with PID 2178495 started at Fri Nov 28 19:01:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178495 at Fri Nov 28 19:01:38 CST 2025 kill -USR1 2178495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178495 killed at Fri Nov 28 19:01:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178523 >/dev/null 2>/dev/null selfserv_9351 with PID 2178523 found at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 with PID 2178523 started at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178523 at Fri Nov 28 19:01:38 CST 2025 kill -USR1 2178523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178523 killed at Fri Nov 28 19:01:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178551 >/dev/null 2>/dev/null selfserv_9351 with PID 2178551 found at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 with PID 2178551 started at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178551 at Fri Nov 28 19:01:38 CST 2025 kill -USR1 2178551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178551 killed at Fri Nov 28 19:01:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178579 >/dev/null 2>/dev/null selfserv_9351 with PID 2178579 found at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 with PID 2178579 started at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178579 at Fri Nov 28 19:01:38 CST 2025 kill -USR1 2178579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178579 killed at Fri Nov 28 19:01:38 CST 2025 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178607 >/dev/null 2>/dev/null selfserv_9351 with PID 2178607 found at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 with PID 2178607 started at Fri Nov 28 19:01:38 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178607 at Fri Nov 28 19:01:38 CST 2025 kill -USR1 2178607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178607 killed at Fri Nov 28 19:01:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178640 >/dev/null 2>/dev/null selfserv_9351 with PID 2178640 found at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 with PID 2178640 started at Fri Nov 28 19:01:39 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2178640 at Fri Nov 28 19:01:39 CST 2025 kill -USR1 2178640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178640 killed at Fri Nov 28 19:01:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178669 >/dev/null 2>/dev/null selfserv_9351 with PID 2178669 found at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 with PID 2178669 started at Fri Nov 28 19:01:39 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178669 at Fri Nov 28 19:01:39 CST 2025 kill -USR1 2178669 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178669 killed at Fri Nov 28 19:01:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178698 >/dev/null 2>/dev/null selfserv_9351 with PID 2178698 found at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 with PID 2178698 started at Fri Nov 28 19:01:39 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2178698 at Fri Nov 28 19:01:39 CST 2025 kill -USR1 2178698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178698 killed at Fri Nov 28 19:01:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178727 >/dev/null 2>/dev/null selfserv_9351 with PID 2178727 found at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 with PID 2178727 started at Fri Nov 28 19:01:39 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178727 at Fri Nov 28 19:01:39 CST 2025 kill -USR1 2178727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178727 killed at Fri Nov 28 19:01:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178762 >/dev/null 2>/dev/null selfserv_9351 with PID 2178762 found at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 with PID 2178762 started at Fri Nov 28 19:01:39 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178762 at Fri Nov 28 19:01:39 CST 2025 kill -USR1 2178762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178762 killed at Fri Nov 28 19:01:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178791 >/dev/null 2>/dev/null selfserv_9351 with PID 2178791 found at Fri Nov 28 19:01:40 CST 2025 selfserv_9351 with PID 2178791 started at Fri Nov 28 19:01:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178791 at Fri Nov 28 19:01:40 CST 2025 kill -USR1 2178791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178791 killed at Fri Nov 28 19:01:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178820 >/dev/null 2>/dev/null selfserv_9351 with PID 2178820 found at Fri Nov 28 19:01:40 CST 2025 selfserv_9351 with PID 2178820 started at Fri Nov 28 19:01:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178820 at Fri Nov 28 19:01:40 CST 2025 kill -USR1 2178820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178820 killed at Fri Nov 28 19:01:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:01:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2178849 >/dev/null 2>/dev/null selfserv_9351 with PID 2178849 found at Fri Nov 28 19:01:40 CST 2025 selfserv_9351 with PID 2178849 started at Fri Nov 28 19:01:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1269: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2178849 at Fri Nov 28 19:01:40 CST 2025 kill -USR1 2178849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178849 killed at Fri Nov 28 19:01:40 CST 2025 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1270: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/server -list ssl.sh: #1271: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1272: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1273: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_server -list ssl.sh: #1274: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1275: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #1276: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -list ssl.sh: #1277: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1278: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1279: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -list ssl.sh: #1280: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1281: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:01:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2178952 >/dev/null 2>/dev/null selfserv_9351 with PID 2178952 found at Fri Nov 28 19:01:41 CST 2025 selfserv_9351 with PID 2178952 started at Fri Nov 28 19:01:41 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2178952 at Fri Nov 28 19:01:46 CST 2025 kill -USR1 2178952 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2178952 killed at Fri Nov 28 19:01:46 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:01:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2179456 >/dev/null 2>/dev/null selfserv_9351 with PID 2179456 found at Fri Nov 28 19:01:46 CST 2025 selfserv_9351 with PID 2179456 started at Fri Nov 28 19:01:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2179456 at Fri Nov 28 19:01:52 CST 2025 kill -USR1 2179456 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2179456 killed at Fri Nov 28 19:01:52 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:01:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180186 >/dev/null 2>/dev/null selfserv_9351 with PID 2180186 found at Fri Nov 28 19:01:53 CST 2025 selfserv_9351 with PID 2180186 started at Fri Nov 28 19:01:53 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2180186 at Fri Nov 28 19:01:53 CST 2025 kill -USR1 2180186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180186 killed at Fri Nov 28 19:01:53 CST 2025 ssl.sh: SSL Client Authentication - server normal/client fips =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:01:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180252 >/dev/null 2>/dev/null selfserv_9351 with PID 2180252 found at Fri Nov 28 19:01:53 CST 2025 selfserv_9351 with PID 2180252 started at Fri Nov 28 19:01:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1409: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2180252 at Fri Nov 28 19:01:53 CST 2025 kill -USR1 2180252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180252 killed at Fri Nov 28 19:01:53 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:01:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:01:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180293 >/dev/null 2>/dev/null selfserv_9351 with PID 2180293 found at Fri Nov 28 19:01:53 CST 2025 selfserv_9351 with PID 2180293 started at Fri Nov 28 19:01:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1410: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2180293 at Fri Nov 28 19:02:17 CST 2025 kill -USR1 2180293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180293 killed at Fri Nov 28 19:02:17 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:02:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:02:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180475 >/dev/null 2>/dev/null selfserv_9351 with PID 2180475 found at Fri Nov 28 19:02:17 CST 2025 selfserv_9351 with PID 2180475 started at Fri Nov 28 19:02:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2180475 at Fri Nov 28 19:02:18 CST 2025 kill -USR1 2180475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180475 killed at Fri Nov 28 19:02:18 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:02:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:02:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180528 >/dev/null 2>/dev/null selfserv_9351 with PID 2180528 found at Fri Nov 28 19:02:18 CST 2025 selfserv_9351 with PID 2180528 started at Fri Nov 28 19:02:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1412: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2180528 at Fri Nov 28 19:02:18 CST 2025 kill -USR1 2180528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180528 killed at Fri Nov 28 19:02:18 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:02:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:02:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180569 >/dev/null 2>/dev/null selfserv_9351 with PID 2180569 found at Fri Nov 28 19:02:18 CST 2025 selfserv_9351 with PID 2180569 started at Fri Nov 28 19:02:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1413: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2180569 at Fri Nov 28 19:02:41 CST 2025 kill -USR1 2180569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180569 killed at Fri Nov 28 19:02:41 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:02:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:02:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180709 >/dev/null 2>/dev/null selfserv_9351 with PID 2180709 found at Fri Nov 28 19:02:41 CST 2025 selfserv_9351 with PID 2180709 started at Fri Nov 28 19:02:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1414: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2180709 at Fri Nov 28 19:02:41 CST 2025 kill -USR1 2180709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180709 killed at Fri Nov 28 19:02:42 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:02:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:02:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180766 >/dev/null 2>/dev/null selfserv_9351 with PID 2180766 found at Fri Nov 28 19:02:42 CST 2025 selfserv_9351 with PID 2180766 started at Fri Nov 28 19:02:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1415: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2180766 at Fri Nov 28 19:02:42 CST 2025 kill -USR1 2180766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180766 killed at Fri Nov 28 19:02:42 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:02:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:02:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180807 >/dev/null 2>/dev/null selfserv_9351 with PID 2180807 found at Fri Nov 28 19:02:42 CST 2025 selfserv_9351 with PID 2180807 started at Fri Nov 28 19:02:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1416: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2180807 at Fri Nov 28 19:03:06 CST 2025 kill -USR1 2180807 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180807 killed at Fri Nov 28 19:03:06 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2180985 >/dev/null 2>/dev/null selfserv_9351 with PID 2180985 found at Fri Nov 28 19:03:06 CST 2025 selfserv_9351 with PID 2180985 started at Fri Nov 28 19:03:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2180985 at Fri Nov 28 19:03:06 CST 2025 kill -USR1 2180985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2180985 killed at Fri Nov 28 19:03:06 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181038 >/dev/null 2>/dev/null selfserv_9351 with PID 2181038 found at Fri Nov 28 19:03:06 CST 2025 selfserv_9351 with PID 2181038 started at Fri Nov 28 19:03:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181038 at Fri Nov 28 19:03:07 CST 2025 kill -USR1 2181038 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181038 killed at Fri Nov 28 19:03:07 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:03:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181079 >/dev/null 2>/dev/null selfserv_9351 with PID 2181079 found at Fri Nov 28 19:03:07 CST 2025 selfserv_9351 with PID 2181079 started at Fri Nov 28 19:03:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181079 at Fri Nov 28 19:03:31 CST 2025 kill -USR1 2181079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181079 killed at Fri Nov 28 19:03:31 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181224 >/dev/null 2>/dev/null selfserv_9351 with PID 2181224 found at Fri Nov 28 19:03:31 CST 2025 selfserv_9351 with PID 2181224 started at Fri Nov 28 19:03:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1420: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2181224 at Fri Nov 28 19:03:31 CST 2025 kill -USR1 2181224 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181224 killed at Fri Nov 28 19:03:31 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181277 >/dev/null 2>/dev/null selfserv_9351 with PID 2181277 found at Fri Nov 28 19:03:31 CST 2025 selfserv_9351 with PID 2181277 started at Fri Nov 28 19:03:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181277 at Fri Nov 28 19:03:32 CST 2025 kill -USR1 2181277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181277 killed at Fri Nov 28 19:03:32 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:03:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181322 >/dev/null 2>/dev/null selfserv_9351 with PID 2181322 found at Fri Nov 28 19:03:32 CST 2025 selfserv_9351 with PID 2181322 started at Fri Nov 28 19:03:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181322 at Fri Nov 28 19:03:55 CST 2025 kill -USR1 2181322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181322 killed at Fri Nov 28 19:03:55 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181438 >/dev/null 2>/dev/null selfserv_9351 with PID 2181438 found at Fri Nov 28 19:03:55 CST 2025 selfserv_9351 with PID 2181438 started at Fri Nov 28 19:03:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2181438 at Fri Nov 28 19:03:55 CST 2025 kill -USR1 2181438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181438 killed at Fri Nov 28 19:03:55 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181483 >/dev/null 2>/dev/null selfserv_9351 with PID 2181483 found at Fri Nov 28 19:03:55 CST 2025 selfserv_9351 with PID 2181483 started at Fri Nov 28 19:03:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2181483 at Fri Nov 28 19:03:55 CST 2025 kill -USR1 2181483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181483 killed at Fri Nov 28 19:03:56 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181529 >/dev/null 2>/dev/null selfserv_9351 with PID 2181529 found at Fri Nov 28 19:03:56 CST 2025 selfserv_9351 with PID 2181529 started at Fri Nov 28 19:03:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1425: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181529 at Fri Nov 28 19:03:56 CST 2025 kill -USR1 2181529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181529 killed at Fri Nov 28 19:03:56 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:03:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181574 >/dev/null 2>/dev/null selfserv_9351 with PID 2181574 found at Fri Nov 28 19:03:56 CST 2025 selfserv_9351 with PID 2181574 started at Fri Nov 28 19:03:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1426: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2181574 at Fri Nov 28 19:03:56 CST 2025 kill -USR1 2181574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181574 killed at Fri Nov 28 19:03:56 CST 2025 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:03:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:03:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181623 >/dev/null 2>/dev/null selfserv_9351 with PID 2181623 found at Fri Nov 28 19:03:56 CST 2025 selfserv_9351 with PID 2181623 started at Fri Nov 28 19:03:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1427: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181623 at Fri Nov 28 19:04:20 CST 2025 kill -USR1 2181623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181623 killed at Fri Nov 28 19:04:20 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:04:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:04:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181808 >/dev/null 2>/dev/null selfserv_9351 with PID 2181808 found at Fri Nov 28 19:04:21 CST 2025 selfserv_9351 with PID 2181808 started at Fri Nov 28 19:04:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1428: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2181808 at Fri Nov 28 19:04:21 CST 2025 kill -USR1 2181808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181808 killed at Fri Nov 28 19:04:21 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:04:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:04:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181857 >/dev/null 2>/dev/null selfserv_9351 with PID 2181857 found at Fri Nov 28 19:04:21 CST 2025 selfserv_9351 with PID 2181857 started at Fri Nov 28 19:04:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1429: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2181857 at Fri Nov 28 19:04:44 CST 2025 kill -USR1 2181857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181857 killed at Fri Nov 28 19:04:44 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:04:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:04:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2181992 >/dev/null 2>/dev/null selfserv_9351 with PID 2181992 found at Fri Nov 28 19:04:44 CST 2025 selfserv_9351 with PID 2181992 started at Fri Nov 28 19:04:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2181992 at Fri Nov 28 19:04:44 CST 2025 kill -USR1 2181992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2181992 killed at Fri Nov 28 19:04:44 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:04:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:04:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182041 >/dev/null 2>/dev/null selfserv_9351 with PID 2182041 found at Fri Nov 28 19:04:44 CST 2025 selfserv_9351 with PID 2182041 started at Fri Nov 28 19:04:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2182041 at Fri Nov 28 19:05:08 CST 2025 kill -USR1 2182041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182041 killed at Fri Nov 28 19:05:08 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:05:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182230 >/dev/null 2>/dev/null selfserv_9351 with PID 2182230 found at Fri Nov 28 19:05:09 CST 2025 selfserv_9351 with PID 2182230 started at Fri Nov 28 19:05:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182230 at Fri Nov 28 19:05:09 CST 2025 kill -USR1 2182230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182230 killed at Fri Nov 28 19:05:09 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:05:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182279 >/dev/null 2>/dev/null selfserv_9351 with PID 2182279 found at Fri Nov 28 19:05:09 CST 2025 selfserv_9351 with PID 2182279 started at Fri Nov 28 19:05:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2182279 at Fri Nov 28 19:05:33 CST 2025 kill -USR1 2182279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182279 killed at Fri Nov 28 19:05:33 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:05:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182423 >/dev/null 2>/dev/null selfserv_9351 with PID 2182423 found at Fri Nov 28 19:05:33 CST 2025 selfserv_9351 with PID 2182423 started at Fri Nov 28 19:05:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1434: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182423 at Fri Nov 28 19:05:33 CST 2025 kill -USR1 2182423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182423 killed at Fri Nov 28 19:05:33 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:05:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182472 >/dev/null 2>/dev/null selfserv_9351 with PID 2182472 found at Fri Nov 28 19:05:33 CST 2025 selfserv_9351 with PID 2182472 started at Fri Nov 28 19:05:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2182472 at Fri Nov 28 19:05:56 CST 2025 kill -USR1 2182472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182472 killed at Fri Nov 28 19:05:56 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:05:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182589 >/dev/null 2>/dev/null selfserv_9351 with PID 2182589 found at Fri Nov 28 19:05:57 CST 2025 selfserv_9351 with PID 2182589 started at Fri Nov 28 19:05:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182589 at Fri Nov 28 19:05:57 CST 2025 kill -USR1 2182589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182589 killed at Fri Nov 28 19:05:57 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:05:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182630 >/dev/null 2>/dev/null selfserv_9351 with PID 2182630 found at Fri Nov 28 19:05:57 CST 2025 selfserv_9351 with PID 2182630 started at Fri Nov 28 19:05:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182630 at Fri Nov 28 19:05:57 CST 2025 kill -USR1 2182630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182630 killed at Fri Nov 28 19:05:57 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:05:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182671 >/dev/null 2>/dev/null selfserv_9351 with PID 2182671 found at Fri Nov 28 19:05:57 CST 2025 selfserv_9351 with PID 2182671 started at Fri Nov 28 19:05:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182671 at Fri Nov 28 19:05:57 CST 2025 kill -USR1 2182671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182671 killed at Fri Nov 28 19:05:57 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:05:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182718 >/dev/null 2>/dev/null selfserv_9351 with PID 2182718 found at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 with PID 2182718 started at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182718 at Fri Nov 28 19:05:58 CST 2025 kill -USR1 2182718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182718 killed at Fri Nov 28 19:05:58 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182765 >/dev/null 2>/dev/null selfserv_9351 with PID 2182765 found at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 with PID 2182765 started at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1440: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182765 at Fri Nov 28 19:05:58 CST 2025 kill -USR1 2182765 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182765 killed at Fri Nov 28 19:05:58 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182824 >/dev/null 2>/dev/null selfserv_9351 with PID 2182824 found at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 with PID 2182824 started at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2182824 at Fri Nov 28 19:05:58 CST 2025 kill -USR1 2182824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182824 killed at Fri Nov 28 19:05:58 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182875 >/dev/null 2>/dev/null selfserv_9351 with PID 2182875 found at Fri Nov 28 19:05:58 CST 2025 selfserv_9351 with PID 2182875 started at Fri Nov 28 19:05:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1442: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182875 at Fri Nov 28 19:05:59 CST 2025 kill -USR1 2182875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182875 killed at Fri Nov 28 19:05:59 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182922 >/dev/null 2>/dev/null selfserv_9351 with PID 2182922 found at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 with PID 2182922 started at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1443: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2182922 at Fri Nov 28 19:05:59 CST 2025 kill -USR1 2182922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182922 killed at Fri Nov 28 19:05:59 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2182969 >/dev/null 2>/dev/null selfserv_9351 with PID 2182969 found at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 with PID 2182969 started at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2182969 at Fri Nov 28 19:05:59 CST 2025 kill -USR1 2182969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2182969 killed at Fri Nov 28 19:05:59 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183016 >/dev/null 2>/dev/null selfserv_9351 with PID 2183016 found at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 with PID 2183016 started at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1445: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183016 at Fri Nov 28 19:05:59 CST 2025 kill -USR1 2183016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183016 killed at Fri Nov 28 19:05:59 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:05:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:05:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183069 >/dev/null 2>/dev/null selfserv_9351 with PID 2183069 found at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 with PID 2183069 started at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1446: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2183069 at Fri Nov 28 19:06:00 CST 2025 kill -USR1 2183069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183069 killed at Fri Nov 28 19:06:00 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183116 >/dev/null 2>/dev/null selfserv_9351 with PID 2183116 found at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 with PID 2183116 started at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1447: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2183116 at Fri Nov 28 19:06:00 CST 2025 kill -USR1 2183116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183116 killed at Fri Nov 28 19:06:00 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183163 >/dev/null 2>/dev/null selfserv_9351 with PID 2183163 found at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 with PID 2183163 started at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1448: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2183163 at Fri Nov 28 19:06:00 CST 2025 kill -USR1 2183163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183163 killed at Fri Nov 28 19:06:00 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183194 >/dev/null 2>/dev/null selfserv_9351 with PID 2183194 found at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 with PID 2183194 started at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183194 at Fri Nov 28 19:06:00 CST 2025 kill -USR1 2183194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183194 killed at Fri Nov 28 19:06:00 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183229 >/dev/null 2>/dev/null selfserv_9351 with PID 2183229 found at Fri Nov 28 19:06:00 CST 2025 selfserv_9351 with PID 2183229 started at Fri Nov 28 19:06:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2183229 at Fri Nov 28 19:06:01 CST 2025 kill -USR1 2183229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183229 killed at Fri Nov 28 19:06:01 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183260 >/dev/null 2>/dev/null selfserv_9351 with PID 2183260 found at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 with PID 2183260 started at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2183260 at Fri Nov 28 19:06:01 CST 2025 kill -USR1 2183260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183260 killed at Fri Nov 28 19:06:01 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183291 >/dev/null 2>/dev/null selfserv_9351 with PID 2183291 found at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 with PID 2183291 started at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2183291 at Fri Nov 28 19:06:01 CST 2025 kill -USR1 2183291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183291 killed at Fri Nov 28 19:06:01 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183322 >/dev/null 2>/dev/null selfserv_9351 with PID 2183322 found at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 with PID 2183322 started at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2183322 at Fri Nov 28 19:06:01 CST 2025 kill -USR1 2183322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183322 killed at Fri Nov 28 19:06:01 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183369 >/dev/null 2>/dev/null selfserv_9351 with PID 2183369 found at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 with PID 2183369 started at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1414: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2183369 at Fri Nov 28 19:06:01 CST 2025 kill -USR1 2183369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183369 killed at Fri Nov 28 19:06:01 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:06:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183436 >/dev/null 2>/dev/null selfserv_9351 with PID 2183436 found at Fri Nov 28 19:06:02 CST 2025 selfserv_9351 with PID 2183436 started at Fri Nov 28 19:06:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1415: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2183436 at Fri Nov 28 19:06:02 CST 2025 kill -USR1 2183436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183436 killed at Fri Nov 28 19:06:02 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:06:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183467 >/dev/null 2>/dev/null selfserv_9351 with PID 2183467 found at Fri Nov 28 19:06:02 CST 2025 selfserv_9351 with PID 2183467 started at Fri Nov 28 19:06:02 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:06:02 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:06:03 CST 2025 ssl.sh: #1416: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2183467 at Fri Nov 28 19:06:03 CST 2025 kill -USR1 2183467 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183467 killed at Fri Nov 28 19:06:03 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:06:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183507 >/dev/null 2>/dev/null selfserv_9351 with PID 2183507 found at Fri Nov 28 19:06:03 CST 2025 selfserv_9351 with PID 2183507 started at Fri Nov 28 19:06:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183507 at Fri Nov 28 19:06:03 CST 2025 kill -USR1 2183507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183507 killed at Fri Nov 28 19:06:03 CST 2025 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183538 >/dev/null 2>/dev/null selfserv_9351 with PID 2183538 found at Fri Nov 28 19:06:03 CST 2025 selfserv_9351 with PID 2183538 started at Fri Nov 28 19:06:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183538 at Fri Nov 28 19:06:03 CST 2025 kill -USR1 2183538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183538 killed at Fri Nov 28 19:06:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183571 >/dev/null 2>/dev/null selfserv_9351 with PID 2183571 found at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 with PID 2183571 started at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2183571 at Fri Nov 28 19:06:04 CST 2025 kill -USR1 2183571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183571 killed at Fri Nov 28 19:06:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183599 >/dev/null 2>/dev/null selfserv_9351 with PID 2183599 found at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 with PID 2183599 started at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183599 at Fri Nov 28 19:06:04 CST 2025 kill -USR1 2183599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183599 killed at Fri Nov 28 19:06:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183627 >/dev/null 2>/dev/null selfserv_9351 with PID 2183627 found at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 with PID 2183627 started at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2183627 at Fri Nov 28 19:06:04 CST 2025 kill -USR1 2183627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183627 killed at Fri Nov 28 19:06:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183655 >/dev/null 2>/dev/null selfserv_9351 with PID 2183655 found at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 with PID 2183655 started at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183655 at Fri Nov 28 19:06:04 CST 2025 kill -USR1 2183655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183655 killed at Fri Nov 28 19:06:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183683 >/dev/null 2>/dev/null selfserv_9351 with PID 2183683 found at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 with PID 2183683 started at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183683 at Fri Nov 28 19:06:04 CST 2025 kill -USR1 2183683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183683 killed at Fri Nov 28 19:06:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183717 >/dev/null 2>/dev/null selfserv_9351 with PID 2183717 found at Fri Nov 28 19:06:04 CST 2025 selfserv_9351 with PID 2183717 started at Fri Nov 28 19:06:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183717 at Fri Nov 28 19:06:05 CST 2025 kill -USR1 2183717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183717 killed at Fri Nov 28 19:06:05 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183745 >/dev/null 2>/dev/null selfserv_9351 with PID 2183745 found at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 with PID 2183745 started at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183745 at Fri Nov 28 19:06:05 CST 2025 kill -USR1 2183745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183745 killed at Fri Nov 28 19:06:05 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183773 >/dev/null 2>/dev/null selfserv_9351 with PID 2183773 found at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 with PID 2183773 started at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183773 at Fri Nov 28 19:06:05 CST 2025 kill -USR1 2183773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183773 killed at Fri Nov 28 19:06:05 CST 2025 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183801 >/dev/null 2>/dev/null selfserv_9351 with PID 2183801 found at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 with PID 2183801 started at Fri Nov 28 19:06:05 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183801 at Fri Nov 28 19:06:05 CST 2025 kill -USR1 2183801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183801 killed at Fri Nov 28 19:06:05 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183830 >/dev/null 2>/dev/null selfserv_9351 with PID 2183830 found at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 with PID 2183830 started at Fri Nov 28 19:06:05 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2183830 at Fri Nov 28 19:06:05 CST 2025 kill -USR1 2183830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183830 killed at Fri Nov 28 19:06:05 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183860 >/dev/null 2>/dev/null selfserv_9351 with PID 2183860 found at Fri Nov 28 19:06:05 CST 2025 selfserv_9351 with PID 2183860 started at Fri Nov 28 19:06:05 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183860 at Fri Nov 28 19:06:06 CST 2025 kill -USR1 2183860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183860 killed at Fri Nov 28 19:06:06 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183889 >/dev/null 2>/dev/null selfserv_9351 with PID 2183889 found at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 with PID 2183889 started at Fri Nov 28 19:06:06 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2183889 at Fri Nov 28 19:06:06 CST 2025 kill -USR1 2183889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183889 killed at Fri Nov 28 19:06:06 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183918 >/dev/null 2>/dev/null selfserv_9351 with PID 2183918 found at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 with PID 2183918 started at Fri Nov 28 19:06:06 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183918 at Fri Nov 28 19:06:06 CST 2025 kill -USR1 2183918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183918 killed at Fri Nov 28 19:06:06 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183947 >/dev/null 2>/dev/null selfserv_9351 with PID 2183947 found at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 with PID 2183947 started at Fri Nov 28 19:06:06 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183947 at Fri Nov 28 19:06:06 CST 2025 kill -USR1 2183947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183947 killed at Fri Nov 28 19:06:06 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2183976 >/dev/null 2>/dev/null selfserv_9351 with PID 2183976 found at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 with PID 2183976 started at Fri Nov 28 19:06:06 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2183976 at Fri Nov 28 19:06:06 CST 2025 kill -USR1 2183976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2183976 killed at Fri Nov 28 19:06:06 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2184005 >/dev/null 2>/dev/null selfserv_9351 with PID 2184005 found at Fri Nov 28 19:06:06 CST 2025 selfserv_9351 with PID 2184005 started at Fri Nov 28 19:06:06 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2184005 at Fri Nov 28 19:06:07 CST 2025 kill -USR1 2184005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2184005 killed at Fri Nov 28 19:06:07 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:06:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2184034 >/dev/null 2>/dev/null selfserv_9351 with PID 2184034 found at Fri Nov 28 19:06:07 CST 2025 selfserv_9351 with PID 2184034 started at Fri Nov 28 19:06:07 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1435: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2184034 at Fri Nov 28 19:06:07 CST 2025 kill -USR1 2184034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2184034 killed at Fri Nov 28 19:06:07 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:06:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2184063 >/dev/null 2>/dev/null selfserv_9351 with PID 2184063 found at Fri Nov 28 19:06:07 CST 2025 selfserv_9351 with PID 2184063 started at Fri Nov 28 19:06:07 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2184063 at Fri Nov 28 19:06:12 CST 2025 kill -USR1 2184063 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2184063 killed at Fri Nov 28 19:06:12 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:06:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2184570 >/dev/null 2>/dev/null selfserv_9351 with PID 2184570 found at Fri Nov 28 19:06:12 CST 2025 selfserv_9351 with PID 2184570 started at Fri Nov 28 19:06:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2184570 at Fri Nov 28 19:06:19 CST 2025 kill -USR1 2184570 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2184570 killed at Fri Nov 28 19:06:19 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:06:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185330 >/dev/null 2>/dev/null selfserv_9351 with PID 2185330 found at Fri Nov 28 19:06:19 CST 2025 selfserv_9351 with PID 2185330 started at Fri Nov 28 19:06:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1563: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2185330 at Fri Nov 28 19:06:20 CST 2025 kill -USR1 2185330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185330 killed at Fri Nov 28 19:06:20 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:06:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185375 >/dev/null 2>/dev/null selfserv_9351 with PID 2185375 found at Fri Nov 28 19:06:20 CST 2025 selfserv_9351 with PID 2185375 started at Fri Nov 28 19:06:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1564: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2185375 at Fri Nov 28 19:06:46 CST 2025 kill -USR1 2185375 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185375 killed at Fri Nov 28 19:06:46 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:06:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185522 >/dev/null 2>/dev/null selfserv_9351 with PID 2185522 found at Fri Nov 28 19:06:46 CST 2025 selfserv_9351 with PID 2185522 started at Fri Nov 28 19:06:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2185522 at Fri Nov 28 19:06:46 CST 2025 kill -USR1 2185522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185522 killed at Fri Nov 28 19:06:46 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:06:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185575 >/dev/null 2>/dev/null selfserv_9351 with PID 2185575 found at Fri Nov 28 19:06:47 CST 2025 selfserv_9351 with PID 2185575 started at Fri Nov 28 19:06:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1566: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2185575 at Fri Nov 28 19:06:47 CST 2025 kill -USR1 2185575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185575 killed at Fri Nov 28 19:06:47 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:06:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:06:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185616 >/dev/null 2>/dev/null selfserv_9351 with PID 2185616 found at Fri Nov 28 19:06:47 CST 2025 selfserv_9351 with PID 2185616 started at Fri Nov 28 19:06:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1567: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2185616 at Fri Nov 28 19:07:10 CST 2025 kill -USR1 2185616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185616 killed at Fri Nov 28 19:07:10 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:07:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:07:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185797 >/dev/null 2>/dev/null selfserv_9351 with PID 2185797 found at Fri Nov 28 19:07:10 CST 2025 selfserv_9351 with PID 2185797 started at Fri Nov 28 19:07:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2185797 at Fri Nov 28 19:07:11 CST 2025 kill -USR1 2185797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185797 killed at Fri Nov 28 19:07:11 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:07:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:07:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185850 >/dev/null 2>/dev/null selfserv_9351 with PID 2185850 found at Fri Nov 28 19:07:11 CST 2025 selfserv_9351 with PID 2185850 started at Fri Nov 28 19:07:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1569: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2185850 at Fri Nov 28 19:07:11 CST 2025 kill -USR1 2185850 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185850 killed at Fri Nov 28 19:07:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:07:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:07:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2185895 >/dev/null 2>/dev/null selfserv_9351 with PID 2185895 found at Fri Nov 28 19:07:11 CST 2025 selfserv_9351 with PID 2185895 started at Fri Nov 28 19:07:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1570: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2185895 at Fri Nov 28 19:07:38 CST 2025 kill -USR1 2185895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2185895 killed at Fri Nov 28 19:07:38 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:07:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:07:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186037 >/dev/null 2>/dev/null selfserv_9351 with PID 2186037 found at Fri Nov 28 19:07:38 CST 2025 selfserv_9351 with PID 2186037 started at Fri Nov 28 19:07:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2186037 at Fri Nov 28 19:07:38 CST 2025 kill -USR1 2186037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186037 killed at Fri Nov 28 19:07:38 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:07:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:07:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186090 >/dev/null 2>/dev/null selfserv_9351 with PID 2186090 found at Fri Nov 28 19:07:38 CST 2025 selfserv_9351 with PID 2186090 started at Fri Nov 28 19:07:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186090 at Fri Nov 28 19:07:39 CST 2025 kill -USR1 2186090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186090 killed at Fri Nov 28 19:07:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:07:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:07:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186135 >/dev/null 2>/dev/null selfserv_9351 with PID 2186135 found at Fri Nov 28 19:07:39 CST 2025 selfserv_9351 with PID 2186135 started at Fri Nov 28 19:07:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186135 at Fri Nov 28 19:08:05 CST 2025 kill -USR1 2186135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186135 killed at Fri Nov 28 19:08:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186326 >/dev/null 2>/dev/null selfserv_9351 with PID 2186326 found at Fri Nov 28 19:08:05 CST 2025 selfserv_9351 with PID 2186326 started at Fri Nov 28 19:08:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1574: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2186326 at Fri Nov 28 19:08:05 CST 2025 kill -USR1 2186326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186326 killed at Fri Nov 28 19:08:05 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186379 >/dev/null 2>/dev/null selfserv_9351 with PID 2186379 found at Fri Nov 28 19:08:05 CST 2025 selfserv_9351 with PID 2186379 started at Fri Nov 28 19:08:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186379 at Fri Nov 28 19:08:06 CST 2025 kill -USR1 2186379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186379 killed at Fri Nov 28 19:08:06 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:08:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186421 >/dev/null 2>/dev/null selfserv_9351 with PID 2186421 found at Fri Nov 28 19:08:06 CST 2025 selfserv_9351 with PID 2186421 started at Fri Nov 28 19:08:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186421 at Fri Nov 28 19:08:29 CST 2025 kill -USR1 2186421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186421 killed at Fri Nov 28 19:08:29 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186556 >/dev/null 2>/dev/null selfserv_9351 with PID 2186556 found at Fri Nov 28 19:08:29 CST 2025 selfserv_9351 with PID 2186556 started at Fri Nov 28 19:08:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2186556 at Fri Nov 28 19:08:30 CST 2025 kill -USR1 2186556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186556 killed at Fri Nov 28 19:08:30 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186607 >/dev/null 2>/dev/null selfserv_9351 with PID 2186607 found at Fri Nov 28 19:08:30 CST 2025 selfserv_9351 with PID 2186607 started at Fri Nov 28 19:08:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2186607 at Fri Nov 28 19:08:30 CST 2025 kill -USR1 2186607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186607 killed at Fri Nov 28 19:08:30 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186652 >/dev/null 2>/dev/null selfserv_9351 with PID 2186652 found at Fri Nov 28 19:08:30 CST 2025 selfserv_9351 with PID 2186652 started at Fri Nov 28 19:08:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1579: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186652 at Fri Nov 28 19:08:30 CST 2025 kill -USR1 2186652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186652 killed at Fri Nov 28 19:08:30 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186701 >/dev/null 2>/dev/null selfserv_9351 with PID 2186701 found at Fri Nov 28 19:08:31 CST 2025 selfserv_9351 with PID 2186701 started at Fri Nov 28 19:08:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1580: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2186701 at Fri Nov 28 19:08:31 CST 2025 kill -USR1 2186701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186701 killed at Fri Nov 28 19:08:31 CST 2025 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:08:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186750 >/dev/null 2>/dev/null selfserv_9351 with PID 2186750 found at Fri Nov 28 19:08:31 CST 2025 selfserv_9351 with PID 2186750 started at Fri Nov 28 19:08:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1581: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186750 at Fri Nov 28 19:08:57 CST 2025 kill -USR1 2186750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186750 killed at Fri Nov 28 19:08:57 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:08:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186871 >/dev/null 2>/dev/null selfserv_9351 with PID 2186871 found at Fri Nov 28 19:08:57 CST 2025 selfserv_9351 with PID 2186871 started at Fri Nov 28 19:08:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1582: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2186871 at Fri Nov 28 19:08:58 CST 2025 kill -USR1 2186871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186871 killed at Fri Nov 28 19:08:58 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:08:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:08:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2186920 >/dev/null 2>/dev/null selfserv_9351 with PID 2186920 found at Fri Nov 28 19:08:58 CST 2025 selfserv_9351 with PID 2186920 started at Fri Nov 28 19:08:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1583: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2186920 at Fri Nov 28 19:09:21 CST 2025 kill -USR1 2186920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2186920 killed at Fri Nov 28 19:09:21 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:09:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:09:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187106 >/dev/null 2>/dev/null selfserv_9351 with PID 2187106 found at Fri Nov 28 19:09:21 CST 2025 selfserv_9351 with PID 2187106 started at Fri Nov 28 19:09:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187106 at Fri Nov 28 19:09:21 CST 2025 kill -USR1 2187106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187106 killed at Fri Nov 28 19:09:21 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:09:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:09:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187162 >/dev/null 2>/dev/null selfserv_9351 with PID 2187162 found at Fri Nov 28 19:09:22 CST 2025 selfserv_9351 with PID 2187162 started at Fri Nov 28 19:09:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2187162 at Fri Nov 28 19:09:48 CST 2025 kill -USR1 2187162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187162 killed at Fri Nov 28 19:09:48 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:09:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:09:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187297 >/dev/null 2>/dev/null selfserv_9351 with PID 2187297 found at Fri Nov 28 19:09:48 CST 2025 selfserv_9351 with PID 2187297 started at Fri Nov 28 19:09:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1586: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187297 at Fri Nov 28 19:09:48 CST 2025 kill -USR1 2187297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187297 killed at Fri Nov 28 19:09:48 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:09:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:09:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187346 >/dev/null 2>/dev/null selfserv_9351 with PID 2187346 found at Fri Nov 28 19:09:48 CST 2025 selfserv_9351 with PID 2187346 started at Fri Nov 28 19:09:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2187346 at Fri Nov 28 19:10:14 CST 2025 kill -USR1 2187346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187346 killed at Fri Nov 28 19:10:14 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:10:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187555 >/dev/null 2>/dev/null selfserv_9351 with PID 2187555 found at Fri Nov 28 19:10:14 CST 2025 selfserv_9351 with PID 2187555 started at Fri Nov 28 19:10:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1588: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187555 at Fri Nov 28 19:10:15 CST 2025 kill -USR1 2187555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187555 killed at Fri Nov 28 19:10:15 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:10:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187604 >/dev/null 2>/dev/null selfserv_9351 with PID 2187604 found at Fri Nov 28 19:10:15 CST 2025 selfserv_9351 with PID 2187604 started at Fri Nov 28 19:10:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2187604 at Fri Nov 28 19:10:38 CST 2025 kill -USR1 2187604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187604 killed at Fri Nov 28 19:10:38 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:10:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187734 >/dev/null 2>/dev/null selfserv_9351 with PID 2187734 found at Fri Nov 28 19:10:38 CST 2025 selfserv_9351 with PID 2187734 started at Fri Nov 28 19:10:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187734 at Fri Nov 28 19:10:39 CST 2025 kill -USR1 2187734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187734 killed at Fri Nov 28 19:10:39 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:10:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187779 >/dev/null 2>/dev/null selfserv_9351 with PID 2187779 found at Fri Nov 28 19:10:39 CST 2025 selfserv_9351 with PID 2187779 started at Fri Nov 28 19:10:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187779 at Fri Nov 28 19:10:39 CST 2025 kill -USR1 2187779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187779 killed at Fri Nov 28 19:10:39 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:10:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187820 >/dev/null 2>/dev/null selfserv_9351 with PID 2187820 found at Fri Nov 28 19:10:39 CST 2025 selfserv_9351 with PID 2187820 started at Fri Nov 28 19:10:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1592: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187820 at Fri Nov 28 19:10:40 CST 2025 kill -USR1 2187820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187820 killed at Fri Nov 28 19:10:40 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187897 >/dev/null 2>/dev/null selfserv_9351 with PID 2187897 found at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 with PID 2187897 started at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187897 at Fri Nov 28 19:10:40 CST 2025 kill -USR1 2187897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187897 killed at Fri Nov 28 19:10:40 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187928 >/dev/null 2>/dev/null selfserv_9351 with PID 2187928 found at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 with PID 2187928 started at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187928 at Fri Nov 28 19:10:40 CST 2025 kill -USR1 2187928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187928 killed at Fri Nov 28 19:10:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187956 >/dev/null 2>/dev/null selfserv_9351 with PID 2187956 found at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 with PID 2187956 started at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2187956 at Fri Nov 28 19:10:40 CST 2025 kill -USR1 2187956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187956 killed at Fri Nov 28 19:10:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2187988 >/dev/null 2>/dev/null selfserv_9351 with PID 2187988 found at Fri Nov 28 19:10:40 CST 2025 selfserv_9351 with PID 2187988 started at Fri Nov 28 19:10:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2187988 at Fri Nov 28 19:10:41 CST 2025 kill -USR1 2187988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2187988 killed at Fri Nov 28 19:10:41 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188016 >/dev/null 2>/dev/null selfserv_9351 with PID 2188016 found at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 with PID 2188016 started at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2188016 at Fri Nov 28 19:10:41 CST 2025 kill -USR1 2188016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188016 killed at Fri Nov 28 19:10:41 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188044 >/dev/null 2>/dev/null selfserv_9351 with PID 2188044 found at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 with PID 2188044 started at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188044 at Fri Nov 28 19:10:41 CST 2025 kill -USR1 2188044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188044 killed at Fri Nov 28 19:10:41 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188072 >/dev/null 2>/dev/null selfserv_9351 with PID 2188072 found at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 with PID 2188072 started at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188072 at Fri Nov 28 19:10:41 CST 2025 kill -USR1 2188072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188072 killed at Fri Nov 28 19:10:41 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188100 >/dev/null 2>/dev/null selfserv_9351 with PID 2188100 found at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 with PID 2188100 started at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188100 at Fri Nov 28 19:10:41 CST 2025 kill -USR1 2188100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188100 killed at Fri Nov 28 19:10:41 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188132 >/dev/null 2>/dev/null selfserv_9351 with PID 2188132 found at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 with PID 2188132 started at Fri Nov 28 19:10:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188132 at Fri Nov 28 19:10:42 CST 2025 kill -USR1 2188132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188132 killed at Fri Nov 28 19:10:42 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188160 >/dev/null 2>/dev/null selfserv_9351 with PID 2188160 found at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 with PID 2188160 started at Fri Nov 28 19:10:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188160 at Fri Nov 28 19:10:42 CST 2025 kill -USR1 2188160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188160 killed at Fri Nov 28 19:10:42 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188188 >/dev/null 2>/dev/null selfserv_9351 with PID 2188188 found at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 with PID 2188188 started at Fri Nov 28 19:10:42 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188188 at Fri Nov 28 19:10:42 CST 2025 kill -USR1 2188188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188188 killed at Fri Nov 28 19:10:42 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188217 >/dev/null 2>/dev/null selfserv_9351 with PID 2188217 found at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 with PID 2188217 started at Fri Nov 28 19:10:42 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2188217 at Fri Nov 28 19:10:42 CST 2025 kill -USR1 2188217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188217 killed at Fri Nov 28 19:10:42 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188247 >/dev/null 2>/dev/null selfserv_9351 with PID 2188247 found at Fri Nov 28 19:10:42 CST 2025 selfserv_9351 with PID 2188247 started at Fri Nov 28 19:10:42 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188247 at Fri Nov 28 19:10:42 CST 2025 kill -USR1 2188247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188247 killed at Fri Nov 28 19:10:43 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188276 >/dev/null 2>/dev/null selfserv_9351 with PID 2188276 found at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 with PID 2188276 started at Fri Nov 28 19:10:43 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2188276 at Fri Nov 28 19:10:43 CST 2025 kill -USR1 2188276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188276 killed at Fri Nov 28 19:10:43 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188305 >/dev/null 2>/dev/null selfserv_9351 with PID 2188305 found at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 with PID 2188305 started at Fri Nov 28 19:10:43 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188305 at Fri Nov 28 19:10:43 CST 2025 kill -USR1 2188305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188305 killed at Fri Nov 28 19:10:43 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188334 >/dev/null 2>/dev/null selfserv_9351 with PID 2188334 found at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 with PID 2188334 started at Fri Nov 28 19:10:43 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188334 at Fri Nov 28 19:10:43 CST 2025 kill -USR1 2188334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188334 killed at Fri Nov 28 19:10:43 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188363 >/dev/null 2>/dev/null selfserv_9351 with PID 2188363 found at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 with PID 2188363 started at Fri Nov 28 19:10:43 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188363 at Fri Nov 28 19:10:43 CST 2025 kill -USR1 2188363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188363 killed at Fri Nov 28 19:10:43 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188397 >/dev/null 2>/dev/null selfserv_9351 with PID 2188397 found at Fri Nov 28 19:10:43 CST 2025 selfserv_9351 with PID 2188397 started at Fri Nov 28 19:10:43 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188397 at Fri Nov 28 19:10:44 CST 2025 kill -USR1 2188397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188397 killed at Fri Nov 28 19:10:44 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:10:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:10:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2188426 >/dev/null 2>/dev/null selfserv_9351 with PID 2188426 found at Fri Nov 28 19:10:44 CST 2025 selfserv_9351 with PID 2188426 started at Fri Nov 28 19:10:44 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1581: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2188426 at Fri Nov 28 19:10:44 CST 2025 kill -USR1 2188426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2188426 killed at Fri Nov 28 19:10:44 CST 2025 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #1582: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/client -list ssl.sh: #1583: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1584: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1585: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/ext_client -list ssl.sh: #1586: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1587: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Fri Nov 28 19:10:44 CST 2025 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Nov 28 19:10:44 CST 2025 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Nov 28 19:10:44 CST 2025 Running tests for merge TIMESTAMP merge BEGIN: Fri Nov 28 19:10:44 CST 2025 ./sdr.sh: line 127: syntax error near unexpected token `(' ./sdr.sh: line 127: ` dtime=$(time -p (pwdecrypt -i ${COMBINED_300} -o ${DECODED} -l ${LOG} -d ${PROFILE} -f ${R_PWFILE}) 2>&1 1>/dev/null)' TIMESTAMP merge END: Fri Nov 28 19:10:44 CST 2025 Running tests for chains TIMESTAMP chains BEGIN: Fri Nov 28 19:10:44 CST 2025 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191045 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20251128111057Z nextupdate=20261128111057Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Nov 28 11:10:57 2025 Next Update: Sat Nov 28 11:10:57 2026 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20251128111058Z addcert 2 20251128111058Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Nov 28 11:10:58 2025 Next Update: Sat Nov 28 11:10:57 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:10:58 2025 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111058Z nextupdate=20261128111058Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:10:58 2025 Next Update: Sat Nov 28 11:10:58 2026 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111059Z addcert 2 20251128111059Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:10:59 2025 Next Update: Sat Nov 28 11:10:58 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:10:59 2025 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111100Z addcert 4 20251128111100Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:11:00 2025 Next Update: Sat Nov 28 11:10:58 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:10:59 2025 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:11:00 2025 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20251128111100Z nextupdate=20261128111100Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Nov 28 11:11:00 2025 Next Update: Sat Nov 28 11:11:00 2026 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20251128111101Z addcert 2 20251128111101Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Nov 28 11:11:01 2025 Next Update: Sat Nov 28 11:11:00 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:11:01 2025 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20251128111102Z addcert 3 20251128111102Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Nov 28 11:11:02 2025 Next Update: Sat Nov 28 11:11:00 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:11:01 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:11:02 2025 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20251128111102Z nextupdate=20261128111102Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Nov 28 11:11:02 2025 Next Update: Sat Nov 28 11:11:02 2026 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20251128111103Z addcert 2 20251128111103Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Nov 28 11:11:03 2025 Next Update: Sat Nov 28 11:11:02 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:11:03 2025 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20251128111104Z addcert 3 20251128111104Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Nov 28 11:11:04 2025 Next Update: Sat Nov 28 11:11:02 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:11:03 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:11:04 2025 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191046 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191047 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1128191048 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1128191049 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1128191050 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1128191051 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1128191052 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1128191053 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1128191054 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1128191055 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1128191056 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1128191057 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1128191058 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1128191059 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1128191060 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1128191061 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Fri Nov 28 19:11:22 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:11:22 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2190600 >/dev/null 2>/dev/null httpserv with PID 2190600 found at Fri Nov 28 19:11:22 CST 2025 httpserv with PID 2190600 started at Fri Nov 28 19:11:22 CST 2025 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191046 (0x433ed446) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:09 2025 Not After : Thu Nov 28 11:11:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:09:53:f3:e1:1f:ae:2f:af:d1:73:c6:77:00:16:b6: de:65:ff:06:b3:9a:bb:0a:d1:95:4b:31:69:12:c5:2f: 94:41:2b:5f:89:cb:67:bc:d3:8d:90:f0:37:af:f0:b6: c6:56:05:6c:d7:18:ea:7b:11:8a:bb:8e:3b:93:16:21: a7:1e:48:ff:6a:1d:02:3a:ba:d2:ad:76:b9:f2:57:91: f9:7b:65:dd:91:b5:ad:a5:64:82:d6:d8:7c:e9:29:7d: 76:33:20:6c:6f:29:cd:4b:ea:c5:b2:42:a3:3c:cc:ba: 20:fd:a3:64:39:05:12:b9:5f:d0:c1:90:53:6c:bb:fe: 37:50:ca:2b:10:28:56:76:0a:70:85:54:0c:82:9c:1d: 2d:ed:32:65:42:e6:10:30:cf:a7:72:ca:c9:64:93:5c: f0:63:b9:a4:5a:42:60:93:6f:a6:9c:05:63:7a:7a:0f: 5f:34:2c:c1:6e:5b:0f:be:98:c2:ec:88:95:ee:aa:87: 72:54:0c:49:c0:5a:0a:3c:3e:08:35:e4:45:cd:3f:9d: 34:a7:e2:d6:74:12:52:c0:f1:bb:ff:f7:66:1f:a7:e8: 7a:0f:eb:58:7c:d2:9b:be:08:c1:41:bb:c8:04:1b:f4: 7d:a9:2e:5a:b0:83:07:40:97:27:28:2e:9f:f0:2b:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:0e:d8:41:6c:a6:50:c5:91:66:b3:cb:1e:66:dd:d6: 2d:b2:b1:dd:60:6b:2c:67:92:4b:e9:c9:7f:3d:25:e6: 80:82:b7:0b:7c:f3:df:07:d0:42:9a:c8:73:39:af:8a: c6:ad:c7:cb:3f:50:aa:38:04:78:b3:26:35:9d:d7:68: 40:22:fa:8c:db:4c:23:f9:82:99:78:e8:0e:41:c4:5e: c2:e2:df:ff:07:e3:d3:8d:ec:71:53:66:78:42:d4:29: 92:3c:68:bd:82:d5:96:c8:b9:a8:80:3f:65:40:a3:2c: 44:08:ed:b7:40:0c:90:84:5b:99:f9:a6:d9:59:3a:14: 78:ec:fa:79:4c:db:79:8b:25:77:41:56:69:fc:53:ad: a2:fa:8d:df:06:40:94:ef:84:f6:0e:14:44:3d:d6:dd: 74:05:83:93:0b:56:f7:69:45:f4:1e:86:51:39:c7:b4: 33:68:07:28:9b:05:c2:58:d7:38:57:45:a7:ac:b6:d4: 62:3a:f2:8f:5b:c5:cf:a3:78:00:ae:e1:6e:45:56:4a: fd:8e:e6:ea:42:25:d4:fc:a5:2a:32:d4:7b:89:82:2d: 74:c4:93:69:da:6e:97:58:61:a5:2e:83:f6:e8:fd:17: d0:2e:00:a4:58:8f:12:54:92:d5:e6:0b:bb:6d:a8:3a Fingerprint (SHA-256): 19:4F:BF:61:8B:F6:C1:B0:90:42:B1:AF:99:68:F2:43:A5:4C:A0:83:53:14:4F:DC:A5:BF:47:A2:D5:51:16:4C Fingerprint (SHA1): 31:AD:01:94:15:95:EA:F8:6B:0E:CA:CF:81:6F:64:4A:52:49:53:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 2190600 at Fri Nov 28 19:11:23 CST 2025 kill -USR1 2190600 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2190600 killed at Fri Nov 28 19:11:23 CST 2025 httpserv starting at Fri Nov 28 19:11:23 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:11:23 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2190802 >/dev/null 2>/dev/null httpserv with PID 2190802 found at Fri Nov 28 19:11:23 CST 2025 httpserv with PID 2190802 started at Fri Nov 28 19:11:23 CST 2025 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 2190802 at Fri Nov 28 19:11:23 CST 2025 kill -USR1 2190802 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2190802 killed at Fri Nov 28 19:11:23 CST 2025 httpserv starting at Fri Nov 28 19:11:23 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:11:23 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2191009 >/dev/null 2>/dev/null httpserv with PID 2191009 found at Fri Nov 28 19:11:23 CST 2025 httpserv with PID 2191009 started at Fri Nov 28 19:11:23 CST 2025 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191062 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191063 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191064 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191065 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128191066 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191063 (0x433ed457) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:11:25 2025 Not After : Thu Nov 28 11:11:25 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1a:92:68:e8:4d:8b:4c:e1:d7:e8:a2:47:9f:2c:7a: 1b:70:71:ec:90:ee:62:fe:03:01:39:65:a6:8b:2a:7b: 4c:cf:40:74:cb:1e:d2:00:ca:d8:b8:71:fe:69:34:b2: 40:bb:10:53:a2:7e:85:ba:f4:a2:51:6e:33:36:e8:02: 34:cc:89:31:a1:64:2d:ce:b0:6b:36:c3:e4:97:65:50: 6a:2e:fa:7e:d7:bd:3e:57:6b:25:40:de:00:33:ba:3c: 8b:17:62:14:73:df:7e:04:36:e4:46:47:f2:ea:42:69: bf:67:68:94:8c:df:c2:2a:5f:35:c5:a9:aa:0c:4d:29: 1f:eb:f3:1d:94:8c:3b:46:0d:fc:78:96:1f:d5:34:9e: 6d:4c:d8:b9:8b:e8:c6:7d:45:7e:15:47:e2:f8:82:fa: b9:f5:ce:73:2e:32:98:1d:b0:d7:d2:8c:06:da:6f:4a: 9e:a3:33:45:07:31:d0:da:e1:93:92:84:29:f9:de:51: 43:cf:36:e8:1c:c2:8c:9d:bd:74:2d:ed:fe:e7:12:cf: 28:f4:39:df:b3:96:06:70:37:14:49:53:d1:1d:23:d8: d1:0f:60:08:77:65:9c:3a:0b:17:50:3c:10:45:5d:0f: be:31:3c:5c:f9:64:0e:34:23:47:d4:fa:a2:80:53:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:9d:54:ab:98:8c:bf:e3:c1:fa:ee:6e:cf:c1:75:77: 48:83:44:62:5b:03:31:12:5f:c8:fe:71:63:9c:00:d8: 2c:6b:1a:d2:72:fc:29:32:52:01:ab:e6:07:ff:11:2e: c2:48:ad:d8:c0:58:d0:4b:df:b9:05:79:df:0f:45:67: e8:2c:3f:d5:8f:9e:a3:d0:c2:a5:0d:0e:e6:b2:8e:7a: 2b:57:47:50:a7:64:06:1c:0f:2f:66:13:8b:82:b6:84: 57:a2:99:ec:70:16:de:fd:c5:35:08:c2:b1:33:29:d3: 0b:10:83:71:a0:ad:97:f0:4e:9a:ec:1e:e7:21:67:f5: 18:5e:87:fc:b6:30:48:c7:e6:a6:62:33:d2:7c:63:62: 45:11:7f:5d:df:bf:a7:9a:83:ac:5b:2d:f2:7e:e8:7b: 3e:5a:65:f8:20:ec:2d:35:1e:af:a4:7f:21:2f:be:23: f8:13:51:6f:cd:5c:cf:81:e4:5e:6b:7d:38:a4:35:dd: e5:85:74:04:95:95:f6:6f:7f:51:d1:a6:61:c7:9a:dc: f4:8e:38:4a:a6:bf:37:37:f3:e2:c4:e7:74:c4:64:9b: c8:0b:5c:f9:e3:3e:9e:85:55:2b:a5:a3:2a:c6:2b:ea: 83:db:b9:01:c4:2b:bc:eb:12:1b:1c:69:a1:71:97:7a Fingerprint (SHA-256): F7:33:49:C4:51:BC:08:54:29:0B:95:B9:48:FC:F0:E3:50:C8:02:7D:15:2F:58:F1:BC:49:DA:51:85:44:90:91 Fingerprint (SHA1): 5B:FA:89:77:A5:7C:0D:E7:70:63:B4:00:FA:C5:23:32:DB:DA:88:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191062 (0x433ed456) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:11:24 2025 Not After : Thu Nov 28 11:11:24 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:23:ca:c7:cd:22:e4:16:fd:c2:8c:8c:9f:ee:1d:e3: 0b:d7:25:d1:5c:f1:72:9c:88:d7:c3:a9:8c:bf:ac:89: e2:c6:27:64:e3:37:00:ba:f1:b9:e9:36:33:04:c2:be: 1f:0f:ee:c6:13:18:8f:26:fb:d8:79:50:3d:9e:c3:6f: 57:c8:b4:33:08:c0:f3:19:7b:69:58:c5:04:0b:21:d7: 1a:22:4c:ee:4a:25:af:16:29:dc:19:23:48:e3:3a:24: 9d:99:0d:85:8e:83:d5:c0:7b:b6:8c:cc:53:aa:07:a3: 75:c3:ae:d7:c0:2c:c6:33:4a:bf:67:19:9e:3c:10:ac: b4:7a:9d:af:fd:72:9f:da:45:52:1c:9a:ef:d5:66:f3: 75:47:d4:34:28:2a:b9:48:af:8d:12:7d:5b:8e:a5:92: fe:6e:9b:a0:75:b1:2e:cb:a8:6f:c1:4d:bc:05:dc:d0: 5d:6c:de:ba:77:4b:eb:93:c1:20:d6:58:67:76:d1:b2: 6e:3b:8a:9f:ae:2d:b6:54:b5:36:96:08:98:e3:00:09: 65:b8:93:32:18:26:02:44:64:b6:fa:6d:3b:65:43:33: 09:6b:2f:95:6f:49:bb:96:df:d2:39:c8:0d:0f:5d:ee: 46:8f:e7:4f:37:70:28:e1:ad:c9:88:f9:48:81:e2:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:2e:21:0f:17:01:7b:71:45:ac:27:5b:0d:f2:3a:6e: 82:64:4f:c1:97:e9:34:39:be:0f:78:30:b7:1e:9f:3c: 06:e4:b9:f3:bf:ea:d2:a6:a1:36:44:7f:5c:33:fb:b7: b1:ee:b3:28:4a:ef:fd:15:06:31:2f:16:7d:b3:e7:89: 48:33:ce:77:f0:1a:85:57:0d:27:df:79:9d:47:1a:dc: 0f:fa:74:c4:36:37:fc:66:63:8f:61:82:bb:cd:3d:d0: 34:59:77:79:bb:61:28:22:7b:c5:37:46:29:c6:b4:83: 0a:fc:14:5d:93:fe:3c:d7:35:29:e7:2c:e1:cd:6f:1e: c4:95:a4:ff:03:72:b5:86:d5:94:01:c5:0e:7e:d4:11: 0c:cd:08:22:a1:37:bf:31:63:cb:48:37:f2:8f:a5:ed: 93:00:85:72:d3:4c:e2:c6:a5:0e:a0:b3:7f:b4:81:c8: d0:02:37:8d:ce:90:c9:c5:d1:28:c5:fd:0e:e8:76:69: db:4f:ff:06:a8:28:41:8a:5d:85:47:5e:c9:36:13:97: 4a:a1:49:2f:72:03:8a:31:91:01:13:5c:73:6e:8d:22: d5:07:a7:52:03:50:3c:4f:67:c7:ae:dd:b6:45:ec:45: f3:84:4f:cf:ca:7a:ba:f1:dd:da:15:43:29:52:c1:1d Fingerprint (SHA-256): C8:DD:51:89:9D:53:A2:C0:F5:A4:BA:2B:76:6C:A4:DE:CD:A2:9C:1D:ED:F3:63:B6:99:62:79:D1:18:8A:82:28 Fingerprint (SHA1): B9:1A:BC:2E:D5:8F:7A:93:01:60:0E:7E:E4:86:8E:A7:06:CF:E6:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191062 (0x433ed456) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:11:24 2025 Not After : Thu Nov 28 11:11:24 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:23:ca:c7:cd:22:e4:16:fd:c2:8c:8c:9f:ee:1d:e3: 0b:d7:25:d1:5c:f1:72:9c:88:d7:c3:a9:8c:bf:ac:89: e2:c6:27:64:e3:37:00:ba:f1:b9:e9:36:33:04:c2:be: 1f:0f:ee:c6:13:18:8f:26:fb:d8:79:50:3d:9e:c3:6f: 57:c8:b4:33:08:c0:f3:19:7b:69:58:c5:04:0b:21:d7: 1a:22:4c:ee:4a:25:af:16:29:dc:19:23:48:e3:3a:24: 9d:99:0d:85:8e:83:d5:c0:7b:b6:8c:cc:53:aa:07:a3: 75:c3:ae:d7:c0:2c:c6:33:4a:bf:67:19:9e:3c:10:ac: b4:7a:9d:af:fd:72:9f:da:45:52:1c:9a:ef:d5:66:f3: 75:47:d4:34:28:2a:b9:48:af:8d:12:7d:5b:8e:a5:92: fe:6e:9b:a0:75:b1:2e:cb:a8:6f:c1:4d:bc:05:dc:d0: 5d:6c:de:ba:77:4b:eb:93:c1:20:d6:58:67:76:d1:b2: 6e:3b:8a:9f:ae:2d:b6:54:b5:36:96:08:98:e3:00:09: 65:b8:93:32:18:26:02:44:64:b6:fa:6d:3b:65:43:33: 09:6b:2f:95:6f:49:bb:96:df:d2:39:c8:0d:0f:5d:ee: 46:8f:e7:4f:37:70:28:e1:ad:c9:88:f9:48:81:e2:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:2e:21:0f:17:01:7b:71:45:ac:27:5b:0d:f2:3a:6e: 82:64:4f:c1:97:e9:34:39:be:0f:78:30:b7:1e:9f:3c: 06:e4:b9:f3:bf:ea:d2:a6:a1:36:44:7f:5c:33:fb:b7: b1:ee:b3:28:4a:ef:fd:15:06:31:2f:16:7d:b3:e7:89: 48:33:ce:77:f0:1a:85:57:0d:27:df:79:9d:47:1a:dc: 0f:fa:74:c4:36:37:fc:66:63:8f:61:82:bb:cd:3d:d0: 34:59:77:79:bb:61:28:22:7b:c5:37:46:29:c6:b4:83: 0a:fc:14:5d:93:fe:3c:d7:35:29:e7:2c:e1:cd:6f:1e: c4:95:a4:ff:03:72:b5:86:d5:94:01:c5:0e:7e:d4:11: 0c:cd:08:22:a1:37:bf:31:63:cb:48:37:f2:8f:a5:ed: 93:00:85:72:d3:4c:e2:c6:a5:0e:a0:b3:7f:b4:81:c8: d0:02:37:8d:ce:90:c9:c5:d1:28:c5:fd:0e:e8:76:69: db:4f:ff:06:a8:28:41:8a:5d:85:47:5e:c9:36:13:97: 4a:a1:49:2f:72:03:8a:31:91:01:13:5c:73:6e:8d:22: d5:07:a7:52:03:50:3c:4f:67:c7:ae:dd:b6:45:ec:45: f3:84:4f:cf:ca:7a:ba:f1:dd:da:15:43:29:52:c1:1d Fingerprint (SHA-256): C8:DD:51:89:9D:53:A2:C0:F5:A4:BA:2B:76:6C:A4:DE:CD:A2:9C:1D:ED:F3:63:B6:99:62:79:D1:18:8A:82:28 Fingerprint (SHA1): B9:1A:BC:2E:D5:8F:7A:93:01:60:0E:7E:E4:86:8E:A7:06:CF:E6:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191063 (0x433ed457) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:11:25 2025 Not After : Thu Nov 28 11:11:25 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1a:92:68:e8:4d:8b:4c:e1:d7:e8:a2:47:9f:2c:7a: 1b:70:71:ec:90:ee:62:fe:03:01:39:65:a6:8b:2a:7b: 4c:cf:40:74:cb:1e:d2:00:ca:d8:b8:71:fe:69:34:b2: 40:bb:10:53:a2:7e:85:ba:f4:a2:51:6e:33:36:e8:02: 34:cc:89:31:a1:64:2d:ce:b0:6b:36:c3:e4:97:65:50: 6a:2e:fa:7e:d7:bd:3e:57:6b:25:40:de:00:33:ba:3c: 8b:17:62:14:73:df:7e:04:36:e4:46:47:f2:ea:42:69: bf:67:68:94:8c:df:c2:2a:5f:35:c5:a9:aa:0c:4d:29: 1f:eb:f3:1d:94:8c:3b:46:0d:fc:78:96:1f:d5:34:9e: 6d:4c:d8:b9:8b:e8:c6:7d:45:7e:15:47:e2:f8:82:fa: b9:f5:ce:73:2e:32:98:1d:b0:d7:d2:8c:06:da:6f:4a: 9e:a3:33:45:07:31:d0:da:e1:93:92:84:29:f9:de:51: 43:cf:36:e8:1c:c2:8c:9d:bd:74:2d:ed:fe:e7:12:cf: 28:f4:39:df:b3:96:06:70:37:14:49:53:d1:1d:23:d8: d1:0f:60:08:77:65:9c:3a:0b:17:50:3c:10:45:5d:0f: be:31:3c:5c:f9:64:0e:34:23:47:d4:fa:a2:80:53:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:9d:54:ab:98:8c:bf:e3:c1:fa:ee:6e:cf:c1:75:77: 48:83:44:62:5b:03:31:12:5f:c8:fe:71:63:9c:00:d8: 2c:6b:1a:d2:72:fc:29:32:52:01:ab:e6:07:ff:11:2e: c2:48:ad:d8:c0:58:d0:4b:df:b9:05:79:df:0f:45:67: e8:2c:3f:d5:8f:9e:a3:d0:c2:a5:0d:0e:e6:b2:8e:7a: 2b:57:47:50:a7:64:06:1c:0f:2f:66:13:8b:82:b6:84: 57:a2:99:ec:70:16:de:fd:c5:35:08:c2:b1:33:29:d3: 0b:10:83:71:a0:ad:97:f0:4e:9a:ec:1e:e7:21:67:f5: 18:5e:87:fc:b6:30:48:c7:e6:a6:62:33:d2:7c:63:62: 45:11:7f:5d:df:bf:a7:9a:83:ac:5b:2d:f2:7e:e8:7b: 3e:5a:65:f8:20:ec:2d:35:1e:af:a4:7f:21:2f:be:23: f8:13:51:6f:cd:5c:cf:81:e4:5e:6b:7d:38:a4:35:dd: e5:85:74:04:95:95:f6:6f:7f:51:d1:a6:61:c7:9a:dc: f4:8e:38:4a:a6:bf:37:37:f3:e2:c4:e7:74:c4:64:9b: c8:0b:5c:f9:e3:3e:9e:85:55:2b:a5:a3:2a:c6:2b:ea: 83:db:b9:01:c4:2b:bc:eb:12:1b:1c:69:a1:71:97:7a Fingerprint (SHA-256): F7:33:49:C4:51:BC:08:54:29:0B:95:B9:48:FC:F0:E3:50:C8:02:7D:15:2F:58:F1:BC:49:DA:51:85:44:90:91 Fingerprint (SHA1): 5B:FA:89:77:A5:7C:0D:E7:70:63:B4:00:FA:C5:23:32:DB:DA:88:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191063 (0x433ed457) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:11:25 2025 Not After : Thu Nov 28 11:11:25 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1a:92:68:e8:4d:8b:4c:e1:d7:e8:a2:47:9f:2c:7a: 1b:70:71:ec:90:ee:62:fe:03:01:39:65:a6:8b:2a:7b: 4c:cf:40:74:cb:1e:d2:00:ca:d8:b8:71:fe:69:34:b2: 40:bb:10:53:a2:7e:85:ba:f4:a2:51:6e:33:36:e8:02: 34:cc:89:31:a1:64:2d:ce:b0:6b:36:c3:e4:97:65:50: 6a:2e:fa:7e:d7:bd:3e:57:6b:25:40:de:00:33:ba:3c: 8b:17:62:14:73:df:7e:04:36:e4:46:47:f2:ea:42:69: bf:67:68:94:8c:df:c2:2a:5f:35:c5:a9:aa:0c:4d:29: 1f:eb:f3:1d:94:8c:3b:46:0d:fc:78:96:1f:d5:34:9e: 6d:4c:d8:b9:8b:e8:c6:7d:45:7e:15:47:e2:f8:82:fa: b9:f5:ce:73:2e:32:98:1d:b0:d7:d2:8c:06:da:6f:4a: 9e:a3:33:45:07:31:d0:da:e1:93:92:84:29:f9:de:51: 43:cf:36:e8:1c:c2:8c:9d:bd:74:2d:ed:fe:e7:12:cf: 28:f4:39:df:b3:96:06:70:37:14:49:53:d1:1d:23:d8: d1:0f:60:08:77:65:9c:3a:0b:17:50:3c:10:45:5d:0f: be:31:3c:5c:f9:64:0e:34:23:47:d4:fa:a2:80:53:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:9d:54:ab:98:8c:bf:e3:c1:fa:ee:6e:cf:c1:75:77: 48:83:44:62:5b:03:31:12:5f:c8:fe:71:63:9c:00:d8: 2c:6b:1a:d2:72:fc:29:32:52:01:ab:e6:07:ff:11:2e: c2:48:ad:d8:c0:58:d0:4b:df:b9:05:79:df:0f:45:67: e8:2c:3f:d5:8f:9e:a3:d0:c2:a5:0d:0e:e6:b2:8e:7a: 2b:57:47:50:a7:64:06:1c:0f:2f:66:13:8b:82:b6:84: 57:a2:99:ec:70:16:de:fd:c5:35:08:c2:b1:33:29:d3: 0b:10:83:71:a0:ad:97:f0:4e:9a:ec:1e:e7:21:67:f5: 18:5e:87:fc:b6:30:48:c7:e6:a6:62:33:d2:7c:63:62: 45:11:7f:5d:df:bf:a7:9a:83:ac:5b:2d:f2:7e:e8:7b: 3e:5a:65:f8:20:ec:2d:35:1e:af:a4:7f:21:2f:be:23: f8:13:51:6f:cd:5c:cf:81:e4:5e:6b:7d:38:a4:35:dd: e5:85:74:04:95:95:f6:6f:7f:51:d1:a6:61:c7:9a:dc: f4:8e:38:4a:a6:bf:37:37:f3:e2:c4:e7:74:c4:64:9b: c8:0b:5c:f9:e3:3e:9e:85:55:2b:a5:a3:2a:c6:2b:ea: 83:db:b9:01:c4:2b:bc:eb:12:1b:1c:69:a1:71:97:7a Fingerprint (SHA-256): F7:33:49:C4:51:BC:08:54:29:0B:95:B9:48:FC:F0:E3:50:C8:02:7D:15:2F:58:F1:BC:49:DA:51:85:44:90:91 Fingerprint (SHA1): 5B:FA:89:77:A5:7C:0D:E7:70:63:B4:00:FA:C5:23:32:DB:DA:88:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191063 (0x433ed457) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:11:25 2025 Not After : Thu Nov 28 11:11:25 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:1a:92:68:e8:4d:8b:4c:e1:d7:e8:a2:47:9f:2c:7a: 1b:70:71:ec:90:ee:62:fe:03:01:39:65:a6:8b:2a:7b: 4c:cf:40:74:cb:1e:d2:00:ca:d8:b8:71:fe:69:34:b2: 40:bb:10:53:a2:7e:85:ba:f4:a2:51:6e:33:36:e8:02: 34:cc:89:31:a1:64:2d:ce:b0:6b:36:c3:e4:97:65:50: 6a:2e:fa:7e:d7:bd:3e:57:6b:25:40:de:00:33:ba:3c: 8b:17:62:14:73:df:7e:04:36:e4:46:47:f2:ea:42:69: bf:67:68:94:8c:df:c2:2a:5f:35:c5:a9:aa:0c:4d:29: 1f:eb:f3:1d:94:8c:3b:46:0d:fc:78:96:1f:d5:34:9e: 6d:4c:d8:b9:8b:e8:c6:7d:45:7e:15:47:e2:f8:82:fa: b9:f5:ce:73:2e:32:98:1d:b0:d7:d2:8c:06:da:6f:4a: 9e:a3:33:45:07:31:d0:da:e1:93:92:84:29:f9:de:51: 43:cf:36:e8:1c:c2:8c:9d:bd:74:2d:ed:fe:e7:12:cf: 28:f4:39:df:b3:96:06:70:37:14:49:53:d1:1d:23:d8: d1:0f:60:08:77:65:9c:3a:0b:17:50:3c:10:45:5d:0f: be:31:3c:5c:f9:64:0e:34:23:47:d4:fa:a2:80:53:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:9d:54:ab:98:8c:bf:e3:c1:fa:ee:6e:cf:c1:75:77: 48:83:44:62:5b:03:31:12:5f:c8:fe:71:63:9c:00:d8: 2c:6b:1a:d2:72:fc:29:32:52:01:ab:e6:07:ff:11:2e: c2:48:ad:d8:c0:58:d0:4b:df:b9:05:79:df:0f:45:67: e8:2c:3f:d5:8f:9e:a3:d0:c2:a5:0d:0e:e6:b2:8e:7a: 2b:57:47:50:a7:64:06:1c:0f:2f:66:13:8b:82:b6:84: 57:a2:99:ec:70:16:de:fd:c5:35:08:c2:b1:33:29:d3: 0b:10:83:71:a0:ad:97:f0:4e:9a:ec:1e:e7:21:67:f5: 18:5e:87:fc:b6:30:48:c7:e6:a6:62:33:d2:7c:63:62: 45:11:7f:5d:df:bf:a7:9a:83:ac:5b:2d:f2:7e:e8:7b: 3e:5a:65:f8:20:ec:2d:35:1e:af:a4:7f:21:2f:be:23: f8:13:51:6f:cd:5c:cf:81:e4:5e:6b:7d:38:a4:35:dd: e5:85:74:04:95:95:f6:6f:7f:51:d1:a6:61:c7:9a:dc: f4:8e:38:4a:a6:bf:37:37:f3:e2:c4:e7:74:c4:64:9b: c8:0b:5c:f9:e3:3e:9e:85:55:2b:a5:a3:2a:c6:2b:ea: 83:db:b9:01:c4:2b:bc:eb:12:1b:1c:69:a1:71:97:7a Fingerprint (SHA-256): F7:33:49:C4:51:BC:08:54:29:0B:95:B9:48:FC:F0:E3:50:C8:02:7D:15:2F:58:F1:BC:49:DA:51:85:44:90:91 Fingerprint (SHA1): 5B:FA:89:77:A5:7C:0D:E7:70:63:B4:00:FA:C5:23:32:DB:DA:88:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191062 (0x433ed456) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:11:24 2025 Not After : Thu Nov 28 11:11:24 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:23:ca:c7:cd:22:e4:16:fd:c2:8c:8c:9f:ee:1d:e3: 0b:d7:25:d1:5c:f1:72:9c:88:d7:c3:a9:8c:bf:ac:89: e2:c6:27:64:e3:37:00:ba:f1:b9:e9:36:33:04:c2:be: 1f:0f:ee:c6:13:18:8f:26:fb:d8:79:50:3d:9e:c3:6f: 57:c8:b4:33:08:c0:f3:19:7b:69:58:c5:04:0b:21:d7: 1a:22:4c:ee:4a:25:af:16:29:dc:19:23:48:e3:3a:24: 9d:99:0d:85:8e:83:d5:c0:7b:b6:8c:cc:53:aa:07:a3: 75:c3:ae:d7:c0:2c:c6:33:4a:bf:67:19:9e:3c:10:ac: b4:7a:9d:af:fd:72:9f:da:45:52:1c:9a:ef:d5:66:f3: 75:47:d4:34:28:2a:b9:48:af:8d:12:7d:5b:8e:a5:92: fe:6e:9b:a0:75:b1:2e:cb:a8:6f:c1:4d:bc:05:dc:d0: 5d:6c:de:ba:77:4b:eb:93:c1:20:d6:58:67:76:d1:b2: 6e:3b:8a:9f:ae:2d:b6:54:b5:36:96:08:98:e3:00:09: 65:b8:93:32:18:26:02:44:64:b6:fa:6d:3b:65:43:33: 09:6b:2f:95:6f:49:bb:96:df:d2:39:c8:0d:0f:5d:ee: 46:8f:e7:4f:37:70:28:e1:ad:c9:88:f9:48:81:e2:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:2e:21:0f:17:01:7b:71:45:ac:27:5b:0d:f2:3a:6e: 82:64:4f:c1:97:e9:34:39:be:0f:78:30:b7:1e:9f:3c: 06:e4:b9:f3:bf:ea:d2:a6:a1:36:44:7f:5c:33:fb:b7: b1:ee:b3:28:4a:ef:fd:15:06:31:2f:16:7d:b3:e7:89: 48:33:ce:77:f0:1a:85:57:0d:27:df:79:9d:47:1a:dc: 0f:fa:74:c4:36:37:fc:66:63:8f:61:82:bb:cd:3d:d0: 34:59:77:79:bb:61:28:22:7b:c5:37:46:29:c6:b4:83: 0a:fc:14:5d:93:fe:3c:d7:35:29:e7:2c:e1:cd:6f:1e: c4:95:a4:ff:03:72:b5:86:d5:94:01:c5:0e:7e:d4:11: 0c:cd:08:22:a1:37:bf:31:63:cb:48:37:f2:8f:a5:ed: 93:00:85:72:d3:4c:e2:c6:a5:0e:a0:b3:7f:b4:81:c8: d0:02:37:8d:ce:90:c9:c5:d1:28:c5:fd:0e:e8:76:69: db:4f:ff:06:a8:28:41:8a:5d:85:47:5e:c9:36:13:97: 4a:a1:49:2f:72:03:8a:31:91:01:13:5c:73:6e:8d:22: d5:07:a7:52:03:50:3c:4f:67:c7:ae:dd:b6:45:ec:45: f3:84:4f:cf:ca:7a:ba:f1:dd:da:15:43:29:52:c1:1d Fingerprint (SHA-256): C8:DD:51:89:9D:53:A2:C0:F5:A4:BA:2B:76:6C:A4:DE:CD:A2:9C:1D:ED:F3:63:B6:99:62:79:D1:18:8A:82:28 Fingerprint (SHA1): B9:1A:BC:2E:D5:8F:7A:93:01:60:0E:7E:E4:86:8E:A7:06:CF:E6:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191062 (0x433ed456) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:11:24 2025 Not After : Thu Nov 28 11:11:24 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:23:ca:c7:cd:22:e4:16:fd:c2:8c:8c:9f:ee:1d:e3: 0b:d7:25:d1:5c:f1:72:9c:88:d7:c3:a9:8c:bf:ac:89: e2:c6:27:64:e3:37:00:ba:f1:b9:e9:36:33:04:c2:be: 1f:0f:ee:c6:13:18:8f:26:fb:d8:79:50:3d:9e:c3:6f: 57:c8:b4:33:08:c0:f3:19:7b:69:58:c5:04:0b:21:d7: 1a:22:4c:ee:4a:25:af:16:29:dc:19:23:48:e3:3a:24: 9d:99:0d:85:8e:83:d5:c0:7b:b6:8c:cc:53:aa:07:a3: 75:c3:ae:d7:c0:2c:c6:33:4a:bf:67:19:9e:3c:10:ac: b4:7a:9d:af:fd:72:9f:da:45:52:1c:9a:ef:d5:66:f3: 75:47:d4:34:28:2a:b9:48:af:8d:12:7d:5b:8e:a5:92: fe:6e:9b:a0:75:b1:2e:cb:a8:6f:c1:4d:bc:05:dc:d0: 5d:6c:de:ba:77:4b:eb:93:c1:20:d6:58:67:76:d1:b2: 6e:3b:8a:9f:ae:2d:b6:54:b5:36:96:08:98:e3:00:09: 65:b8:93:32:18:26:02:44:64:b6:fa:6d:3b:65:43:33: 09:6b:2f:95:6f:49:bb:96:df:d2:39:c8:0d:0f:5d:ee: 46:8f:e7:4f:37:70:28:e1:ad:c9:88:f9:48:81:e2:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:2e:21:0f:17:01:7b:71:45:ac:27:5b:0d:f2:3a:6e: 82:64:4f:c1:97:e9:34:39:be:0f:78:30:b7:1e:9f:3c: 06:e4:b9:f3:bf:ea:d2:a6:a1:36:44:7f:5c:33:fb:b7: b1:ee:b3:28:4a:ef:fd:15:06:31:2f:16:7d:b3:e7:89: 48:33:ce:77:f0:1a:85:57:0d:27:df:79:9d:47:1a:dc: 0f:fa:74:c4:36:37:fc:66:63:8f:61:82:bb:cd:3d:d0: 34:59:77:79:bb:61:28:22:7b:c5:37:46:29:c6:b4:83: 0a:fc:14:5d:93:fe:3c:d7:35:29:e7:2c:e1:cd:6f:1e: c4:95:a4:ff:03:72:b5:86:d5:94:01:c5:0e:7e:d4:11: 0c:cd:08:22:a1:37:bf:31:63:cb:48:37:f2:8f:a5:ed: 93:00:85:72:d3:4c:e2:c6:a5:0e:a0:b3:7f:b4:81:c8: d0:02:37:8d:ce:90:c9:c5:d1:28:c5:fd:0e:e8:76:69: db:4f:ff:06:a8:28:41:8a:5d:85:47:5e:c9:36:13:97: 4a:a1:49:2f:72:03:8a:31:91:01:13:5c:73:6e:8d:22: d5:07:a7:52:03:50:3c:4f:67:c7:ae:dd:b6:45:ec:45: f3:84:4f:cf:ca:7a:ba:f1:dd:da:15:43:29:52:c1:1d Fingerprint (SHA-256): C8:DD:51:89:9D:53:A2:C0:F5:A4:BA:2B:76:6C:A4:DE:CD:A2:9C:1D:ED:F3:63:B6:99:62:79:D1:18:8A:82:28 Fingerprint (SHA1): B9:1A:BC:2E:D5:8F:7A:93:01:60:0E:7E:E4:86:8E:A7:06:CF:E6:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191067 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191068 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191069 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191070 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191071 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191072 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191073 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191074 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191075 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128191076 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128191077 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128191078 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128191079 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128191080 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128191081 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128191082 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128191083 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128191084 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128191085 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128191086 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128191087 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128191088 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191089 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191067 (0x433ed45b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:11:29 2025 Not After : Thu Nov 28 11:11:29 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:9e:b7:5c:d9:96:51:73:f0:7a:66:41:e6:44:ec:d3: 79:8e:99:9e:b3:14:fb:bc:7b:0d:ba:ae:b9:bd:c1:df: 6d:90:53:69:7a:fb:0f:6e:25:53:f4:70:6c:f5:d0:1f: 55:7c:5f:33:7d:b2:9f:82:8d:eb:38:bc:03:dc:7c:1e: 44:ae:23:17:a5:e1:20:6b:49:84:2b:f5:4a:c7:03:d4: d6:c6:59:2c:3b:04:ec:be:92:12:30:72:c3:1c:29:4d: 8e:8a:47:94:63:30:34:26:67:ba:ed:8b:3d:69:95:de: 1f:09:0c:14:c4:ab:8c:eb:df:60:87:c3:29:6c:40:d2: 4b:40:f5:3b:a2:54:96:ce:d1:62:39:79:35:1a:98:80: 97:2f:ba:18:5c:05:1c:7c:48:26:81:6b:a2:eb:94:ea: c3:ec:9e:88:7f:6a:bb:c9:0b:7d:2f:19:88:ed:2d:64: d7:46:d2:8c:fd:a3:75:fd:70:b0:c7:71:8f:ed:3a:13: f9:52:63:66:44:cc:6d:ca:f9:07:c3:e5:38:64:3c:79: 32:e0:25:9e:7f:3a:81:74:ad:6a:e2:5e:c1:b8:dc:51: c1:75:7f:58:8c:74:b8:62:e1:68:81:99:94:29:41:84: 5e:4b:c2:7c:b6:ef:b3:27:28:0a:94:f6:d4:13:24:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:f6:68:29:11:d3:8f:4f:00:70:79:21:a7:07:94:6c: 08:59:77:c3:20:ad:dc:bb:3b:55:6a:52:1a:a3:82:37: 30:84:b1:a9:0f:c4:79:ed:5f:4e:84:5d:c2:05:8c:ea: e3:a9:bf:77:f8:93:07:28:3b:00:2d:6b:a8:2a:65:64: 87:8d:cd:22:ea:49:7b:23:f2:8c:59:ea:9c:60:8d:41: 9b:de:df:03:20:67:85:df:c4:17:fd:61:e0:0d:0f:e9: 9d:9c:ed:9d:0b:f6:65:d9:0e:6a:fb:ea:30:c8:73:1c: c8:d7:16:b1:dd:ea:5f:92:98:99:43:5a:05:4c:66:8d: ca:18:c7:66:25:55:72:8f:6d:bd:40:46:c5:aa:d2:ef: 9e:6f:35:4b:b0:35:43:74:97:7d:60:75:ce:fe:1f:a2: 6d:6c:3f:65:99:b5:c9:0d:58:da:14:d7:2f:e3:ee:9b: e0:e6:26:72:71:4b:80:ae:1d:5a:53:15:35:02:d6:83: 56:71:e2:3e:b4:34:98:d7:ee:f7:fe:5c:2d:a8:4b:69: a3:b6:e4:b2:10:c0:c8:6a:77:c8:7e:29:01:a9:0a:53: 7e:47:11:f5:67:ab:0f:c0:d2:db:73:79:5b:20:9f:2d: b6:81:7c:de:e3:87:af:44:10:b6:f9:60:97:e2:cf:dc Fingerprint (SHA-256): E6:E9:DB:35:B5:AD:E2:3C:51:92:C7:B9:8D:0D:0D:9A:3A:E4:D3:0F:70:3B:2B:36:87:E1:7B:C0:75:E5:C5:17 Fingerprint (SHA1): F4:D9:04:BF:8B:F1:27:39:F0:85:06:A0:9F:91:C0:72:11:DD:B9:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191068 (0x433ed45c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:11:29 2025 Not After : Thu Nov 28 11:11:29 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:74:2e:dd:7e:2b:3f:21:5e:68:d9:b8:6c:bb:1d:11: b9:3e:99:11:e7:c6:f7:0e:bf:b9:cb:dd:46:28:1d:11: 7e:0b:82:cf:09:cc:a4:a9:a2:63:13:b9:5d:59:16:90: 92:55:b7:57:ca:05:91:a3:f7:b6:d0:8f:bb:f0:0e:95: 86:7d:0a:31:ac:20:24:f7:a8:d6:9b:e1:1f:af:17:83: e3:5b:b1:59:9b:95:18:19:fd:ab:4d:ce:12:54:75:e4: e0:51:b1:c1:a8:6d:78:89:05:9c:e5:0c:60:88:04:8c: ed:f1:f4:53:e0:28:82:e5:90:a3:09:67:d6:de:ee:23: c9:ab:3f:c3:85:87:5b:25:34:97:3c:0d:35:42:02:d8: b0:2e:c0:3b:d5:89:74:0d:76:b6:03:2b:a5:22:55:55: 07:8d:f6:87:9f:7c:c7:d5:9e:e3:9e:e8:5d:c8:24:d3: 10:44:6e:4c:1c:c1:15:73:55:fa:3b:40:10:57:81:b0: 0b:23:6f:3e:12:f7:75:f5:14:e0:c0:25:81:45:9f:f9: 02:91:0b:1c:a2:cf:83:a9:7a:90:5a:b6:a9:ea:e3:d4: 64:9f:98:ea:bc:b0:07:5f:f5:57:d6:d7:71:77:7b:56: d0:d2:f9:04:60:39:3b:b4:01:ea:f0:91:bc:53:76:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:50:93:6c:12:f5:07:9c:7c:ec:a8:96:6b:2e:18:ea: 23:76:73:75:92:e1:e1:74:90:c8:c5:07:2b:b0:c9:a0: 12:c8:5e:1a:54:db:50:0b:83:7e:37:93:9b:06:22:d5: 07:a8:ff:05:3b:6a:58:ca:c8:57:c3:3e:37:64:c3:b5: 7e:02:d2:85:81:5e:b7:e5:01:b5:5b:af:56:72:e7:bc: 22:41:21:06:75:a8:f6:d8:03:8a:52:79:1e:63:59:79: 68:fd:31:56:a0:dd:15:12:ab:f2:2f:16:ca:8a:20:b2: 76:a3:f2:76:db:03:91:1e:ab:a8:98:7b:28:43:2e:47: 60:74:7c:cb:fe:49:0e:0a:21:f2:ad:44:ba:ed:50:4e: cc:09:16:d9:0e:8a:f7:d3:96:33:ca:f3:5b:4b:cd:00: a3:36:57:48:f2:f9:84:b1:06:35:25:f0:b4:40:8a:a1: c9:c5:9e:38:2f:81:ac:db:73:83:fa:85:13:7c:b1:14: 54:d1:48:97:fb:f9:8f:ef:53:4a:fd:aa:a8:08:0b:a0: b2:24:6f:cc:ec:a6:a5:7c:2d:bb:3f:f6:4c:e2:7d:24: 79:55:b8:c3:20:75:85:a7:d4:95:d0:e6:80:00:21:6b: 32:b7:b8:0e:68:b9:17:45:2d:f9:4f:89:7c:3f:ca:ff Fingerprint (SHA-256): 0D:C0:A1:84:5E:CD:EC:31:2C:2E:0A:FB:33:E9:0D:FB:18:1A:7D:97:8D:4C:33:23:D0:59:7E:EB:B0:CF:B2:A7 Fingerprint (SHA1): F1:1C:A2:4F:AD:30:2D:AB:D3:7D:33:74:3A:6A:91:F4:3F:E2:AD:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191069 (0x433ed45d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:11:30 2025 Not After : Thu Nov 28 11:11:30 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:79:93:05:f0:0c:ce:2b:78:00:98:71:13:db:aa:e5: d6:54:f5:8e:91:56:f4:a2:aa:f6:14:10:01:b1:bc:dc: 8f:d0:c7:d5:cb:b4:c1:87:1d:e4:ce:24:96:39:cf:6f: 9e:16:96:19:0e:68:4e:ff:1d:b6:e9:f7:13:8e:af:9d: e1:29:36:3a:fb:e8:16:75:45:c7:bd:ce:2d:82:d2:5d: 7b:ce:a4:ac:d6:75:d7:49:89:66:ce:a0:82:9c:56:c0: cf:46:8a:48:95:57:88:ec:65:7e:68:0f:77:86:bf:cf: 2f:15:81:4c:8b:33:55:a4:9a:4c:ae:b0:3f:6d:ae:ac: e1:f3:bd:00:ee:de:ad:4e:a1:ac:0d:7a:8a:44:6e:a3: 0f:6f:d1:42:20:49:1b:77:32:5c:09:2b:ec:7d:42:ac: 44:c0:df:59:0b:ea:b3:38:ed:cc:95:03:d4:ae:a5:dd: 56:fc:18:53:b1:7d:57:f3:06:6a:82:bd:07:97:19:d7: 73:4d:ea:db:a7:cb:47:5f:c6:f9:39:a0:27:1e:93:5a: e2:f3:08:d2:b5:af:fe:18:21:b8:6f:6c:82:f4:7d:60: 66:ed:26:1b:41:a8:d2:e3:c5:b7:5e:33:7e:b4:b1:db: a0:7d:57:bf:7b:58:de:e5:a7:05:17:f5:16:21:ef:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:0d:de:11:a8:35:cf:b7:36:f6:64:e1:82:9d:2d:bd: 24:71:80:c6:77:ab:d1:66:27:e0:8b:2e:b2:cf:0d:87: b0:fa:4d:63:d3:16:19:35:36:cf:04:e7:7d:56:e3:47: bc:24:20:50:3a:bb:db:8d:98:99:56:a4:8f:e3:87:f4: 4c:1f:a5:1f:30:3d:25:e0:18:91:89:c4:ee:cc:73:9b: a4:8d:d6:61:39:07:00:51:4c:41:ed:af:1c:94:a0:74: d4:80:1f:5c:a8:e0:e5:05:c8:a5:97:79:5a:03:3a:f0: fc:48:7c:a6:c5:32:53:18:54:68:68:4d:7d:ad:b8:46: 0a:96:74:a8:89:6a:10:d7:33:c6:6d:b6:60:39:3e:3f: 6e:2c:00:a9:a2:11:79:77:39:79:e5:16:93:7b:92:b5: ec:72:a6:30:e7:ec:2f:18:2c:64:f6:ff:77:0e:41:d4: f6:68:c2:bf:2c:9d:56:61:5e:a2:28:45:9d:3f:0d:f5: e2:95:b9:06:f5:3c:cc:7d:67:a4:a1:8f:49:07:b8:ea: a7:be:6d:17:59:7c:da:39:0f:c5:c2:33:89:3b:ad:a0: bf:9e:41:b2:8d:d1:06:a8:2f:41:cf:bf:28:26:30:6d: 8e:a8:7d:a1:35:57:63:55:12:ff:ee:ad:eb:9b:cd:20 Fingerprint (SHA-256): 11:60:5E:8D:C1:1A:9E:75:DC:7C:7A:AD:8C:11:A7:3D:85:4B:17:00:6C:E9:35:FE:B2:E5:A2:92:CE:F3:5E:A5 Fingerprint (SHA1): 0D:C0:27:64:EF:48:A4:AA:41:6D:94:E4:95:1C:2B:FE:5E:37:C3:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191070 (0x433ed45e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:11:31 2025 Not After : Thu Nov 28 11:11:31 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:9d:44:13:69:f4:df:fe:64:2e:85:a2:21:da:a3:22: 82:8b:38:62:c9:cd:96:1b:c8:b9:43:83:5e:14:11:3b: 97:fb:91:62:0a:d1:b8:f9:19:fe:3f:d0:73:28:cb:5f: df:cd:3b:05:89:2a:db:b1:2b:58:ce:b5:87:32:5e:51: dd:b7:2b:f8:84:e5:37:43:1b:37:3e:79:e7:70:33:a0: 95:64:e0:d7:0c:d7:15:08:40:76:9d:3c:ee:c8:a5:a6: 40:e0:90:9c:f8:a0:a2:98:66:de:f1:92:59:c7:9e:20: 39:b2:dd:32:18:04:91:39:a9:cf:d4:bc:7c:15:ee:91: 84:a4:c0:f8:71:a5:df:99:d9:ca:db:f5:d9:86:1e:f6: b6:f1:a6:0d:e5:09:48:b1:18:eb:00:9c:f5:44:78:64: f2:ba:54:d3:0e:51:ee:6f:41:ed:03:fc:96:8d:7e:a2: 39:cc:ec:53:7b:c7:54:e0:b7:e9:2d:05:6d:73:98:72: c2:aa:c7:25:eb:ec:a7:c5:1e:78:83:e7:bc:da:45:e9: ba:8e:2d:7e:3c:75:04:76:ca:d6:c8:da:a8:81:fc:26: f7:1e:46:98:a3:be:3e:61:69:3b:ea:3b:ca:98:0d:94: b6:19:69:ff:93:e2:05:6c:b2:93:fa:d7:51:de:86:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:5c:b0:33:8f:ee:e7:8d:41:d1:59:a1:7a:eb:77:bd: 3e:c6:b0:79:8f:99:56:89:e2:4c:45:90:56:97:d9:95: 4d:56:7a:8e:d6:fc:70:b0:2c:0d:88:49:c2:1d:7b:7b: 7b:09:35:4c:3d:93:9b:45:14:32:55:04:4d:bd:5a:7d: 10:76:77:c7:a0:5a:35:b2:ba:2a:27:92:cd:a9:ab:d7: 8f:71:ee:90:48:b2:0f:46:2b:ca:b4:ad:3d:46:80:bc: c5:d6:e7:13:48:57:55:7c:1e:15:9c:5e:79:e8:fb:4a: ba:82:e7:4a:0f:b3:ca:0a:c6:61:77:5c:09:17:dc:2e: 06:93:ff:6f:6d:d8:95:fd:21:82:28:b8:74:09:f0:ce: 96:1b:55:01:dc:cb:2c:cc:a2:eb:dd:6d:db:c9:11:c1: 03:20:5e:00:7b:0c:75:e5:24:10:db:74:95:ed:c9:94: 49:03:05:6a:f1:31:58:05:41:c6:c1:10:e9:ba:e3:ad: 95:ed:c5:8e:a0:d1:20:a4:97:86:cb:55:35:14:39:3d: 4b:2b:75:11:55:29:17:46:15:56:85:f4:77:15:1b:dc: 39:e3:a9:98:71:ce:a3:70:85:e5:00:17:97:5a:b9:b4: 8f:44:e9:a3:70:ca:2b:df:6c:a8:f8:8f:91:fb:b9:ad Fingerprint (SHA-256): 20:23:D7:0C:3D:75:5D:84:38:21:2C:98:72:39:30:52:37:1E:0B:02:C5:C5:2C:78:09:37:05:38:86:53:CD:AE Fingerprint (SHA1): 2D:CF:B6:49:2A:E7:84:8C:14:6D:B7:47:99:8E:08:63:70:8D:77:79 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191071 (0x433ed45f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:11:31 2025 Not After : Thu Nov 28 11:11:31 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:34:62:e8:7c:ce:fa:ff:49:2e:89:2e:cd:48:f1:08: 36:c6:49:57:08:d1:24:10:ed:a8:02:93:55:67:84:95: 14:47:ea:12:f8:ae:5f:ad:61:e2:66:74:de:1c:e0:4c: e7:8b:ce:af:66:4b:19:db:d2:c3:39:b9:4f:a4:7e:71: f0:8c:f0:a0:8c:a6:78:1c:02:ad:e2:53:2d:3b:54:e8: d9:e8:04:e5:d9:16:f9:9b:ed:fa:22:a5:61:e0:9e:1f: 54:9d:12:e3:d0:5a:f8:e9:be:05:b2:5c:b2:37:5c:f8: f7:53:9a:5b:ed:f4:61:04:fe:eb:90:c1:cb:06:6d:bf: 5a:fc:ae:07:2d:fd:d6:ce:7a:9b:48:be:81:b1:e5:d7: 03:e7:e2:fa:bf:92:8c:03:51:f9:10:3c:c2:c3:4f:50: 54:f3:66:47:9e:c9:aa:77:2a:8a:83:d6:9c:87:42:a9: 1a:04:82:41:0f:a3:f4:b9:72:b8:e7:77:0f:d9:02:ff: ec:26:f6:97:fc:70:17:fd:15:ee:d3:7c:1e:33:ee:73: 58:a8:de:f6:4c:36:b6:2f:63:23:da:db:29:55:fc:99: 40:fa:7c:7c:cb:fc:0a:3c:43:89:b9:5f:dd:94:10:56: e1:9d:d2:f5:da:6f:6d:9a:1c:e9:e4:da:91:53:1d:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:23:5c:bd:45:95:b5:15:38:21:58:b8:f4:64:3d:37: c0:cd:bd:8e:c7:b0:07:33:a2:92:f3:ad:0f:ae:27:c4: 74:9f:f2:f0:33:db:e4:f4:cd:ae:08:22:6e:be:2d:70: ed:4e:e8:47:62:40:c4:cd:93:b4:4e:45:c5:09:af:12: 72:ed:10:55:08:d7:d7:af:99:05:8a:af:2d:e5:3f:26: 00:fa:82:92:7e:e5:78:9e:07:82:33:69:d8:67:a3:35: 8e:83:14:24:5b:73:9b:04:31:4e:5d:28:89:f3:d3:9c: 88:dc:88:72:aa:38:23:5b:af:28:cc:f6:0b:7a:1a:03: a5:51:3d:06:d7:70:c0:93:77:a9:a4:1e:95:0b:c1:7f: 67:44:25:45:a5:ba:4d:2e:24:a2:e8:8b:47:d0:0c:57: 14:84:75:91:51:35:bc:92:ed:ff:0c:ba:32:f9:b0:b7: 95:73:8e:cc:13:ea:42:f3:6e:4a:e5:75:7e:4b:24:2b: 78:7a:a3:be:fe:27:e4:66:1a:57:a0:b2:46:de:b2:38: 4f:cb:54:ba:b5:10:33:70:26:9c:9e:46:4b:84:69:9c: aa:ff:49:d2:8e:78:f6:b3:91:74:38:7d:93:55:fb:65: 8c:21:3d:f5:be:a5:2b:57:25:95:d7:c3:2a:8b:db:53 Fingerprint (SHA-256): 1B:9F:E4:45:13:6C:9A:B1:CF:B0:C3:84:D3:7C:D2:2C:51:79:CC:A7:46:89:7C:C6:A7:8B:3C:38:66:8C:B9:91 Fingerprint (SHA1): 12:E3:B1:F3:64:3F:A1:FD:C0:7A:45:C0:68:D5:9F:D4:9F:91:CF:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191072 (0x433ed460) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:11:32 2025 Not After : Thu Nov 28 11:11:32 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:41:49:0a:80:10:4b:1f:17:71:0b:28:85:1a:11:8a: bb:95:37:b6:16:cc:0b:21:b4:e8:de:49:88:82:01:6c: d1:48:30:12:63:61:d3:1b:5c:01:35:5c:fc:05:07:97: 5b:89:55:ae:39:3c:ae:bd:c7:61:2c:4b:6b:a8:cb:ab: 2c:05:68:00:33:e7:ac:a8:f6:16:f6:79:39:f1:6f:f5: 90:6a:18:f1:ff:fe:03:9b:7b:6c:96:4b:64:de:ca:d1: da:87:9d:59:f1:43:f0:4e:45:59:10:ed:b7:b8:45:63: 47:9d:15:f4:73:05:11:49:9e:1b:a4:44:2b:95:a5:ab: 80:92:dd:19:53:47:77:ac:70:95:10:e5:cc:13:6b:cf: f3:d3:a2:b6:9a:cb:46:47:d5:33:73:6d:ea:af:48:03: 1d:2f:38:c9:4c:1c:05:95:6c:92:4c:56:4d:fa:f4:64: 94:cd:6b:90:4f:21:12:61:6b:9e:16:ed:70:9d:60:d0: 9f:f7:0d:3d:4d:2c:72:b1:c5:54:8c:61:d8:10:4d:4e: 7d:58:1e:70:8b:c9:51:8e:77:bf:f7:c2:6d:14:ff:2e: ec:90:bb:20:ba:2b:dc:a2:c9:ac:a1:2e:5c:b3:fb:cb: 6e:a5:da:f6:dc:c0:84:07:57:12:96:c1:ca:34:81:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:ea:97:03:2a:83:64:d0:5b:0a:10:19:82:f3:31:ba: 11:a4:a1:0d:c0:37:5f:93:0a:80:88:96:fe:40:7a:d0: bd:75:74:d4:48:49:7d:f5:7e:57:93:bf:5a:18:3c:f4: df:71:e9:bd:1c:1b:92:5a:8d:4e:5d:6d:4a:6d:23:1f: 1b:f6:8e:70:10:f3:63:7d:f7:9b:13:05:69:8f:c3:84: 89:b2:47:8c:65:78:02:83:e3:b9:5a:e6:a6:0d:4f:9b: 76:6f:5e:34:88:f1:7c:1f:b8:74:c3:5e:0e:99:f5:b8: 6c:e9:d5:81:13:18:41:2d:84:b6:69:bd:f5:fb:7d:c4: 68:7f:3f:6b:e6:8a:b7:17:f7:45:fe:af:1f:01:c8:22: 5f:3f:ef:d6:b8:e9:87:13:d9:3f:e8:eb:f1:e2:9d:16: a5:f2:8b:64:11:d7:f3:46:99:a5:8a:2b:53:36:8c:98: 11:c3:2c:0b:db:f8:10:62:e2:25:e9:70:54:7b:c5:19: 6d:23:58:29:06:82:2f:20:83:f4:ae:b5:ce:be:08:02: 8f:d8:ff:b9:55:c7:bc:35:8b:2e:8c:aa:3f:24:44:f7: ea:f0:62:26:9a:6c:48:82:a2:87:4a:39:d0:e2:c1:99: 1e:51:79:38:6a:62:45:64:da:25:ef:80:f9:db:4d:ad Fingerprint (SHA-256): CD:B6:1D:A4:C4:4A:46:8F:74:6C:53:25:05:8B:07:F3:FF:64:98:B8:23:18:65:86:4E:82:11:62:80:E8:7F:6E Fingerprint (SHA1): A3:61:FD:7B:F7:B8:37:9A:A1:33:0E:F1:13:0C:18:99:9D:40:CB:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191073 (0x433ed461) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:11:32 2025 Not After : Thu Nov 28 11:11:32 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:ba:39:f4:72:81:72:7f:88:e2:3d:74:ce:82:a0:97: c3:25:e3:b3:5c:c6:2c:42:90:3a:4d:44:79:ec:6c:cb: 2d:95:f5:21:f4:db:7b:7e:92:7a:5c:91:0b:3b:ff:ae: 90:c3:d9:11:b9:3f:4d:c9:8b:64:aa:0d:03:c2:d0:b1: c9:09:51:a7:ae:ad:ad:41:35:f0:a2:14:20:ee:0f:67: 83:ec:bb:9f:db:a3:11:d5:88:cf:52:6f:2d:d6:ee:e9: 86:8f:f3:1d:91:80:df:8d:9c:aa:91:8a:99:91:c4:c5: 42:7a:e9:43:64:ee:4b:49:70:c3:30:e4:1f:04:0b:27: 1c:75:7b:c1:ec:b9:1c:fa:85:61:d8:5d:0a:cd:63:73: 33:5d:ee:42:18:9e:57:09:a2:8e:1f:ed:e7:74:b9:b4: fa:74:65:11:d3:59:70:9b:65:a5:fe:7a:c3:04:9f:5f: e4:48:56:b4:65:d3:97:7c:84:56:80:eb:85:78:b0:40: e3:92:89:ae:a7:3f:5e:25:c3:69:a7:9a:08:6c:b7:ab: 86:14:07:8c:2a:fe:10:a6:71:8a:4e:04:c4:b1:b0:5f: 4f:37:5b:68:50:cd:40:30:03:bc:71:d0:83:b9:e1:c5: 3a:fd:49:93:24:a5:d3:5c:52:c3:10:fc:9e:e7:41:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:f3:56:37:52:18:fa:47:a9:f4:d6:39:11:c7:f7:15: 5b:ad:7c:8b:12:1a:e4:f4:53:7f:67:61:b4:d1:7e:b9: 33:a1:b1:49:4d:95:be:bb:06:3b:d0:f7:79:0a:bd:bb: d6:e4:69:e6:80:c0:b8:05:e9:f8:34:43:5a:6e:28:81: 5a:58:d7:a0:69:b4:c6:57:32:fb:60:27:65:64:0b:15: c5:bd:d2:52:1f:9f:76:5a:ac:53:b9:f7:7c:bc:36:95: 0b:38:0e:58:9b:79:57:e9:78:06:ec:a6:3c:19:8d:1c: 7d:b4:7f:20:98:3a:fc:f0:f1:5a:b4:42:c6:08:d6:a5: 06:10:2f:c5:84:17:5a:89:93:8a:28:af:a4:a7:b7:e1: c3:05:32:39:80:c0:4b:bc:2b:b9:f9:e0:b7:a7:b2:17: 5e:a4:b9:ce:14:ac:98:fb:81:ec:7f:92:8d:b2:f6:00: ba:5a:2c:67:96:42:2b:26:bb:b3:6c:cc:96:19:bd:e3: 16:8e:33:a4:65:6b:c4:b7:f7:1d:a1:e7:bd:ff:f1:66: aa:dc:34:2c:5e:e8:cb:00:e2:35:68:51:63:14:aa:b3: 6c:46:ac:7b:ae:86:28:89:db:2a:25:c5:8d:87:52:ea: a0:d3:24:e8:04:dc:4b:15:9f:af:e4:30:e9:b2:25:d6 Fingerprint (SHA-256): 79:8A:31:76:BF:B8:CF:C6:AD:2A:B1:FF:CD:CE:2A:67:6B:20:0E:87:F2:EC:4B:60:1A:E9:87:B3:20:4F:2E:FE Fingerprint (SHA1): 5D:AA:5B:C9:E0:6C:21:8F:EF:83:D6:D5:A0:A4:00:0D:64:3E:9C:0C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191074 (0x433ed462) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:11:33 2025 Not After : Thu Nov 28 11:11:33 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:66:5e:37:46:40:c5:3e:6e:db:c7:6a:b3:68:d2:f4: a7:0e:85:35:c6:1e:1f:ce:c0:3d:d3:32:b4:9b:a5:a5: 9d:9d:b8:9f:46:68:eb:16:33:3a:a7:07:af:ed:40:17: 17:04:72:5f:8a:5d:a0:9b:63:d2:db:87:28:8f:77:90: 61:b3:7d:77:30:69:64:43:97:00:8e:05:3c:5b:90:03: 95:89:37:ee:9b:b9:7d:d7:d8:aa:2a:da:66:0c:be:15: b4:17:57:c6:bd:64:8a:ba:2d:7e:d2:98:f6:22:2c:66: 07:51:0a:ab:42:6d:2c:15:e4:b2:b3:3f:46:a5:b2:a5: 3d:ff:2f:a0:c5:fc:2a:cc:66:0b:3e:67:99:ab:b9:b4: c2:63:30:a1:d1:1e:66:6c:7a:c8:99:5e:d7:17:c1:a9: 03:d3:0e:71:4c:77:3f:a1:38:29:08:cf:ec:71:a2:49: 5e:40:94:55:dd:6e:c0:1d:0e:99:1c:85:7d:8b:39:71: a5:ae:5a:ef:f7:a2:4a:24:ae:84:22:74:01:e2:42:69: 83:3f:78:d7:0c:65:9c:c3:c3:1a:ad:a4:08:3f:68:ad: 11:5d:45:c5:75:15:1f:a7:f0:37:0d:9a:03:bc:9d:17: 3b:19:f8:b3:7c:08:93:dd:c2:b7:98:2a:3e:39:78:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:a7:d4:0c:cf:b4:81:62:04:57:7e:2e:9e:e8:c6:e6: d1:fd:23:90:c1:f4:cd:f0:57:ae:9b:c1:65:85:3d:36: d0:49:31:f1:b3:5e:25:2e:bb:6b:d1:0e:99:0d:c1:a8: c5:d0:a3:3a:1d:e7:71:9a:e7:92:8b:a8:19:12:d9:00: c1:45:ee:fa:03:61:2a:13:9c:6c:7e:dd:be:f0:12:64: db:b0:94:97:7d:e5:21:ea:84:2f:fc:f3:99:5d:71:f9: d8:e6:f1:5c:97:04:00:e6:64:c1:9a:02:7b:a1:f2:f7: c2:0a:4e:5c:dd:be:27:f8:41:48:ea:be:6d:52:5f:88: 84:67:38:dd:57:ff:30:1b:66:53:f1:ea:cd:94:95:63: 7b:ff:86:5a:b2:ee:a4:80:16:d9:36:7e:45:d4:bd:33: 44:89:25:65:a2:e4:53:48:9e:73:40:dc:0b:47:63:75: 7c:13:0d:87:e3:7d:6e:7d:d9:4d:82:62:f5:b7:68:76: 5e:47:ce:e2:e2:d5:4a:10:0c:19:ed:a1:5b:bb:ca:3c: 0c:2a:33:d4:df:56:1b:53:a1:09:bd:94:46:d9:fa:13: 77:0a:1a:11:72:7c:a8:56:59:97:b4:30:19:c2:f3:d2: 67:66:3b:41:6a:1c:3f:d7:e4:9e:d4:0d:67:cb:a8:0f Fingerprint (SHA-256): BA:07:E7:D4:22:E1:53:01:DE:61:F2:EA:40:EE:FD:64:7B:7C:62:B8:05:5F:6E:F5:1F:42:80:3F:E4:77:A6:42 Fingerprint (SHA1): 1A:10:29:02:EA:82:94:8B:CA:34:9E:6A:CB:AA:85:82:3D:14:B7:CD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191075 (0x433ed463) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:11:34 2025 Not After : Thu Nov 28 11:11:34 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c4:a4:15:a6:4a:4c:5b:3a:e1:b0:0f:28:a0:8c:ad: 70:cb:f6:63:35:0c:48:a2:c6:d5:8b:16:61:5c:55:73: 63:e9:14:bd:f3:df:4f:72:70:51:09:da:1a:de:4a:26: 51:3b:71:0c:99:ff:bc:50:6e:1f:84:b1:a1:f2:aa:4d: 13:7f:d2:6e:cf:72:39:5c:47:8b:55:49:69:65:5b:e9: 26:46:dd:94:4e:55:59:b7:cd:a4:b4:8f:a2:fa:9d:51: 7a:99:db:bb:47:17:ac:c4:23:d8:f9:dd:e4:64:f1:b4: 1f:a4:3d:8f:61:ba:8d:26:74:aa:95:e7:0a:25:de:1e: 4f:92:bd:24:99:ca:9e:1c:06:7c:80:8e:02:25:4a:59: de:28:67:71:3e:be:57:39:1c:ee:a4:83:4b:f8:5e:26: 42:c1:b4:60:cf:f4:c6:83:5e:f8:f8:94:5e:b5:fa:ce: 19:39:b9:36:56:8b:d3:fe:62:a0:97:16:5c:26:7b:43: b9:6a:8b:ef:07:b4:ae:dc:73:17:dc:af:9c:2b:43:c2: 0a:c7:a3:6c:4b:d2:00:0b:df:79:9c:1f:70:28:b9:89: 9b:e4:13:f6:f9:5c:6a:99:d4:f6:90:8a:73:4e:6d:56: bf:9e:cf:b5:a3:a1:42:09:44:79:d2:5a:fe:22:3e:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:d3:11:ea:10:77:17:c0:89:71:e8:2b:34:70:62:a7: 83:a6:d0:f2:1f:e8:3d:ed:19:02:21:13:c0:cc:83:5e: 09:2d:7d:ed:cf:fb:db:07:28:62:87:7b:bc:7f:38:f5: 8d:7d:f7:f2:ba:61:77:23:26:1d:60:0a:1c:fc:ff:f4: 2a:f2:be:ce:a9:17:bf:ab:14:61:f7:d7:8b:44:40:e1: 33:3e:37:ec:84:69:48:47:f4:5c:01:4c:8d:72:3f:7e: 51:b5:46:3b:61:ae:16:0c:78:d4:1d:d3:f5:73:10:92: 7c:53:9b:0b:7e:2d:21:26:f8:03:48:13:7d:f1:1b:9c: d5:a4:fe:6a:24:cb:21:6b:e5:0a:35:70:22:30:40:94: 4d:9e:ba:12:13:f2:26:4a:72:ac:13:26:4a:1d:71:a5: ec:47:c4:5e:0c:8a:b9:54:8f:5e:c4:9d:33:9d:ab:e5: 9c:3e:9c:05:8c:55:ef:ce:73:1d:45:66:7f:70:d1:8d: dd:6a:4a:c0:c6:47:2b:8c:98:8e:80:d0:e5:96:93:eb: c9:76:62:f2:05:77:f6:6f:87:7f:01:6e:2f:23:a8:00: 17:9d:a3:48:39:65:40:24:14:7b:d8:22:61:13:58:fe: e4:f1:8b:d3:f2:96:d9:f8:19:b7:32:f4:06:8c:8b:9f Fingerprint (SHA-256): 16:76:A7:C6:38:7A:FA:E6:CF:91:48:19:CE:61:F4:8E:89:FE:6C:8C:F5:8D:BB:BA:36:DC:FD:7A:1D:30:8B:97 Fingerprint (SHA1): 14:5D:05:4B:65:97:07:E0:01:F7:A4:00:75:47:EC:15:3E:4C:D9:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191090 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191091 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191092 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191093 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191090 (0x433ed472) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:41 2025 Not After : Thu Nov 28 11:11:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:f5:4d:16:c2:75:04:47:21:86:bb:ad:13:69:cf:73: 70:c8:cb:cb:25:0a:94:a6:6e:5f:35:b8:ff:5a:9d:d2: 2f:0f:e9:5e:02:4f:79:57:58:42:99:2e:e1:6a:ca:e5: 50:1c:5b:bd:a2:86:5d:a9:f1:db:9e:11:c7:00:cb:47: 31:aa:a7:04:88:5a:17:c6:54:af:0e:53:8d:45:c5:cd: e9:9e:85:13:7e:e3:4b:7d:6c:0d:e4:f6:8c:76:fc:1b: b8:e0:2b:68:5b:c7:aa:49:fd:6f:b9:db:e8:5b:b6:21: fc:25:d1:eb:34:14:47:a4:45:63:7b:85:5c:5c:7d:a1: 63:82:ae:f1:74:2d:70:1b:3a:7f:24:db:85:40:33:25: ff:a9:81:c8:f1:56:1c:e5:96:3e:2e:71:cc:e1:3e:f2: 44:ac:14:a8:a0:7b:bb:f0:f0:05:b7:79:0c:71:b6:b7: 66:4e:98:7d:a2:64:9d:74:ea:d8:01:fc:c8:3e:e5:a5: f6:99:f8:9a:58:e8:db:32:ad:12:20:76:87:db:e7:1d: ab:7e:b9:82:ef:cc:f4:47:29:32:07:8d:9f:2c:cb:ae: 01:1c:13:73:c3:48:13:f2:56:2c:97:9d:65:ca:87:3d: d0:6f:c8:20:05:b0:ce:83:2a:7c:3c:6c:bb:52:c5:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:73:ff:13:3e:d2:f8:f3:8e:06:af:54:6f:54:c1:ec: 6b:d5:6e:e0:79:8a:71:8a:44:f6:fe:b3:42:0d:16:59: 2f:a2:ed:92:e0:d0:a6:32:ca:8f:43:08:f1:b8:7e:cb: b1:11:ae:8e:e3:94:c3:ab:9b:2a:9f:af:5c:ab:e5:86: 64:b2:8f:ee:44:bf:d3:ca:bc:f6:58:4b:77:cc:34:92: 76:c0:aa:01:1f:82:d4:b5:e2:41:55:e3:2b:12:9e:08: 39:5f:55:e8:6d:56:a1:7d:24:32:b6:df:13:d3:f9:a0: 26:9e:52:79:a3:10:30:bf:0b:81:52:b9:97:7f:13:92: f7:a7:fe:da:2b:64:ab:47:31:6a:16:92:8c:28:99:0b: 91:3e:aa:a9:1d:a0:c4:15:18:1e:e4:90:b8:72:2b:68: 4f:27:d8:43:4e:07:ab:b7:72:14:02:4e:1c:90:c0:fb: 2c:ca:f3:c0:30:26:53:51:e0:4b:53:76:ff:9e:43:43: 85:a0:86:5f:4d:71:33:6e:7a:2b:cb:67:0a:1f:bb:5d: ed:e0:f8:67:af:dd:83:d6:5a:5f:27:92:3f:9c:c0:15: 05:c4:e0:fe:02:63:19:fc:ac:96:b4:98:ca:99:9a:72: 3b:b4:fd:85:b9:03:d5:47:a5:b5:f1:b6:de:2f:45:25 Fingerprint (SHA-256): 33:B6:A3:C4:2F:54:5F:3B:94:72:50:DD:47:03:E8:69:91:B5:55:35:B5:60:9B:BD:5F:63:71:BE:2E:25:29:C4 Fingerprint (SHA1): 85:83:89:3E:B9:87:3D:0F:83:67:25:3F:B0:86:E4:3D:DD:F8:5A:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191091 (0x433ed473) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:41 2025 Not After : Thu Nov 28 11:11:41 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:b4:5a:37:d4:6d:4f:1a:be:fa:59:cd:fc:e6:bc:9d: d5:cd:40:ee:da:23:3c:95:80:a0:06:1e:af:e5:60:94: 93:4a:aa:df:91:97:57:cb:97:b5:be:55:54:2e:0d:0a: b9:ee:86:8c:98:a9:27:bc:78:50:8b:a4:1d:1c:dd:af: 3e:d6:04:60:62:fc:92:52:29:57:08:7e:cd:6c:c7:24: 2b:c1:3f:23:52:6a:5a:3d:06:c3:59:d6:e8:8d:73:e5: 56:95:c6:97:82:0c:d4:03:d5:8c:2a:6f:51:60:9c:2b: 23:19:de:71:ce:61:5e:7c:97:2d:33:1c:a7:73:b8:1e: 53:f1:a1:2f:00:b3:b8:84:4f:12:39:f0:d1:5b:9f:00: 94:51:22:a8:bf:d4:4e:48:8a:2e:0b:ac:ce:89:52:31: 7a:84:20:9e:22:21:4c:6e:d7:75:c6:3a:38:69:92:99: 00:2b:c5:1f:a6:22:e3:40:28:f1:d6:a1:e4:49:f2:ce: 31:39:f3:5d:d6:23:68:07:83:bb:30:e6:8d:d9:5c:95: a1:b0:b6:ff:dd:56:20:f9:e0:ff:4b:a9:b1:fb:a9:02: 45:32:3f:85:a9:5a:3f:a3:71:f6:d5:8f:22:e6:54:42: 37:35:f3:72:1c:04:bc:5d:2f:3e:f0:61:c7:44:28:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:71:75:ba:ba:9e:c6:d2:8b:e7:62:30:e9:f2:60:dd: b4:59:a1:fe:24:e2:ab:a4:fc:07:6b:63:e0:5c:de:fd: 5b:c0:df:38:85:19:8c:d8:8b:59:ba:66:4f:77:19:5a: 47:fa:6a:b9:1c:4e:eb:b5:e3:1f:61:b8:fc:1d:2c:d6: 6f:eb:7b:11:04:d0:8e:86:31:4c:e9:14:06:e0:9b:cc: 1c:49:81:2b:fc:43:fc:18:75:f7:e0:f2:aa:3c:5c:d3: c9:09:75:16:7e:d8:92:3f:a2:6b:93:ae:df:e9:e0:55: ea:c1:7f:43:11:05:29:5c:f2:ae:fa:de:d7:35:3c:81: d2:7f:70:7b:f7:86:3f:4e:98:c3:19:eb:22:66:d6:53: 55:19:b0:46:6e:e3:61:9d:24:3c:95:cb:09:8e:3f:de: 2a:f2:a6:1d:b6:17:4d:6b:1b:36:1e:05:66:51:52:e9: 48:b1:ea:25:9f:61:83:46:b7:28:a2:0e:bf:7d:bb:71: eb:0e:23:33:71:06:f9:27:f3:b5:16:b0:42:cd:54:c1: da:f4:65:38:08:8e:b0:7c:59:62:4a:ac:d3:9a:8e:83: 94:ac:93:cd:64:2c:ae:4f:0d:25:87:a7:f6:02:72:e1: c0:82:49:6f:6c:13:61:b3:17:12:b4:87:13:e7:fc:c6 Fingerprint (SHA-256): A2:24:F0:F3:E8:D5:27:C5:CA:46:B6:75:E5:7F:2A:0D:DC:86:D7:F0:75:32:DC:BB:93:93:39:5F:8F:4F:D4:08 Fingerprint (SHA1): B7:18:51:DD:7B:D2:30:ED:E9:76:1A:76:B7:CB:71:F4:85:21:90:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191092 (0x433ed474) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:11:42 2025 Not After : Thu Nov 28 11:11:42 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:ef:97:a6:ce:ae:91:17:65:39:12:17:96:9d:1b:23: 19:95:64:f3:67:da:92:f7:49:8a:da:8c:bc:3b:ec:4c: 1c:84:9e:ee:c1:24:c6:07:b7:31:c8:50:84:34:91:e5: d0:71:20:fe:a9:5e:fa:7e:15:64:4e:f1:ae:64:60:29: 83:77:1c:a9:f0:e3:44:be:85:c9:e3:0a:c2:42:1d:05: db:ca:34:49:e1:94:d6:d5:fe:84:45:c1:5b:36:ae:0b: 8e:c7:c7:d4:d5:57:6a:61:03:2a:a3:4b:ac:f8:14:f5: cb:b9:da:cf:df:a1:3d:00:ae:e8:af:27:ef:e7:ad:dc: 91:94:59:7d:09:cc:40:f9:20:65:5c:73:e2:bf:7f:8d: 48:90:20:d0:c2:80:30:89:9f:a8:0d:cd:4b:06:95:85: 97:ed:5a:88:25:a7:48:c7:77:e1:0d:2f:50:67:85:39: f8:20:f6:89:2d:13:e5:4f:1c:65:eb:71:bb:36:4d:2c: 0a:f7:ae:f7:e6:d9:f7:3d:c3:19:06:21:ae:f2:d3:83: e6:f4:a1:4e:e8:de:81:20:89:d7:dc:d9:54:b9:3a:48: 97:0d:d7:47:16:72:8b:26:28:90:81:67:c4:08:54:d2: 7f:23:e9:e9:ed:22:a3:7d:ba:94:b9:88:10:3c:2c:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:49:7e:6e:92:cf:e0:2b:11:58:10:f0:de:72:b8:10: ac:d9:8f:cf:f2:25:81:fc:a3:dc:38:32:be:36:e0:c0: 8a:6e:1a:bf:c9:06:0b:a7:30:72:bf:f4:d9:4f:c9:06: 19:19:21:6d:c3:d9:a7:06:73:46:54:2f:54:de:d8:bc: 44:c0:13:d1:33:98:b8:13:91:a2:39:76:cd:ad:f1:c2: be:32:7a:9c:35:6c:f9:2b:0a:e6:c8:09:5f:af:8e:aa: 4c:1b:3a:80:34:b3:59:96:26:cb:f3:5d:7a:8b:4f:91: 96:d5:5f:9d:1b:77:ed:e6:31:91:e7:62:13:9a:23:74: 4d:74:5d:11:3f:09:34:eb:10:f7:50:f7:61:57:b4:2b: 83:2b:d0:55:a5:6f:44:84:a7:4f:4f:23:10:f2:3f:a7: 59:a7:e8:b3:88:cf:56:d2:ad:83:e9:30:eb:98:8c:2b: 7f:3b:f1:39:2f:d2:7c:de:2e:d4:c7:15:59:f4:ee:71: 94:7f:32:e1:e9:18:52:ef:73:f1:09:8d:fd:48:80:60: dc:d7:3c:a0:c9:19:98:cc:92:42:cf:57:e1:59:7a:51: 4f:62:c9:46:5d:c4:03:a4:4c:c0:f0:cf:f7:4f:d6:f6: e6:2c:8a:88:f8:d3:dd:73:bb:20:0a:26:6b:e5:25:40 Fingerprint (SHA-256): D9:88:AF:C6:1F:0F:D2:8B:1E:99:69:CF:A5:46:7F:59:73:BD:1B:0C:35:4A:D3:7D:C2:E3:B6:A9:DE:D7:91:7C Fingerprint (SHA1): 93:03:C4:D0:E0:49:51:33:C6:A9:9C:30:91:11:79:E8:3D:6C:24:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191090 (0x433ed472) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:41 2025 Not After : Thu Nov 28 11:11:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:f5:4d:16:c2:75:04:47:21:86:bb:ad:13:69:cf:73: 70:c8:cb:cb:25:0a:94:a6:6e:5f:35:b8:ff:5a:9d:d2: 2f:0f:e9:5e:02:4f:79:57:58:42:99:2e:e1:6a:ca:e5: 50:1c:5b:bd:a2:86:5d:a9:f1:db:9e:11:c7:00:cb:47: 31:aa:a7:04:88:5a:17:c6:54:af:0e:53:8d:45:c5:cd: e9:9e:85:13:7e:e3:4b:7d:6c:0d:e4:f6:8c:76:fc:1b: b8:e0:2b:68:5b:c7:aa:49:fd:6f:b9:db:e8:5b:b6:21: fc:25:d1:eb:34:14:47:a4:45:63:7b:85:5c:5c:7d:a1: 63:82:ae:f1:74:2d:70:1b:3a:7f:24:db:85:40:33:25: ff:a9:81:c8:f1:56:1c:e5:96:3e:2e:71:cc:e1:3e:f2: 44:ac:14:a8:a0:7b:bb:f0:f0:05:b7:79:0c:71:b6:b7: 66:4e:98:7d:a2:64:9d:74:ea:d8:01:fc:c8:3e:e5:a5: f6:99:f8:9a:58:e8:db:32:ad:12:20:76:87:db:e7:1d: ab:7e:b9:82:ef:cc:f4:47:29:32:07:8d:9f:2c:cb:ae: 01:1c:13:73:c3:48:13:f2:56:2c:97:9d:65:ca:87:3d: d0:6f:c8:20:05:b0:ce:83:2a:7c:3c:6c:bb:52:c5:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:73:ff:13:3e:d2:f8:f3:8e:06:af:54:6f:54:c1:ec: 6b:d5:6e:e0:79:8a:71:8a:44:f6:fe:b3:42:0d:16:59: 2f:a2:ed:92:e0:d0:a6:32:ca:8f:43:08:f1:b8:7e:cb: b1:11:ae:8e:e3:94:c3:ab:9b:2a:9f:af:5c:ab:e5:86: 64:b2:8f:ee:44:bf:d3:ca:bc:f6:58:4b:77:cc:34:92: 76:c0:aa:01:1f:82:d4:b5:e2:41:55:e3:2b:12:9e:08: 39:5f:55:e8:6d:56:a1:7d:24:32:b6:df:13:d3:f9:a0: 26:9e:52:79:a3:10:30:bf:0b:81:52:b9:97:7f:13:92: f7:a7:fe:da:2b:64:ab:47:31:6a:16:92:8c:28:99:0b: 91:3e:aa:a9:1d:a0:c4:15:18:1e:e4:90:b8:72:2b:68: 4f:27:d8:43:4e:07:ab:b7:72:14:02:4e:1c:90:c0:fb: 2c:ca:f3:c0:30:26:53:51:e0:4b:53:76:ff:9e:43:43: 85:a0:86:5f:4d:71:33:6e:7a:2b:cb:67:0a:1f:bb:5d: ed:e0:f8:67:af:dd:83:d6:5a:5f:27:92:3f:9c:c0:15: 05:c4:e0:fe:02:63:19:fc:ac:96:b4:98:ca:99:9a:72: 3b:b4:fd:85:b9:03:d5:47:a5:b5:f1:b6:de:2f:45:25 Fingerprint (SHA-256): 33:B6:A3:C4:2F:54:5F:3B:94:72:50:DD:47:03:E8:69:91:B5:55:35:B5:60:9B:BD:5F:63:71:BE:2E:25:29:C4 Fingerprint (SHA1): 85:83:89:3E:B9:87:3D:0F:83:67:25:3F:B0:86:E4:3D:DD:F8:5A:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191091 (0x433ed473) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:41 2025 Not After : Thu Nov 28 11:11:41 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:b4:5a:37:d4:6d:4f:1a:be:fa:59:cd:fc:e6:bc:9d: d5:cd:40:ee:da:23:3c:95:80:a0:06:1e:af:e5:60:94: 93:4a:aa:df:91:97:57:cb:97:b5:be:55:54:2e:0d:0a: b9:ee:86:8c:98:a9:27:bc:78:50:8b:a4:1d:1c:dd:af: 3e:d6:04:60:62:fc:92:52:29:57:08:7e:cd:6c:c7:24: 2b:c1:3f:23:52:6a:5a:3d:06:c3:59:d6:e8:8d:73:e5: 56:95:c6:97:82:0c:d4:03:d5:8c:2a:6f:51:60:9c:2b: 23:19:de:71:ce:61:5e:7c:97:2d:33:1c:a7:73:b8:1e: 53:f1:a1:2f:00:b3:b8:84:4f:12:39:f0:d1:5b:9f:00: 94:51:22:a8:bf:d4:4e:48:8a:2e:0b:ac:ce:89:52:31: 7a:84:20:9e:22:21:4c:6e:d7:75:c6:3a:38:69:92:99: 00:2b:c5:1f:a6:22:e3:40:28:f1:d6:a1:e4:49:f2:ce: 31:39:f3:5d:d6:23:68:07:83:bb:30:e6:8d:d9:5c:95: a1:b0:b6:ff:dd:56:20:f9:e0:ff:4b:a9:b1:fb:a9:02: 45:32:3f:85:a9:5a:3f:a3:71:f6:d5:8f:22:e6:54:42: 37:35:f3:72:1c:04:bc:5d:2f:3e:f0:61:c7:44:28:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:71:75:ba:ba:9e:c6:d2:8b:e7:62:30:e9:f2:60:dd: b4:59:a1:fe:24:e2:ab:a4:fc:07:6b:63:e0:5c:de:fd: 5b:c0:df:38:85:19:8c:d8:8b:59:ba:66:4f:77:19:5a: 47:fa:6a:b9:1c:4e:eb:b5:e3:1f:61:b8:fc:1d:2c:d6: 6f:eb:7b:11:04:d0:8e:86:31:4c:e9:14:06:e0:9b:cc: 1c:49:81:2b:fc:43:fc:18:75:f7:e0:f2:aa:3c:5c:d3: c9:09:75:16:7e:d8:92:3f:a2:6b:93:ae:df:e9:e0:55: ea:c1:7f:43:11:05:29:5c:f2:ae:fa:de:d7:35:3c:81: d2:7f:70:7b:f7:86:3f:4e:98:c3:19:eb:22:66:d6:53: 55:19:b0:46:6e:e3:61:9d:24:3c:95:cb:09:8e:3f:de: 2a:f2:a6:1d:b6:17:4d:6b:1b:36:1e:05:66:51:52:e9: 48:b1:ea:25:9f:61:83:46:b7:28:a2:0e:bf:7d:bb:71: eb:0e:23:33:71:06:f9:27:f3:b5:16:b0:42:cd:54:c1: da:f4:65:38:08:8e:b0:7c:59:62:4a:ac:d3:9a:8e:83: 94:ac:93:cd:64:2c:ae:4f:0d:25:87:a7:f6:02:72:e1: c0:82:49:6f:6c:13:61:b3:17:12:b4:87:13:e7:fc:c6 Fingerprint (SHA-256): A2:24:F0:F3:E8:D5:27:C5:CA:46:B6:75:E5:7F:2A:0D:DC:86:D7:F0:75:32:DC:BB:93:93:39:5F:8F:4F:D4:08 Fingerprint (SHA1): B7:18:51:DD:7B:D2:30:ED:E9:76:1A:76:B7:CB:71:F4:85:21:90:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191092 (0x433ed474) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:11:42 2025 Not After : Thu Nov 28 11:11:42 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:ef:97:a6:ce:ae:91:17:65:39:12:17:96:9d:1b:23: 19:95:64:f3:67:da:92:f7:49:8a:da:8c:bc:3b:ec:4c: 1c:84:9e:ee:c1:24:c6:07:b7:31:c8:50:84:34:91:e5: d0:71:20:fe:a9:5e:fa:7e:15:64:4e:f1:ae:64:60:29: 83:77:1c:a9:f0:e3:44:be:85:c9:e3:0a:c2:42:1d:05: db:ca:34:49:e1:94:d6:d5:fe:84:45:c1:5b:36:ae:0b: 8e:c7:c7:d4:d5:57:6a:61:03:2a:a3:4b:ac:f8:14:f5: cb:b9:da:cf:df:a1:3d:00:ae:e8:af:27:ef:e7:ad:dc: 91:94:59:7d:09:cc:40:f9:20:65:5c:73:e2:bf:7f:8d: 48:90:20:d0:c2:80:30:89:9f:a8:0d:cd:4b:06:95:85: 97:ed:5a:88:25:a7:48:c7:77:e1:0d:2f:50:67:85:39: f8:20:f6:89:2d:13:e5:4f:1c:65:eb:71:bb:36:4d:2c: 0a:f7:ae:f7:e6:d9:f7:3d:c3:19:06:21:ae:f2:d3:83: e6:f4:a1:4e:e8:de:81:20:89:d7:dc:d9:54:b9:3a:48: 97:0d:d7:47:16:72:8b:26:28:90:81:67:c4:08:54:d2: 7f:23:e9:e9:ed:22:a3:7d:ba:94:b9:88:10:3c:2c:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:49:7e:6e:92:cf:e0:2b:11:58:10:f0:de:72:b8:10: ac:d9:8f:cf:f2:25:81:fc:a3:dc:38:32:be:36:e0:c0: 8a:6e:1a:bf:c9:06:0b:a7:30:72:bf:f4:d9:4f:c9:06: 19:19:21:6d:c3:d9:a7:06:73:46:54:2f:54:de:d8:bc: 44:c0:13:d1:33:98:b8:13:91:a2:39:76:cd:ad:f1:c2: be:32:7a:9c:35:6c:f9:2b:0a:e6:c8:09:5f:af:8e:aa: 4c:1b:3a:80:34:b3:59:96:26:cb:f3:5d:7a:8b:4f:91: 96:d5:5f:9d:1b:77:ed:e6:31:91:e7:62:13:9a:23:74: 4d:74:5d:11:3f:09:34:eb:10:f7:50:f7:61:57:b4:2b: 83:2b:d0:55:a5:6f:44:84:a7:4f:4f:23:10:f2:3f:a7: 59:a7:e8:b3:88:cf:56:d2:ad:83:e9:30:eb:98:8c:2b: 7f:3b:f1:39:2f:d2:7c:de:2e:d4:c7:15:59:f4:ee:71: 94:7f:32:e1:e9:18:52:ef:73:f1:09:8d:fd:48:80:60: dc:d7:3c:a0:c9:19:98:cc:92:42:cf:57:e1:59:7a:51: 4f:62:c9:46:5d:c4:03:a4:4c:c0:f0:cf:f7:4f:d6:f6: e6:2c:8a:88:f8:d3:dd:73:bb:20:0a:26:6b:e5:25:40 Fingerprint (SHA-256): D9:88:AF:C6:1F:0F:D2:8B:1E:99:69:CF:A5:46:7F:59:73:BD:1B:0C:35:4A:D3:7D:C2:E3:B6:A9:DE:D7:91:7C Fingerprint (SHA1): 93:03:C4:D0:E0:49:51:33:C6:A9:9C:30:91:11:79:E8:3D:6C:24:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191094 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191095 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191096 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191097 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191098 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191094 (0x433ed476) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:45 2025 Not After : Thu Nov 28 11:11:45 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:ef:89:15:e7:52:89:1e:18:bd:71:15:0d:3f:9e:84: 46:8e:6d:ce:2c:cf:9f:48:f6:b6:79:b6:de:bf:e2:8a: 42:15:75:15:23:f8:6c:5d:2f:a7:42:8f:97:41:07:e2: a6:c8:a4:a6:74:30:9f:6c:5c:ad:05:a0:a1:69:70:36: bc:a9:24:dd:06:17:41:77:4f:0e:ad:10:4f:2d:58:49: 5f:dd:01:5e:8a:cf:67:d6:71:2a:ef:1c:1b:2b:bc:86: 3f:de:bc:c3:b3:4f:6a:3e:83:d1:d9:d3:0a:d2:f2:48: 04:9f:67:3f:28:9d:55:e6:ac:ea:e8:a4:58:b2:09:41: 9b:e7:75:16:db:1c:53:6f:d6:14:f4:c3:e9:6a:21:76: 56:e9:de:bd:a7:e7:a4:b6:97:e5:bf:18:b9:aa:89:8b: d9:8a:76:c2:a5:f5:86:dd:0b:e4:ab:35:71:16:43:5e: f9:bb:8f:2d:2f:2f:ce:5f:8a:b3:fc:a2:a0:36:4c:36: 31:2d:22:fd:b7:05:3f:a1:53:41:4c:93:7e:2a:9c:44: 3d:04:bb:f5:c4:c6:22:71:ab:20:bf:c4:1b:60:6c:50: c4:48:4b:63:1a:30:48:d3:7d:3e:26:8a:50:94:7d:0f: 34:d5:9b:66:5e:76:2b:aa:9c:63:97:6d:a7:12:03:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:7a:30:2f:04:39:a2:ff:de:0f:15:cb:51:a4:81:a7: 70:ad:53:c1:42:e5:2e:9a:41:cb:33:55:17:85:a5:da: 5e:3e:a9:20:0d:99:34:72:41:d8:1b:5e:d5:f0:5e:fd: 8a:68:11:7c:7b:47:91:1c:e3:be:fd:f7:bd:5a:34:10: 46:2c:a0:05:21:1f:37:28:f1:b4:31:e8:d2:6a:3f:d4: ec:50:97:4c:5e:25:1b:ee:9d:2c:36:54:97:31:46:7a: e2:80:0f:12:06:6b:d8:77:58:49:0a:de:73:5f:b4:2c: 53:dd:90:18:8e:ee:92:d0:8d:2e:97:ef:d3:52:9b:9b: fa:1d:1e:e9:1a:14:31:91:28:25:5d:43:b0:9c:c6:6c: 94:3e:dd:09:21:da:a2:e6:a6:da:db:c9:f0:43:a6:45: 57:56:57:7d:67:c6:43:ee:a2:59:e9:6f:e3:ee:56:d6: 2a:90:9f:7c:5a:6a:0e:06:68:3c:92:8a:fa:23:43:c2: a0:1d:14:9c:79:ed:45:e5:56:c2:a9:26:05:4e:d7:f4: 97:68:9e:19:3a:16:63:b9:c0:a1:38:85:c5:0e:ef:17: fd:82:3e:06:52:bd:6e:b6:8e:9a:02:2f:e3:0f:dd:99: 03:0d:78:7f:ce:97:f8:6a:0a:a6:cd:65:a3:b8:5e:75 Fingerprint (SHA-256): A9:DB:61:C2:E5:FB:1B:68:5A:21:E8:76:82:50:DE:15:5C:A9:C8:72:EA:D2:38:E2:CD:CD:FE:6F:39:27:BF:B7 Fingerprint (SHA1): A1:FA:23:74:FA:85:32:7B:E8:A1:35:CC:9A:D3:B8:C9:A2:DA:EB:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191095 (0x433ed477) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:37:e1:04:8e:a7:34:55:05:25:0f:78:44:f7:f2:17: 9d:74:fc:2d:19:06:87:30:ea:02:b8:fc:20:7a:85:9d: be:5f:c0:43:7d:13:17:53:95:00:62:f9:78:ce:bc:d0: 39:9d:95:08:16:80:40:fd:1d:42:de:a0:9d:b5:e5:f7: 1b:a1:31:7b:37:b5:b2:e5:34:4a:3b:95:66:21:b8:80: 2f:21:8f:c7:22:30:c0:82:e3:cb:d8:9d:63:08:33:2e: ef:73:8b:ad:eb:d9:cc:62:4b:29:75:2a:9d:6d:68:5f: 6c:95:e0:89:b4:a8:b4:66:b7:50:f7:bd:94:9f:f5:5d: 59:bf:16:c2:a2:29:19:b6:87:b9:1b:e5:a5:27:7d:2b: 87:03:bf:3a:ec:99:e6:84:6b:9b:20:4d:83:7e:a2:59: dd:8b:f8:5d:91:c3:01:d5:e4:d9:37:d2:8a:40:d4:c4: 07:86:7b:84:5a:b9:8d:19:37:ca:b0:6f:86:45:4f:ff: 0a:5a:c2:3c:48:ef:4d:59:c5:a8:4e:c2:29:e2:29:02: ef:7f:0d:da:8f:0b:3b:ef:bf:d8:26:88:9b:06:a3:04: 77:8b:0a:34:18:34:8b:39:a7:80:76:35:66:e6:1f:93: 9e:4a:37:66:0e:79:4e:73:8e:85:36:8d:ea:d1:05:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:78:45:c2:e2:7b:e7:0c:5b:54:31:9b:bc:9f:09:31: 85:47:25:aa:3b:93:52:11:82:28:53:aa:72:97:82:89: 8d:5c:a4:d0:6c:ba:c6:f2:a3:4e:d3:7d:61:1c:6d:d8: 28:76:c8:6d:e7:ac:ba:5b:d6:16:b9:44:21:d2:ea:88: e1:c7:c8:54:cd:e9:a0:82:d4:c6:79:ad:da:18:4e:ca: f8:26:b4:db:16:e4:74:54:7c:dc:33:f1:b2:9b:fd:fb: e3:a9:ca:39:f2:c8:57:d7:36:15:f6:c3:23:6e:4d:dd: ad:eb:4a:33:8a:12:f9:31:69:52:0b:07:4e:77:10:72: cf:52:2b:ec:26:e8:75:d0:eb:19:78:2a:b6:87:ae:c6: 45:75:52:e4:5d:c0:d2:fd:af:2f:03:36:69:1c:4c:e6: 70:97:5d:8b:42:29:5f:e3:a9:a4:4f:fb:f8:34:d3:69: c2:89:93:fb:8f:10:8f:cc:15:22:f5:7c:e7:10:cf:85: a1:9f:4c:76:9e:08:35:a5:8e:3e:1b:e4:fc:45:c5:9c: 9e:a1:54:a0:09:b8:3b:20:6a:aa:83:98:4d:7f:05:c6: 28:87:1a:0b:f3:f6:f5:c9:47:60:27:54:18:30:e0:16: 4d:7c:e2:93:a5:17:ca:22:68:c5:3c:8f:b1:a0:4a:72 Fingerprint (SHA-256): A2:A2:2F:46:F4:59:41:CF:C9:5C:48:F9:D0:12:7E:6E:17:94:9B:17:CB:CF:E5:F2:0C:94:FA:5A:21:5E:26:9D Fingerprint (SHA1): 5D:2D:8E:6B:6D:FE:30:D0:A8:9B:93:66:B4:4E:90:C0:FC:1B:D5:D7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191096 (0x433ed478) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:3b:d9:bd:2f:5c:10:4d:19:a3:79:00:4a:4b:0a:66: c8:67:51:8f:6c:b0:18:d2:24:69:d9:8b:27:3f:31:8a: 46:dd:68:f9:ee:81:c1:58:ae:0e:d4:f4:2a:ac:73:7f: e4:29:f5:bc:e3:90:70:67:ec:35:f7:9a:21:a1:7c:21: b1:e2:ca:89:5e:80:26:87:84:9a:8b:67:1e:19:b1:45: cf:73:e9:0f:a1:23:f4:1b:d1:6f:1c:3d:a9:50:69:1d: b3:f3:e5:7d:b7:74:6b:bf:4e:68:98:fc:07:aa:66:c7: 14:51:0f:b1:48:6c:8b:44:49:61:51:03:dc:3f:4a:49: 39:0e:84:b4:f4:3a:be:ed:be:ee:f9:47:09:f4:65:d2: 6f:96:79:d2:eb:b8:d6:bf:eb:f3:c7:9a:bf:7b:75:b8: 6e:ea:a4:f0:77:12:12:0a:ca:df:cd:1c:75:ad:16:f4: 6e:41:7a:ff:b7:78:c3:84:e8:51:07:66:ca:e8:c2:df: f7:1e:a5:fc:9b:11:96:85:46:02:43:9e:d4:25:59:f6: 86:ca:ee:a3:1a:f5:13:43:c2:a2:59:ab:89:e1:20:63: c9:92:d6:84:43:1e:76:fc:43:39:d6:c2:92:db:7f:c7: 68:31:18:1f:3b:92:2f:a0:59:de:2e:d4:72:47:4c:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:32:03:7a:66:37:81:24:d6:3d:f7:82:c6:9d:68:07: a9:cd:ff:34:12:25:0c:4a:7e:59:92:2f:51:1f:8b:d1: 7a:d3:83:1f:ac:92:a1:fb:7e:27:76:1e:34:9d:c1:17: b8:33:21:27:50:3f:cd:d4:e1:d7:af:2d:6c:db:d5:fe: c8:85:73:01:a8:b0:d9:6e:96:b9:d4:d3:c8:f1:67:e4: b1:57:53:4c:6b:1c:73:65:72:b2:6b:91:4f:d4:5e:53: 92:5d:2d:d2:cd:37:9c:47:a5:4c:14:b9:ce:bb:39:74: 4f:29:e9:c0:2a:ab:80:a9:38:58:ef:e4:2f:ef:cf:c3: 54:ba:6c:57:4b:a1:bc:7a:e4:b7:17:62:08:1c:7e:75: 3c:a3:17:fc:15:3a:ad:53:73:dc:34:38:0e:d2:d3:a4: 6f:f6:bc:84:a0:d3:e9:54:45:f3:bd:33:ed:a1:f6:da: 8e:0c:2a:de:50:2a:3f:27:3a:32:b1:6b:2d:ae:e0:cc: 10:4d:88:63:1c:68:21:2c:8b:a4:6a:71:be:3c:c5:5d: 1d:0d:a2:a4:96:a8:15:4e:72:08:27:46:94:67:b1:31: 10:66:e6:9a:5b:c7:53:3a:6d:1f:65:59:f2:7e:10:e4: 21:c8:5b:6c:3d:6f:b3:8f:d6:11:a4:ca:49:f9:5c:db Fingerprint (SHA-256): 7F:21:F0:20:BC:F3:6D:DE:13:EF:E1:1E:37:B7:68:52:C9:49:28:6F:41:49:80:30:67:FB:29:D8:16:12:C8:1A Fingerprint (SHA1): 85:85:B3:0A:1E:68:5F:E7:E2:2B:4E:FE:5C:BF:AF:47:DE:63:DA:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191094 (0x433ed476) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:45 2025 Not After : Thu Nov 28 11:11:45 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:ef:89:15:e7:52:89:1e:18:bd:71:15:0d:3f:9e:84: 46:8e:6d:ce:2c:cf:9f:48:f6:b6:79:b6:de:bf:e2:8a: 42:15:75:15:23:f8:6c:5d:2f:a7:42:8f:97:41:07:e2: a6:c8:a4:a6:74:30:9f:6c:5c:ad:05:a0:a1:69:70:36: bc:a9:24:dd:06:17:41:77:4f:0e:ad:10:4f:2d:58:49: 5f:dd:01:5e:8a:cf:67:d6:71:2a:ef:1c:1b:2b:bc:86: 3f:de:bc:c3:b3:4f:6a:3e:83:d1:d9:d3:0a:d2:f2:48: 04:9f:67:3f:28:9d:55:e6:ac:ea:e8:a4:58:b2:09:41: 9b:e7:75:16:db:1c:53:6f:d6:14:f4:c3:e9:6a:21:76: 56:e9:de:bd:a7:e7:a4:b6:97:e5:bf:18:b9:aa:89:8b: d9:8a:76:c2:a5:f5:86:dd:0b:e4:ab:35:71:16:43:5e: f9:bb:8f:2d:2f:2f:ce:5f:8a:b3:fc:a2:a0:36:4c:36: 31:2d:22:fd:b7:05:3f:a1:53:41:4c:93:7e:2a:9c:44: 3d:04:bb:f5:c4:c6:22:71:ab:20:bf:c4:1b:60:6c:50: c4:48:4b:63:1a:30:48:d3:7d:3e:26:8a:50:94:7d:0f: 34:d5:9b:66:5e:76:2b:aa:9c:63:97:6d:a7:12:03:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:7a:30:2f:04:39:a2:ff:de:0f:15:cb:51:a4:81:a7: 70:ad:53:c1:42:e5:2e:9a:41:cb:33:55:17:85:a5:da: 5e:3e:a9:20:0d:99:34:72:41:d8:1b:5e:d5:f0:5e:fd: 8a:68:11:7c:7b:47:91:1c:e3:be:fd:f7:bd:5a:34:10: 46:2c:a0:05:21:1f:37:28:f1:b4:31:e8:d2:6a:3f:d4: ec:50:97:4c:5e:25:1b:ee:9d:2c:36:54:97:31:46:7a: e2:80:0f:12:06:6b:d8:77:58:49:0a:de:73:5f:b4:2c: 53:dd:90:18:8e:ee:92:d0:8d:2e:97:ef:d3:52:9b:9b: fa:1d:1e:e9:1a:14:31:91:28:25:5d:43:b0:9c:c6:6c: 94:3e:dd:09:21:da:a2:e6:a6:da:db:c9:f0:43:a6:45: 57:56:57:7d:67:c6:43:ee:a2:59:e9:6f:e3:ee:56:d6: 2a:90:9f:7c:5a:6a:0e:06:68:3c:92:8a:fa:23:43:c2: a0:1d:14:9c:79:ed:45:e5:56:c2:a9:26:05:4e:d7:f4: 97:68:9e:19:3a:16:63:b9:c0:a1:38:85:c5:0e:ef:17: fd:82:3e:06:52:bd:6e:b6:8e:9a:02:2f:e3:0f:dd:99: 03:0d:78:7f:ce:97:f8:6a:0a:a6:cd:65:a3:b8:5e:75 Fingerprint (SHA-256): A9:DB:61:C2:E5:FB:1B:68:5A:21:E8:76:82:50:DE:15:5C:A9:C8:72:EA:D2:38:E2:CD:CD:FE:6F:39:27:BF:B7 Fingerprint (SHA1): A1:FA:23:74:FA:85:32:7B:E8:A1:35:CC:9A:D3:B8:C9:A2:DA:EB:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191095 (0x433ed477) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:37:e1:04:8e:a7:34:55:05:25:0f:78:44:f7:f2:17: 9d:74:fc:2d:19:06:87:30:ea:02:b8:fc:20:7a:85:9d: be:5f:c0:43:7d:13:17:53:95:00:62:f9:78:ce:bc:d0: 39:9d:95:08:16:80:40:fd:1d:42:de:a0:9d:b5:e5:f7: 1b:a1:31:7b:37:b5:b2:e5:34:4a:3b:95:66:21:b8:80: 2f:21:8f:c7:22:30:c0:82:e3:cb:d8:9d:63:08:33:2e: ef:73:8b:ad:eb:d9:cc:62:4b:29:75:2a:9d:6d:68:5f: 6c:95:e0:89:b4:a8:b4:66:b7:50:f7:bd:94:9f:f5:5d: 59:bf:16:c2:a2:29:19:b6:87:b9:1b:e5:a5:27:7d:2b: 87:03:bf:3a:ec:99:e6:84:6b:9b:20:4d:83:7e:a2:59: dd:8b:f8:5d:91:c3:01:d5:e4:d9:37:d2:8a:40:d4:c4: 07:86:7b:84:5a:b9:8d:19:37:ca:b0:6f:86:45:4f:ff: 0a:5a:c2:3c:48:ef:4d:59:c5:a8:4e:c2:29:e2:29:02: ef:7f:0d:da:8f:0b:3b:ef:bf:d8:26:88:9b:06:a3:04: 77:8b:0a:34:18:34:8b:39:a7:80:76:35:66:e6:1f:93: 9e:4a:37:66:0e:79:4e:73:8e:85:36:8d:ea:d1:05:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:78:45:c2:e2:7b:e7:0c:5b:54:31:9b:bc:9f:09:31: 85:47:25:aa:3b:93:52:11:82:28:53:aa:72:97:82:89: 8d:5c:a4:d0:6c:ba:c6:f2:a3:4e:d3:7d:61:1c:6d:d8: 28:76:c8:6d:e7:ac:ba:5b:d6:16:b9:44:21:d2:ea:88: e1:c7:c8:54:cd:e9:a0:82:d4:c6:79:ad:da:18:4e:ca: f8:26:b4:db:16:e4:74:54:7c:dc:33:f1:b2:9b:fd:fb: e3:a9:ca:39:f2:c8:57:d7:36:15:f6:c3:23:6e:4d:dd: ad:eb:4a:33:8a:12:f9:31:69:52:0b:07:4e:77:10:72: cf:52:2b:ec:26:e8:75:d0:eb:19:78:2a:b6:87:ae:c6: 45:75:52:e4:5d:c0:d2:fd:af:2f:03:36:69:1c:4c:e6: 70:97:5d:8b:42:29:5f:e3:a9:a4:4f:fb:f8:34:d3:69: c2:89:93:fb:8f:10:8f:cc:15:22:f5:7c:e7:10:cf:85: a1:9f:4c:76:9e:08:35:a5:8e:3e:1b:e4:fc:45:c5:9c: 9e:a1:54:a0:09:b8:3b:20:6a:aa:83:98:4d:7f:05:c6: 28:87:1a:0b:f3:f6:f5:c9:47:60:27:54:18:30:e0:16: 4d:7c:e2:93:a5:17:ca:22:68:c5:3c:8f:b1:a0:4a:72 Fingerprint (SHA-256): A2:A2:2F:46:F4:59:41:CF:C9:5C:48:F9:D0:12:7E:6E:17:94:9B:17:CB:CF:E5:F2:0C:94:FA:5A:21:5E:26:9D Fingerprint (SHA1): 5D:2D:8E:6B:6D:FE:30:D0:A8:9B:93:66:B4:4E:90:C0:FC:1B:D5:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191096 (0x433ed478) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:3b:d9:bd:2f:5c:10:4d:19:a3:79:00:4a:4b:0a:66: c8:67:51:8f:6c:b0:18:d2:24:69:d9:8b:27:3f:31:8a: 46:dd:68:f9:ee:81:c1:58:ae:0e:d4:f4:2a:ac:73:7f: e4:29:f5:bc:e3:90:70:67:ec:35:f7:9a:21:a1:7c:21: b1:e2:ca:89:5e:80:26:87:84:9a:8b:67:1e:19:b1:45: cf:73:e9:0f:a1:23:f4:1b:d1:6f:1c:3d:a9:50:69:1d: b3:f3:e5:7d:b7:74:6b:bf:4e:68:98:fc:07:aa:66:c7: 14:51:0f:b1:48:6c:8b:44:49:61:51:03:dc:3f:4a:49: 39:0e:84:b4:f4:3a:be:ed:be:ee:f9:47:09:f4:65:d2: 6f:96:79:d2:eb:b8:d6:bf:eb:f3:c7:9a:bf:7b:75:b8: 6e:ea:a4:f0:77:12:12:0a:ca:df:cd:1c:75:ad:16:f4: 6e:41:7a:ff:b7:78:c3:84:e8:51:07:66:ca:e8:c2:df: f7:1e:a5:fc:9b:11:96:85:46:02:43:9e:d4:25:59:f6: 86:ca:ee:a3:1a:f5:13:43:c2:a2:59:ab:89:e1:20:63: c9:92:d6:84:43:1e:76:fc:43:39:d6:c2:92:db:7f:c7: 68:31:18:1f:3b:92:2f:a0:59:de:2e:d4:72:47:4c:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:32:03:7a:66:37:81:24:d6:3d:f7:82:c6:9d:68:07: a9:cd:ff:34:12:25:0c:4a:7e:59:92:2f:51:1f:8b:d1: 7a:d3:83:1f:ac:92:a1:fb:7e:27:76:1e:34:9d:c1:17: b8:33:21:27:50:3f:cd:d4:e1:d7:af:2d:6c:db:d5:fe: c8:85:73:01:a8:b0:d9:6e:96:b9:d4:d3:c8:f1:67:e4: b1:57:53:4c:6b:1c:73:65:72:b2:6b:91:4f:d4:5e:53: 92:5d:2d:d2:cd:37:9c:47:a5:4c:14:b9:ce:bb:39:74: 4f:29:e9:c0:2a:ab:80:a9:38:58:ef:e4:2f:ef:cf:c3: 54:ba:6c:57:4b:a1:bc:7a:e4:b7:17:62:08:1c:7e:75: 3c:a3:17:fc:15:3a:ad:53:73:dc:34:38:0e:d2:d3:a4: 6f:f6:bc:84:a0:d3:e9:54:45:f3:bd:33:ed:a1:f6:da: 8e:0c:2a:de:50:2a:3f:27:3a:32:b1:6b:2d:ae:e0:cc: 10:4d:88:63:1c:68:21:2c:8b:a4:6a:71:be:3c:c5:5d: 1d:0d:a2:a4:96:a8:15:4e:72:08:27:46:94:67:b1:31: 10:66:e6:9a:5b:c7:53:3a:6d:1f:65:59:f2:7e:10:e4: 21:c8:5b:6c:3d:6f:b3:8f:d6:11:a4:ca:49:f9:5c:db Fingerprint (SHA-256): 7F:21:F0:20:BC:F3:6D:DE:13:EF:E1:1E:37:B7:68:52:C9:49:28:6F:41:49:80:30:67:FB:29:D8:16:12:C8:1A Fingerprint (SHA1): 85:85:B3:0A:1E:68:5F:E7:E2:2B:4E:FE:5C:BF:AF:47:DE:63:DA:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191094 (0x433ed476) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:45 2025 Not After : Thu Nov 28 11:11:45 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:ef:89:15:e7:52:89:1e:18:bd:71:15:0d:3f:9e:84: 46:8e:6d:ce:2c:cf:9f:48:f6:b6:79:b6:de:bf:e2:8a: 42:15:75:15:23:f8:6c:5d:2f:a7:42:8f:97:41:07:e2: a6:c8:a4:a6:74:30:9f:6c:5c:ad:05:a0:a1:69:70:36: bc:a9:24:dd:06:17:41:77:4f:0e:ad:10:4f:2d:58:49: 5f:dd:01:5e:8a:cf:67:d6:71:2a:ef:1c:1b:2b:bc:86: 3f:de:bc:c3:b3:4f:6a:3e:83:d1:d9:d3:0a:d2:f2:48: 04:9f:67:3f:28:9d:55:e6:ac:ea:e8:a4:58:b2:09:41: 9b:e7:75:16:db:1c:53:6f:d6:14:f4:c3:e9:6a:21:76: 56:e9:de:bd:a7:e7:a4:b6:97:e5:bf:18:b9:aa:89:8b: d9:8a:76:c2:a5:f5:86:dd:0b:e4:ab:35:71:16:43:5e: f9:bb:8f:2d:2f:2f:ce:5f:8a:b3:fc:a2:a0:36:4c:36: 31:2d:22:fd:b7:05:3f:a1:53:41:4c:93:7e:2a:9c:44: 3d:04:bb:f5:c4:c6:22:71:ab:20:bf:c4:1b:60:6c:50: c4:48:4b:63:1a:30:48:d3:7d:3e:26:8a:50:94:7d:0f: 34:d5:9b:66:5e:76:2b:aa:9c:63:97:6d:a7:12:03:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:7a:30:2f:04:39:a2:ff:de:0f:15:cb:51:a4:81:a7: 70:ad:53:c1:42:e5:2e:9a:41:cb:33:55:17:85:a5:da: 5e:3e:a9:20:0d:99:34:72:41:d8:1b:5e:d5:f0:5e:fd: 8a:68:11:7c:7b:47:91:1c:e3:be:fd:f7:bd:5a:34:10: 46:2c:a0:05:21:1f:37:28:f1:b4:31:e8:d2:6a:3f:d4: ec:50:97:4c:5e:25:1b:ee:9d:2c:36:54:97:31:46:7a: e2:80:0f:12:06:6b:d8:77:58:49:0a:de:73:5f:b4:2c: 53:dd:90:18:8e:ee:92:d0:8d:2e:97:ef:d3:52:9b:9b: fa:1d:1e:e9:1a:14:31:91:28:25:5d:43:b0:9c:c6:6c: 94:3e:dd:09:21:da:a2:e6:a6:da:db:c9:f0:43:a6:45: 57:56:57:7d:67:c6:43:ee:a2:59:e9:6f:e3:ee:56:d6: 2a:90:9f:7c:5a:6a:0e:06:68:3c:92:8a:fa:23:43:c2: a0:1d:14:9c:79:ed:45:e5:56:c2:a9:26:05:4e:d7:f4: 97:68:9e:19:3a:16:63:b9:c0:a1:38:85:c5:0e:ef:17: fd:82:3e:06:52:bd:6e:b6:8e:9a:02:2f:e3:0f:dd:99: 03:0d:78:7f:ce:97:f8:6a:0a:a6:cd:65:a3:b8:5e:75 Fingerprint (SHA-256): A9:DB:61:C2:E5:FB:1B:68:5A:21:E8:76:82:50:DE:15:5C:A9:C8:72:EA:D2:38:E2:CD:CD:FE:6F:39:27:BF:B7 Fingerprint (SHA1): A1:FA:23:74:FA:85:32:7B:E8:A1:35:CC:9A:D3:B8:C9:A2:DA:EB:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191094 (0x433ed476) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:45 2025 Not After : Thu Nov 28 11:11:45 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:ef:89:15:e7:52:89:1e:18:bd:71:15:0d:3f:9e:84: 46:8e:6d:ce:2c:cf:9f:48:f6:b6:79:b6:de:bf:e2:8a: 42:15:75:15:23:f8:6c:5d:2f:a7:42:8f:97:41:07:e2: a6:c8:a4:a6:74:30:9f:6c:5c:ad:05:a0:a1:69:70:36: bc:a9:24:dd:06:17:41:77:4f:0e:ad:10:4f:2d:58:49: 5f:dd:01:5e:8a:cf:67:d6:71:2a:ef:1c:1b:2b:bc:86: 3f:de:bc:c3:b3:4f:6a:3e:83:d1:d9:d3:0a:d2:f2:48: 04:9f:67:3f:28:9d:55:e6:ac:ea:e8:a4:58:b2:09:41: 9b:e7:75:16:db:1c:53:6f:d6:14:f4:c3:e9:6a:21:76: 56:e9:de:bd:a7:e7:a4:b6:97:e5:bf:18:b9:aa:89:8b: d9:8a:76:c2:a5:f5:86:dd:0b:e4:ab:35:71:16:43:5e: f9:bb:8f:2d:2f:2f:ce:5f:8a:b3:fc:a2:a0:36:4c:36: 31:2d:22:fd:b7:05:3f:a1:53:41:4c:93:7e:2a:9c:44: 3d:04:bb:f5:c4:c6:22:71:ab:20:bf:c4:1b:60:6c:50: c4:48:4b:63:1a:30:48:d3:7d:3e:26:8a:50:94:7d:0f: 34:d5:9b:66:5e:76:2b:aa:9c:63:97:6d:a7:12:03:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:7a:30:2f:04:39:a2:ff:de:0f:15:cb:51:a4:81:a7: 70:ad:53:c1:42:e5:2e:9a:41:cb:33:55:17:85:a5:da: 5e:3e:a9:20:0d:99:34:72:41:d8:1b:5e:d5:f0:5e:fd: 8a:68:11:7c:7b:47:91:1c:e3:be:fd:f7:bd:5a:34:10: 46:2c:a0:05:21:1f:37:28:f1:b4:31:e8:d2:6a:3f:d4: ec:50:97:4c:5e:25:1b:ee:9d:2c:36:54:97:31:46:7a: e2:80:0f:12:06:6b:d8:77:58:49:0a:de:73:5f:b4:2c: 53:dd:90:18:8e:ee:92:d0:8d:2e:97:ef:d3:52:9b:9b: fa:1d:1e:e9:1a:14:31:91:28:25:5d:43:b0:9c:c6:6c: 94:3e:dd:09:21:da:a2:e6:a6:da:db:c9:f0:43:a6:45: 57:56:57:7d:67:c6:43:ee:a2:59:e9:6f:e3:ee:56:d6: 2a:90:9f:7c:5a:6a:0e:06:68:3c:92:8a:fa:23:43:c2: a0:1d:14:9c:79:ed:45:e5:56:c2:a9:26:05:4e:d7:f4: 97:68:9e:19:3a:16:63:b9:c0:a1:38:85:c5:0e:ef:17: fd:82:3e:06:52:bd:6e:b6:8e:9a:02:2f:e3:0f:dd:99: 03:0d:78:7f:ce:97:f8:6a:0a:a6:cd:65:a3:b8:5e:75 Fingerprint (SHA-256): A9:DB:61:C2:E5:FB:1B:68:5A:21:E8:76:82:50:DE:15:5C:A9:C8:72:EA:D2:38:E2:CD:CD:FE:6F:39:27:BF:B7 Fingerprint (SHA1): A1:FA:23:74:FA:85:32:7B:E8:A1:35:CC:9A:D3:B8:C9:A2:DA:EB:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191095 (0x433ed477) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:37:e1:04:8e:a7:34:55:05:25:0f:78:44:f7:f2:17: 9d:74:fc:2d:19:06:87:30:ea:02:b8:fc:20:7a:85:9d: be:5f:c0:43:7d:13:17:53:95:00:62:f9:78:ce:bc:d0: 39:9d:95:08:16:80:40:fd:1d:42:de:a0:9d:b5:e5:f7: 1b:a1:31:7b:37:b5:b2:e5:34:4a:3b:95:66:21:b8:80: 2f:21:8f:c7:22:30:c0:82:e3:cb:d8:9d:63:08:33:2e: ef:73:8b:ad:eb:d9:cc:62:4b:29:75:2a:9d:6d:68:5f: 6c:95:e0:89:b4:a8:b4:66:b7:50:f7:bd:94:9f:f5:5d: 59:bf:16:c2:a2:29:19:b6:87:b9:1b:e5:a5:27:7d:2b: 87:03:bf:3a:ec:99:e6:84:6b:9b:20:4d:83:7e:a2:59: dd:8b:f8:5d:91:c3:01:d5:e4:d9:37:d2:8a:40:d4:c4: 07:86:7b:84:5a:b9:8d:19:37:ca:b0:6f:86:45:4f:ff: 0a:5a:c2:3c:48:ef:4d:59:c5:a8:4e:c2:29:e2:29:02: ef:7f:0d:da:8f:0b:3b:ef:bf:d8:26:88:9b:06:a3:04: 77:8b:0a:34:18:34:8b:39:a7:80:76:35:66:e6:1f:93: 9e:4a:37:66:0e:79:4e:73:8e:85:36:8d:ea:d1:05:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:78:45:c2:e2:7b:e7:0c:5b:54:31:9b:bc:9f:09:31: 85:47:25:aa:3b:93:52:11:82:28:53:aa:72:97:82:89: 8d:5c:a4:d0:6c:ba:c6:f2:a3:4e:d3:7d:61:1c:6d:d8: 28:76:c8:6d:e7:ac:ba:5b:d6:16:b9:44:21:d2:ea:88: e1:c7:c8:54:cd:e9:a0:82:d4:c6:79:ad:da:18:4e:ca: f8:26:b4:db:16:e4:74:54:7c:dc:33:f1:b2:9b:fd:fb: e3:a9:ca:39:f2:c8:57:d7:36:15:f6:c3:23:6e:4d:dd: ad:eb:4a:33:8a:12:f9:31:69:52:0b:07:4e:77:10:72: cf:52:2b:ec:26:e8:75:d0:eb:19:78:2a:b6:87:ae:c6: 45:75:52:e4:5d:c0:d2:fd:af:2f:03:36:69:1c:4c:e6: 70:97:5d:8b:42:29:5f:e3:a9:a4:4f:fb:f8:34:d3:69: c2:89:93:fb:8f:10:8f:cc:15:22:f5:7c:e7:10:cf:85: a1:9f:4c:76:9e:08:35:a5:8e:3e:1b:e4:fc:45:c5:9c: 9e:a1:54:a0:09:b8:3b:20:6a:aa:83:98:4d:7f:05:c6: 28:87:1a:0b:f3:f6:f5:c9:47:60:27:54:18:30:e0:16: 4d:7c:e2:93:a5:17:ca:22:68:c5:3c:8f:b1:a0:4a:72 Fingerprint (SHA-256): A2:A2:2F:46:F4:59:41:CF:C9:5C:48:F9:D0:12:7E:6E:17:94:9B:17:CB:CF:E5:F2:0C:94:FA:5A:21:5E:26:9D Fingerprint (SHA1): 5D:2D:8E:6B:6D:FE:30:D0:A8:9B:93:66:B4:4E:90:C0:FC:1B:D5:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191095 (0x433ed477) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:37:e1:04:8e:a7:34:55:05:25:0f:78:44:f7:f2:17: 9d:74:fc:2d:19:06:87:30:ea:02:b8:fc:20:7a:85:9d: be:5f:c0:43:7d:13:17:53:95:00:62:f9:78:ce:bc:d0: 39:9d:95:08:16:80:40:fd:1d:42:de:a0:9d:b5:e5:f7: 1b:a1:31:7b:37:b5:b2:e5:34:4a:3b:95:66:21:b8:80: 2f:21:8f:c7:22:30:c0:82:e3:cb:d8:9d:63:08:33:2e: ef:73:8b:ad:eb:d9:cc:62:4b:29:75:2a:9d:6d:68:5f: 6c:95:e0:89:b4:a8:b4:66:b7:50:f7:bd:94:9f:f5:5d: 59:bf:16:c2:a2:29:19:b6:87:b9:1b:e5:a5:27:7d:2b: 87:03:bf:3a:ec:99:e6:84:6b:9b:20:4d:83:7e:a2:59: dd:8b:f8:5d:91:c3:01:d5:e4:d9:37:d2:8a:40:d4:c4: 07:86:7b:84:5a:b9:8d:19:37:ca:b0:6f:86:45:4f:ff: 0a:5a:c2:3c:48:ef:4d:59:c5:a8:4e:c2:29:e2:29:02: ef:7f:0d:da:8f:0b:3b:ef:bf:d8:26:88:9b:06:a3:04: 77:8b:0a:34:18:34:8b:39:a7:80:76:35:66:e6:1f:93: 9e:4a:37:66:0e:79:4e:73:8e:85:36:8d:ea:d1:05:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:78:45:c2:e2:7b:e7:0c:5b:54:31:9b:bc:9f:09:31: 85:47:25:aa:3b:93:52:11:82:28:53:aa:72:97:82:89: 8d:5c:a4:d0:6c:ba:c6:f2:a3:4e:d3:7d:61:1c:6d:d8: 28:76:c8:6d:e7:ac:ba:5b:d6:16:b9:44:21:d2:ea:88: e1:c7:c8:54:cd:e9:a0:82:d4:c6:79:ad:da:18:4e:ca: f8:26:b4:db:16:e4:74:54:7c:dc:33:f1:b2:9b:fd:fb: e3:a9:ca:39:f2:c8:57:d7:36:15:f6:c3:23:6e:4d:dd: ad:eb:4a:33:8a:12:f9:31:69:52:0b:07:4e:77:10:72: cf:52:2b:ec:26:e8:75:d0:eb:19:78:2a:b6:87:ae:c6: 45:75:52:e4:5d:c0:d2:fd:af:2f:03:36:69:1c:4c:e6: 70:97:5d:8b:42:29:5f:e3:a9:a4:4f:fb:f8:34:d3:69: c2:89:93:fb:8f:10:8f:cc:15:22:f5:7c:e7:10:cf:85: a1:9f:4c:76:9e:08:35:a5:8e:3e:1b:e4:fc:45:c5:9c: 9e:a1:54:a0:09:b8:3b:20:6a:aa:83:98:4d:7f:05:c6: 28:87:1a:0b:f3:f6:f5:c9:47:60:27:54:18:30:e0:16: 4d:7c:e2:93:a5:17:ca:22:68:c5:3c:8f:b1:a0:4a:72 Fingerprint (SHA-256): A2:A2:2F:46:F4:59:41:CF:C9:5C:48:F9:D0:12:7E:6E:17:94:9B:17:CB:CF:E5:F2:0C:94:FA:5A:21:5E:26:9D Fingerprint (SHA1): 5D:2D:8E:6B:6D:FE:30:D0:A8:9B:93:66:B4:4E:90:C0:FC:1B:D5:D7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191096 (0x433ed478) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:3b:d9:bd:2f:5c:10:4d:19:a3:79:00:4a:4b:0a:66: c8:67:51:8f:6c:b0:18:d2:24:69:d9:8b:27:3f:31:8a: 46:dd:68:f9:ee:81:c1:58:ae:0e:d4:f4:2a:ac:73:7f: e4:29:f5:bc:e3:90:70:67:ec:35:f7:9a:21:a1:7c:21: b1:e2:ca:89:5e:80:26:87:84:9a:8b:67:1e:19:b1:45: cf:73:e9:0f:a1:23:f4:1b:d1:6f:1c:3d:a9:50:69:1d: b3:f3:e5:7d:b7:74:6b:bf:4e:68:98:fc:07:aa:66:c7: 14:51:0f:b1:48:6c:8b:44:49:61:51:03:dc:3f:4a:49: 39:0e:84:b4:f4:3a:be:ed:be:ee:f9:47:09:f4:65:d2: 6f:96:79:d2:eb:b8:d6:bf:eb:f3:c7:9a:bf:7b:75:b8: 6e:ea:a4:f0:77:12:12:0a:ca:df:cd:1c:75:ad:16:f4: 6e:41:7a:ff:b7:78:c3:84:e8:51:07:66:ca:e8:c2:df: f7:1e:a5:fc:9b:11:96:85:46:02:43:9e:d4:25:59:f6: 86:ca:ee:a3:1a:f5:13:43:c2:a2:59:ab:89:e1:20:63: c9:92:d6:84:43:1e:76:fc:43:39:d6:c2:92:db:7f:c7: 68:31:18:1f:3b:92:2f:a0:59:de:2e:d4:72:47:4c:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:32:03:7a:66:37:81:24:d6:3d:f7:82:c6:9d:68:07: a9:cd:ff:34:12:25:0c:4a:7e:59:92:2f:51:1f:8b:d1: 7a:d3:83:1f:ac:92:a1:fb:7e:27:76:1e:34:9d:c1:17: b8:33:21:27:50:3f:cd:d4:e1:d7:af:2d:6c:db:d5:fe: c8:85:73:01:a8:b0:d9:6e:96:b9:d4:d3:c8:f1:67:e4: b1:57:53:4c:6b:1c:73:65:72:b2:6b:91:4f:d4:5e:53: 92:5d:2d:d2:cd:37:9c:47:a5:4c:14:b9:ce:bb:39:74: 4f:29:e9:c0:2a:ab:80:a9:38:58:ef:e4:2f:ef:cf:c3: 54:ba:6c:57:4b:a1:bc:7a:e4:b7:17:62:08:1c:7e:75: 3c:a3:17:fc:15:3a:ad:53:73:dc:34:38:0e:d2:d3:a4: 6f:f6:bc:84:a0:d3:e9:54:45:f3:bd:33:ed:a1:f6:da: 8e:0c:2a:de:50:2a:3f:27:3a:32:b1:6b:2d:ae:e0:cc: 10:4d:88:63:1c:68:21:2c:8b:a4:6a:71:be:3c:c5:5d: 1d:0d:a2:a4:96:a8:15:4e:72:08:27:46:94:67:b1:31: 10:66:e6:9a:5b:c7:53:3a:6d:1f:65:59:f2:7e:10:e4: 21:c8:5b:6c:3d:6f:b3:8f:d6:11:a4:ca:49:f9:5c:db Fingerprint (SHA-256): 7F:21:F0:20:BC:F3:6D:DE:13:EF:E1:1E:37:B7:68:52:C9:49:28:6F:41:49:80:30:67:FB:29:D8:16:12:C8:1A Fingerprint (SHA1): 85:85:B3:0A:1E:68:5F:E7:E2:2B:4E:FE:5C:BF:AF:47:DE:63:DA:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191096 (0x433ed478) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:11:46 2025 Not After : Thu Nov 28 11:11:46 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:3b:d9:bd:2f:5c:10:4d:19:a3:79:00:4a:4b:0a:66: c8:67:51:8f:6c:b0:18:d2:24:69:d9:8b:27:3f:31:8a: 46:dd:68:f9:ee:81:c1:58:ae:0e:d4:f4:2a:ac:73:7f: e4:29:f5:bc:e3:90:70:67:ec:35:f7:9a:21:a1:7c:21: b1:e2:ca:89:5e:80:26:87:84:9a:8b:67:1e:19:b1:45: cf:73:e9:0f:a1:23:f4:1b:d1:6f:1c:3d:a9:50:69:1d: b3:f3:e5:7d:b7:74:6b:bf:4e:68:98:fc:07:aa:66:c7: 14:51:0f:b1:48:6c:8b:44:49:61:51:03:dc:3f:4a:49: 39:0e:84:b4:f4:3a:be:ed:be:ee:f9:47:09:f4:65:d2: 6f:96:79:d2:eb:b8:d6:bf:eb:f3:c7:9a:bf:7b:75:b8: 6e:ea:a4:f0:77:12:12:0a:ca:df:cd:1c:75:ad:16:f4: 6e:41:7a:ff:b7:78:c3:84:e8:51:07:66:ca:e8:c2:df: f7:1e:a5:fc:9b:11:96:85:46:02:43:9e:d4:25:59:f6: 86:ca:ee:a3:1a:f5:13:43:c2:a2:59:ab:89:e1:20:63: c9:92:d6:84:43:1e:76:fc:43:39:d6:c2:92:db:7f:c7: 68:31:18:1f:3b:92:2f:a0:59:de:2e:d4:72:47:4c:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:32:03:7a:66:37:81:24:d6:3d:f7:82:c6:9d:68:07: a9:cd:ff:34:12:25:0c:4a:7e:59:92:2f:51:1f:8b:d1: 7a:d3:83:1f:ac:92:a1:fb:7e:27:76:1e:34:9d:c1:17: b8:33:21:27:50:3f:cd:d4:e1:d7:af:2d:6c:db:d5:fe: c8:85:73:01:a8:b0:d9:6e:96:b9:d4:d3:c8:f1:67:e4: b1:57:53:4c:6b:1c:73:65:72:b2:6b:91:4f:d4:5e:53: 92:5d:2d:d2:cd:37:9c:47:a5:4c:14:b9:ce:bb:39:74: 4f:29:e9:c0:2a:ab:80:a9:38:58:ef:e4:2f:ef:cf:c3: 54:ba:6c:57:4b:a1:bc:7a:e4:b7:17:62:08:1c:7e:75: 3c:a3:17:fc:15:3a:ad:53:73:dc:34:38:0e:d2:d3:a4: 6f:f6:bc:84:a0:d3:e9:54:45:f3:bd:33:ed:a1:f6:da: 8e:0c:2a:de:50:2a:3f:27:3a:32:b1:6b:2d:ae:e0:cc: 10:4d:88:63:1c:68:21:2c:8b:a4:6a:71:be:3c:c5:5d: 1d:0d:a2:a4:96:a8:15:4e:72:08:27:46:94:67:b1:31: 10:66:e6:9a:5b:c7:53:3a:6d:1f:65:59:f2:7e:10:e4: 21:c8:5b:6c:3d:6f:b3:8f:d6:11:a4:ca:49:f9:5c:db Fingerprint (SHA-256): 7F:21:F0:20:BC:F3:6D:DE:13:EF:E1:1E:37:B7:68:52:C9:49:28:6F:41:49:80:30:67:FB:29:D8:16:12:C8:1A Fingerprint (SHA1): 85:85:B3:0A:1E:68:5F:E7:E2:2B:4E:FE:5C:BF:AF:47:DE:63:DA:8B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191099 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191100 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191101 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128191102 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191103 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191104 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128191105 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191099 (0x433ed47b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:50 2025 Not After : Thu Nov 28 11:11:50 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:64:17:92:ae:b3:60:19:7d:af:1f:58:1a:3f:c9:51: 34:c8:8e:54:39:b2:80:d7:64:25:b5:d6:45:a9:d5:eb: a4:31:c6:9f:4a:e2:ab:e2:3c:35:68:aa:52:a0:d4:8c: fd:fc:7b:f7:77:cf:f5:ea:2d:1b:aa:fe:e3:12:d0:47: 69:e5:df:0f:81:1b:b5:cc:02:e9:cd:71:4b:0d:02:88: 8c:a6:04:19:4c:6a:6c:58:06:08:d1:e2:92:66:74:ec: 90:bd:be:6b:8f:c7:bd:f1:b3:25:ff:e9:67:ea:dd:8f: 66:b5:3f:3e:48:29:0f:1c:7d:cd:20:ce:bd:f3:26:f0: 56:58:dd:55:47:7a:42:ed:97:da:fc:1b:3c:97:70:0e: 58:55:e7:4c:2c:28:b7:38:33:23:f2:eb:7e:2d:a9:90: 28:d5:19:0a:40:a0:55:46:d6:f8:06:4c:b8:93:e6:97: 9b:03:75:47:2d:9d:01:3b:9b:00:36:43:19:6c:88:81: 26:a1:be:9f:28:d8:15:99:4f:c0:23:95:ae:39:c2:45: 5c:a5:1c:6a:be:23:20:b8:9a:52:84:f4:ee:17:72:b2: 8e:bf:1c:6d:28:2c:db:37:1a:94:9c:58:e3:db:92:57: d4:04:f1:e2:25:92:35:b4:c9:36:03:90:5b:ff:5e:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:d8:b9:d7:5e:9f:0a:c9:db:33:54:34:05:77:23:88: 27:6d:d1:9d:b3:10:94:6a:91:10:e9:28:bf:61:a3:ee: 88:0a:24:68:36:1b:68:bd:89:ea:d9:ea:64:96:66:66: 33:1d:50:28:20:8a:00:0c:ce:6a:69:1d:c5:82:26:30: a8:e8:6e:f1:cd:97:28:0e:3e:5b:37:c4:84:88:d6:0a: a8:be:8c:39:91:53:8c:87:27:e8:ac:53:b1:4b:ad:90: 3b:c3:66:ee:7f:a7:c6:ad:5f:f8:b9:d5:99:80:53:c6: 3d:9c:b2:c7:10:89:90:e6:b2:b6:9c:d4:da:2a:9b:bf: 38:a6:31:24:55:b8:58:74:5f:33:14:1c:a7:52:96:13: 55:d0:18:44:20:cf:f5:fd:55:e8:7e:a8:62:b5:0c:91: 46:ff:09:a6:5e:e7:92:40:b3:e4:19:f9:54:07:28:84: aa:1a:b2:30:ca:cd:a7:8d:66:82:76:00:4f:59:06:2c: 84:89:ee:93:64:8d:e7:22:5f:5d:c1:89:f9:15:fa:e8: 99:35:09:d2:bf:ba:54:9c:6c:a1:99:c8:d5:33:16:90: 19:8a:46:bd:9e:f9:b1:7c:b1:80:86:ac:72:2f:c8:f1: b1:b4:58:49:1b:1a:e7:50:b9:6f:84:f1:94:36:e4:44 Fingerprint (SHA-256): 2C:DF:E4:3C:D8:5C:38:FC:94:08:94:67:C2:86:04:AD:3B:85:67:23:C5:0E:CE:E7:16:AC:65:C7:9A:FB:75:DB Fingerprint (SHA1): 4D:D1:00:66:1A:B1:58:78:DD:D4:AB:0A:8A:8D:73:20:19:CF:98:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191099 (0x433ed47b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:50 2025 Not After : Thu Nov 28 11:11:50 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:64:17:92:ae:b3:60:19:7d:af:1f:58:1a:3f:c9:51: 34:c8:8e:54:39:b2:80:d7:64:25:b5:d6:45:a9:d5:eb: a4:31:c6:9f:4a:e2:ab:e2:3c:35:68:aa:52:a0:d4:8c: fd:fc:7b:f7:77:cf:f5:ea:2d:1b:aa:fe:e3:12:d0:47: 69:e5:df:0f:81:1b:b5:cc:02:e9:cd:71:4b:0d:02:88: 8c:a6:04:19:4c:6a:6c:58:06:08:d1:e2:92:66:74:ec: 90:bd:be:6b:8f:c7:bd:f1:b3:25:ff:e9:67:ea:dd:8f: 66:b5:3f:3e:48:29:0f:1c:7d:cd:20:ce:bd:f3:26:f0: 56:58:dd:55:47:7a:42:ed:97:da:fc:1b:3c:97:70:0e: 58:55:e7:4c:2c:28:b7:38:33:23:f2:eb:7e:2d:a9:90: 28:d5:19:0a:40:a0:55:46:d6:f8:06:4c:b8:93:e6:97: 9b:03:75:47:2d:9d:01:3b:9b:00:36:43:19:6c:88:81: 26:a1:be:9f:28:d8:15:99:4f:c0:23:95:ae:39:c2:45: 5c:a5:1c:6a:be:23:20:b8:9a:52:84:f4:ee:17:72:b2: 8e:bf:1c:6d:28:2c:db:37:1a:94:9c:58:e3:db:92:57: d4:04:f1:e2:25:92:35:b4:c9:36:03:90:5b:ff:5e:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:d8:b9:d7:5e:9f:0a:c9:db:33:54:34:05:77:23:88: 27:6d:d1:9d:b3:10:94:6a:91:10:e9:28:bf:61:a3:ee: 88:0a:24:68:36:1b:68:bd:89:ea:d9:ea:64:96:66:66: 33:1d:50:28:20:8a:00:0c:ce:6a:69:1d:c5:82:26:30: a8:e8:6e:f1:cd:97:28:0e:3e:5b:37:c4:84:88:d6:0a: a8:be:8c:39:91:53:8c:87:27:e8:ac:53:b1:4b:ad:90: 3b:c3:66:ee:7f:a7:c6:ad:5f:f8:b9:d5:99:80:53:c6: 3d:9c:b2:c7:10:89:90:e6:b2:b6:9c:d4:da:2a:9b:bf: 38:a6:31:24:55:b8:58:74:5f:33:14:1c:a7:52:96:13: 55:d0:18:44:20:cf:f5:fd:55:e8:7e:a8:62:b5:0c:91: 46:ff:09:a6:5e:e7:92:40:b3:e4:19:f9:54:07:28:84: aa:1a:b2:30:ca:cd:a7:8d:66:82:76:00:4f:59:06:2c: 84:89:ee:93:64:8d:e7:22:5f:5d:c1:89:f9:15:fa:e8: 99:35:09:d2:bf:ba:54:9c:6c:a1:99:c8:d5:33:16:90: 19:8a:46:bd:9e:f9:b1:7c:b1:80:86:ac:72:2f:c8:f1: b1:b4:58:49:1b:1a:e7:50:b9:6f:84:f1:94:36:e4:44 Fingerprint (SHA-256): 2C:DF:E4:3C:D8:5C:38:FC:94:08:94:67:C2:86:04:AD:3B:85:67:23:C5:0E:CE:E7:16:AC:65:C7:9A:FB:75:DB Fingerprint (SHA1): 4D:D1:00:66:1A:B1:58:78:DD:D4:AB:0A:8A:8D:73:20:19:CF:98:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191106 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191107 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128191108 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128191109 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128191110 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128191111 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128191112 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128191113 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128191114 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128191115 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128191116 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128191117 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128191118 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128191119 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128191120 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128191121 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128191122 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128191123 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128191124 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128191125 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128191126 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128191127 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128191128 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128191129 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128191130 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128191131 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128191132 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128191133 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128191134 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128191135 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191106 (0x433ed482) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:11:55 2025 Not After : Thu Nov 28 11:11:55 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:47:b2:23:68:72:7a:db:35:d9:e7:7e:51:fc:6d:f9: 31:b2:61:83:7c:62:62:ce:cd:98:90:07:9d:d7:38:b0: 4e:b6:9b:6a:83:27:f0:3b:16:a3:b7:ed:cf:92:0b:b4: f0:a0:05:a1:a3:43:b9:96:45:4a:43:e1:cd:26:27:3f: 10:64:17:04:3c:99:06:cd:d9:43:b7:42:99:5a:96:e8: 9f:e4:97:e4:05:fb:99:35:c8:03:c3:85:87:52:c0:8a: 62:b6:06:ef:73:51:26:4a:08:e0:7b:69:52:f4:e1:59: aa:1d:5c:bb:d0:e2:17:f7:93:c2:f9:bc:36:d7:97:6b: b7:aa:0e:9b:9e:cf:f4:89:80:83:44:91:be:e9:d0:9a: bb:82:37:f9:d2:0a:b6:15:b4:de:e5:c9:9a:b3:90:79: d0:04:29:aa:a0:40:ca:72:21:9c:5f:f0:31:f7:45:c1: 33:53:eb:01:ff:c8:c8:ca:f3:20:d2:ee:08:d9:fe:8c: f4:6f:46:f8:5b:b2:8f:7e:a0:94:00:14:fd:46:be:0c: 4e:cc:83:ca:72:8c:ea:e1:66:e1:f6:b0:9c:08:96:34: 57:24:86:3d:c1:b1:48:d5:fa:46:ff:28:c4:a1:55:7f: b4:ef:36:00:03:e2:ac:bb:36:32:d9:a3:a9:2d:69:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e8:0f:b8:35:26:51:b6:51:3b:b1:ad:cc:e5:b3:65: f9:1c:2a:6d:93:50:cf:24:16:23:7f:94:e1:d7:fb:f8: 53:52:da:ae:f8:99:1a:ab:04:dd:b0:13:19:22:c8:1a: ad:da:98:59:4a:e4:8e:70:53:28:27:4b:ad:f0:59:76: f1:a0:c4:98:b3:ee:39:00:58:f4:10:12:ec:16:89:28: 36:82:7f:20:8c:a3:8f:46:31:70:63:ad:fc:8f:f0:59: 5b:48:27:54:95:73:43:cb:c4:3a:d7:4d:52:39:ed:64: cb:42:37:4b:17:92:13:c0:de:06:c7:e9:04:eb:ee:64: cf:c0:d5:7f:8a:2f:0e:fc:41:d2:e4:a7:ff:ec:22:e0: 2c:aa:cb:c0:a6:eb:ef:26:e0:ca:48:0c:d8:ac:c6:9b: f7:4e:6c:09:cf:ec:fe:b6:aa:af:2c:be:79:e6:33:74: f1:75:f6:27:d8:23:c2:2f:2d:fc:c3:be:d2:e4:59:bd: 18:15:64:61:bb:d4:84:24:80:39:d6:50:3f:73:2b:4a: 6f:59:f7:83:c0:9a:75:2a:dc:97:49:37:49:07:01:33: c2:b7:75:c1:c9:cc:c8:b8:65:38:6e:b3:5a:41:e1:3b: aa:4a:72:84:1c:60:b7:07:27:fd:c8:4a:b8:68:2e:26 Fingerprint (SHA-256): A8:1A:3F:41:D2:06:BC:74:C2:54:81:EE:5D:FB:85:EC:52:A3:FD:D2:21:92:D9:14:A3:EE:62:DB:D4:95:31:00 Fingerprint (SHA1): 42:9E:A9:4F:FC:89:30:CF:F5:1B:F2:DA:BB:63:30:0A:85:0E:9D:CC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191136 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128191137 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128191138 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128191139 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128191140 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128191141 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128191142 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191136 (0x433ed4a0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:18 2025 Not After : Thu Nov 28 11:12:18 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:30:57:56:27:1f:96:6e:b5:99:32:84:f2:64:d4:9b: a1:b5:e3:7e:32:0f:ff:36:05:40:d4:9f:55:e9:a0:8d: b2:35:ed:c2:74:0c:df:be:ac:fc:fe:d9:bc:6a:15:60: f4:45:ef:3a:6b:70:d0:14:ff:21:f8:bf:38:f7:53:2a: 0d:59:a0:be:dc:e9:9d:63:30:97:47:12:cf:59:7f:10: a7:b0:2b:3d:51:14:89:d2:0a:f7:97:a9:4f:e0:df:b7: 2c:f1:72:18:06:d8:31:94:a1:3c:48:aa:c1:c9:e6:b7: d8:4f:6c:f9:da:e7:d3:28:81:62:fb:05:9e:44:fa:5a: ad:ec:d4:7d:61:de:df:74:c6:87:b7:ef:ab:50:1f:29: ed:7b:9e:44:f5:55:39:2a:65:66:88:37:f7:97:14:f9: 02:7e:58:b6:99:9d:4f:58:3b:82:35:34:49:f4:22:ba: 71:37:02:f0:32:3b:8a:4e:69:a0:b7:53:9e:da:ea:a9: 55:ea:f0:aa:7a:b9:24:b8:22:83:48:41:f4:36:11:06: ac:8c:5d:0f:20:2c:08:7a:32:0d:27:47:ee:68:7e:3a: 16:45:26:75:da:5e:bd:68:4d:e7:ec:49:e5:1b:96:61: f7:c1:13:ed:03:a3:bd:b9:d8:5b:e7:9f:00:d2:73:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a9:de:88:4c:15:a0:cd:ef:57:78:f0:e7:e1:da:c2: 55:87:0c:b3:d3:c0:c6:a4:bf:8e:d8:0c:3e:06:a6:b3: c7:4d:9f:ee:43:2c:a1:d5:a7:68:1e:22:74:02:f8:2a: 97:8d:bb:9a:5e:ad:15:8d:db:a3:d9:88:24:01:f6:42: af:0d:48:38:d4:06:d1:1f:9d:40:c4:4a:7b:fd:9f:13: bf:5e:89:f7:d4:31:26:64:3c:6f:d6:53:ce:a3:91:2c: 61:90:0a:5f:ec:92:bd:7b:5d:71:2a:d7:65:ef:54:4f: 42:39:cb:58:f0:6c:a2:89:49:d0:f2:d0:b7:69:fe:c8: 5c:f7:88:65:9c:df:6c:1f:4f:a4:6c:71:25:94:92:86: 94:f0:1b:f5:17:2f:70:1b:2b:7c:a5:9f:dd:a8:eb:5e: d9:f8:35:df:04:b5:6c:9c:62:0c:f9:22:5c:2a:fd:c4: 38:e3:55:72:bd:df:92:4a:ea:13:cb:83:b8:26:3f:02: f4:83:0a:08:85:b7:1a:ae:8f:e6:60:08:25:b4:f8:53: 0d:ca:98:f6:3e:ca:5a:57:01:bd:ff:22:96:7a:d9:76: 77:ef:f6:d1:00:df:9d:15:fd:af:33:82:96:6a:6f:f6: aa:81:47:95:cd:5e:20:13:48:d1:84:0c:4b:a0:ea:24 Fingerprint (SHA-256): BA:31:76:A3:1D:98:F9:B2:B7:95:23:F5:F5:53:C7:16:B8:75:B4:87:C9:AA:74:76:B1:B6:36:3B:34:94:63:1B Fingerprint (SHA1): 00:6C:74:70:CF:CE:5F:95:47:19:02:96:D5:CF:48:E7:D6:E8:5A:49 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191136 (0x433ed4a0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:18 2025 Not After : Thu Nov 28 11:12:18 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:30:57:56:27:1f:96:6e:b5:99:32:84:f2:64:d4:9b: a1:b5:e3:7e:32:0f:ff:36:05:40:d4:9f:55:e9:a0:8d: b2:35:ed:c2:74:0c:df:be:ac:fc:fe:d9:bc:6a:15:60: f4:45:ef:3a:6b:70:d0:14:ff:21:f8:bf:38:f7:53:2a: 0d:59:a0:be:dc:e9:9d:63:30:97:47:12:cf:59:7f:10: a7:b0:2b:3d:51:14:89:d2:0a:f7:97:a9:4f:e0:df:b7: 2c:f1:72:18:06:d8:31:94:a1:3c:48:aa:c1:c9:e6:b7: d8:4f:6c:f9:da:e7:d3:28:81:62:fb:05:9e:44:fa:5a: ad:ec:d4:7d:61:de:df:74:c6:87:b7:ef:ab:50:1f:29: ed:7b:9e:44:f5:55:39:2a:65:66:88:37:f7:97:14:f9: 02:7e:58:b6:99:9d:4f:58:3b:82:35:34:49:f4:22:ba: 71:37:02:f0:32:3b:8a:4e:69:a0:b7:53:9e:da:ea:a9: 55:ea:f0:aa:7a:b9:24:b8:22:83:48:41:f4:36:11:06: ac:8c:5d:0f:20:2c:08:7a:32:0d:27:47:ee:68:7e:3a: 16:45:26:75:da:5e:bd:68:4d:e7:ec:49:e5:1b:96:61: f7:c1:13:ed:03:a3:bd:b9:d8:5b:e7:9f:00:d2:73:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:a9:de:88:4c:15:a0:cd:ef:57:78:f0:e7:e1:da:c2: 55:87:0c:b3:d3:c0:c6:a4:bf:8e:d8:0c:3e:06:a6:b3: c7:4d:9f:ee:43:2c:a1:d5:a7:68:1e:22:74:02:f8:2a: 97:8d:bb:9a:5e:ad:15:8d:db:a3:d9:88:24:01:f6:42: af:0d:48:38:d4:06:d1:1f:9d:40:c4:4a:7b:fd:9f:13: bf:5e:89:f7:d4:31:26:64:3c:6f:d6:53:ce:a3:91:2c: 61:90:0a:5f:ec:92:bd:7b:5d:71:2a:d7:65:ef:54:4f: 42:39:cb:58:f0:6c:a2:89:49:d0:f2:d0:b7:69:fe:c8: 5c:f7:88:65:9c:df:6c:1f:4f:a4:6c:71:25:94:92:86: 94:f0:1b:f5:17:2f:70:1b:2b:7c:a5:9f:dd:a8:eb:5e: d9:f8:35:df:04:b5:6c:9c:62:0c:f9:22:5c:2a:fd:c4: 38:e3:55:72:bd:df:92:4a:ea:13:cb:83:b8:26:3f:02: f4:83:0a:08:85:b7:1a:ae:8f:e6:60:08:25:b4:f8:53: 0d:ca:98:f6:3e:ca:5a:57:01:bd:ff:22:96:7a:d9:76: 77:ef:f6:d1:00:df:9d:15:fd:af:33:82:96:6a:6f:f6: aa:81:47:95:cd:5e:20:13:48:d1:84:0c:4b:a0:ea:24 Fingerprint (SHA-256): BA:31:76:A3:1D:98:F9:B2:B7:95:23:F5:F5:53:C7:16:B8:75:B4:87:C9:AA:74:76:B1:B6:36:3B:34:94:63:1B Fingerprint (SHA1): 00:6C:74:70:CF:CE:5F:95:47:19:02:96:D5:CF:48:E7:D6:E8:5A:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191143 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191144 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191145 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191146 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191143 (0x433ed4a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:23 2025 Not After : Thu Nov 28 11:12:23 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:fa:ae:e4:87:36:08:dd:7d:f2:03:70:eb:24:a8:88: ef:c3:32:fa:be:ff:d5:38:dc:92:ba:5d:4d:23:3e:75: 58:35:44:00:8d:7c:a1:50:b3:67:cd:63:83:5b:02:a0: 6a:fb:c8:66:3f:67:26:27:d0:1c:dd:19:c7:cf:74:fd: 9e:0b:ab:c3:ed:4e:22:11:af:01:df:8a:56:02:86:1d: 61:4f:4e:04:84:93:23:92:bc:2b:44:fc:f8:61:9a:6e: d5:41:6f:84:00:83:77:44:ae:0d:d4:70:3c:e0:21:7c: 33:db:88:94:5f:b3:41:39:88:d0:bb:07:f1:21:7a:e1: f7:2b:19:43:e3:cb:3f:3f:be:3d:53:a0:d0:3a:bd:6b: 5a:e4:b3:a9:80:b1:6b:f3:b1:a7:e3:3b:6c:b1:39:d8: 11:1f:88:0e:73:9f:d3:a6:1a:58:50:4e:37:6e:7e:19: dc:a2:00:74:d7:c2:a3:3e:da:d3:fd:3b:b7:4b:3d:9b: 1c:51:7e:de:c3:e3:4b:77:ed:9a:66:14:db:47:d2:4b: 8b:eb:05:38:9f:f6:ba:c9:ec:d7:be:6a:2b:c9:ac:13: f8:f5:19:96:67:7e:98:f8:56:56:80:51:80:5a:39:7b: 9d:83:49:b8:22:d5:f4:33:94:25:46:91:cf:19:32:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:b6:c7:cb:9b:c5:3b:04:9a:62:ad:23:4a:44:be:bb: 8d:80:81:b8:64:a8:42:1c:2a:78:0b:f5:01:54:01:f0: dd:3d:c9:b0:a7:aa:db:28:88:b2:4d:a5:6a:7b:f5:e1: 4e:2e:ad:4b:ac:84:05:f9:fc:a3:67:ff:6b:c9:ae:53: 71:17:b6:12:1d:5b:55:b4:d8:38:6c:56:5a:6a:48:1f: 5b:e2:bd:28:c0:0d:e9:6c:e3:4d:09:27:4a:d6:70:e3: 98:a1:ee:01:0f:25:5e:84:54:84:ba:4a:12:16:ca:c8: 59:f0:a1:05:81:46:a7:63:fc:6b:75:9c:d3:d7:92:10: 49:c8:71:87:df:dd:cf:d1:98:82:53:1b:98:f7:64:2f: a0:d8:51:f3:e9:10:2e:e2:a5:30:13:0c:6e:db:19:12: 16:ca:1e:3c:50:19:7f:8a:07:3c:6b:64:92:e7:d8:28: 71:2f:ac:58:f5:6a:8c:85:25:1b:36:09:a0:1b:b0:e7: 0e:f9:92:a1:2e:fa:bf:f6:95:83:83:a9:9d:fd:3b:d4: 92:7f:58:bd:fc:7f:fa:87:f5:87:b2:73:13:3b:ef:55: 89:67:6f:40:7f:d3:11:4f:2a:70:e3:ad:62:3a:b8:81: e9:aa:54:2d:f7:36:14:7c:42:0c:7f:25:33:cb:99:31 Fingerprint (SHA-256): C8:9F:C5:01:CE:9E:76:6A:5F:B4:27:75:2F:FA:97:3B:4B:5A:84:38:3C:A1:B4:BC:CD:30:9A:39:0E:EE:FB:3D Fingerprint (SHA1): 1D:84:3A:DC:62:91:7D:A1:9D:03:94:51:21:D0:EC:3D:1B:1B:3B:C5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191144 (0x433ed4a8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:24 2025 Not After : Thu Nov 28 11:12:24 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:7a:d8:5f:05:64:48:30:53:37:70:e7:ef:76:09:8d: 1d:21:c7:c4:81:36:9e:01:c2:23:8c:21:3e:cd:54:70: b0:0c:2a:f7:34:37:80:79:28:55:0a:f3:50:de:2c:14: 8f:82:d3:20:fa:89:d5:8d:65:80:53:63:98:8e:a8:64: 69:f6:0b:31:66:d6:70:4c:8b:cf:ae:87:0e:1f:07:03: a0:e5:cc:42:a4:92:e3:58:db:7d:31:ac:b0:71:df:30: 83:32:25:80:01:6c:a4:c4:c0:b8:62:24:77:33:51:c4: 9d:6f:1d:52:f6:cd:83:ab:a7:f8:a9:44:dd:d3:f9:2f: 9b:8e:96:20:cc:fd:7b:6a:cd:0c:32:95:b4:d8:57:ac: c8:19:a2:7a:fb:4a:cf:bd:9f:01:99:73:84:97:1b:4a: fb:41:42:8f:fe:90:40:a4:a9:b5:1a:17:ee:51:e0:aa: 80:1d:8e:fa:b5:9e:06:f8:85:40:4d:92:86:0f:c5:e6: 01:8d:8d:88:63:72:c1:ee:14:af:d2:c2:9a:c6:c5:f8: c6:13:e8:64:9b:a7:86:ac:ce:44:77:22:a6:3b:d1:2f: d7:ea:c2:f2:30:fc:90:e0:8b:60:05:1e:e4:60:b2:86: c8:1a:36:c5:22:14:3e:78:df:47:48:2d:ae:2f:1b:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:11:5e:b0:95:b2:87:a8:b7:0d:16:f3:a3:fc:9f:a2: 24:c8:f2:b2:24:e1:dc:59:01:b9:90:42:bb:ef:69:3a: 68:23:8a:b5:d7:6d:51:ac:61:13:e2:79:92:fe:33:03: 97:88:52:34:42:56:97:7c:d4:0b:8e:8c:72:65:74:a1: f2:da:d2:a3:69:bf:19:27:44:d0:8b:9e:48:73:2a:90: 9c:9c:e9:98:82:43:a4:ce:f2:bf:09:dc:ed:74:73:ac: 3f:c2:c3:17:83:79:0f:13:6e:e8:22:99:f3:6b:12:15: 7b:af:f1:40:e8:ce:da:79:bd:b7:01:d1:08:ca:1a:61: bf:29:df:21:8d:5f:60:85:11:cc:88:fa:e4:6e:15:4d: 85:45:96:b9:17:a0:18:dc:76:fc:de:bd:74:ee:cd:29: 88:74:4f:6f:0b:3c:c3:6a:fa:d9:59:21:eb:37:5e:fa: 5f:84:fb:3f:07:40:cd:11:cc:27:4f:79:bc:38:52:07: 60:e6:e2:47:b5:ca:71:1f:7b:ba:4c:cd:64:b5:43:46: 02:00:1e:ee:e5:bb:e7:20:b4:d9:6b:dc:86:16:63:15: 57:ec:c1:a9:e9:50:1a:15:c1:68:12:ff:23:7b:ac:cc: 50:ef:18:3f:5d:f8:52:10:60:56:a7:48:5e:a2:02:bc Fingerprint (SHA-256): 95:C0:D4:8F:FE:61:6A:D4:07:C6:FC:F9:01:01:74:B6:36:F2:03:A0:73:0A:93:A0:8E:E4:BD:FE:B7:B3:04:E7 Fingerprint (SHA1): 03:63:44:6B:8E:59:B0:8B:60:A9:EE:D7:0A:59:58:00:86:5C:6F:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191145 (0x433ed4a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:12:25 2025 Not After : Thu Nov 28 11:12:25 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:fa:74:fd:50:6e:11:3c:fe:09:c3:dc:18:3c:b7:9d: ea:f7:d2:9d:65:fc:46:3d:67:86:95:7a:45:8a:ed:99: 50:e7:3c:a4:fb:b7:25:04:7d:f9:b1:2e:49:0e:3c:b4: b6:65:7f:51:e9:55:81:2e:03:52:19:0d:3c:45:29:88: 84:b8:66:73:6b:0e:3e:2a:b2:25:03:f1:f3:ce:1c:41: ad:0d:6d:7a:e4:e2:10:13:eb:3b:08:bb:39:c0:3a:c1: e9:63:ca:ab:45:28:90:4c:df:43:d0:f7:3f:14:ea:84: 37:ae:b4:51:84:97:ec:5d:3b:08:30:0f:01:f7:11:72: 7e:e6:20:cf:a5:ff:a2:1d:9e:89:6f:fd:1d:94:76:1d: f6:76:a0:7b:ed:41:bd:37:02:8a:68:df:ba:49:e8:03: d8:6e:ae:9e:7d:fc:0e:38:32:72:2b:d9:8f:ee:e6:8a: 2f:92:8d:11:28:af:f7:a5:bd:45:ae:30:de:da:fc:08: 50:ca:c4:75:66:f1:ba:90:7e:b1:7f:6a:27:a8:2d:c7: 90:cf:45:a9:52:d4:8f:46:41:49:35:09:a1:13:4d:6c: 97:b2:26:5c:09:a2:68:9f:16:b9:a4:6c:48:8a:90:43: 1f:ee:01:a8:47:49:cb:ed:74:88:c1:c8:d4:3d:72:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:fe:87:a6:b8:d1:ef:d9:4e:ec:43:ba:33:f7:3e:8b: de:f8:18:1c:3b:44:37:63:26:6c:44:71:2f:92:3b:95: 69:07:14:86:a6:fd:04:f7:15:0a:f9:b8:c5:d3:70:ef: ee:21:aa:53:a8:38:36:82:e9:80:58:fa:3c:74:cc:e2: 59:7e:c5:15:c2:31:76:94:02:c6:97:30:a0:68:fc:10: 30:c3:a1:b9:15:07:0f:74:db:9f:75:b9:14:26:79:d5: 82:12:a1:eb:0e:7e:bf:71:f9:8a:2e:18:c8:bb:14:0b: cd:5e:c0:fb:bf:1e:ca:b0:5a:a7:ec:6f:10:ec:54:06: 83:82:e3:1a:16:37:92:f5:d5:da:fd:52:50:b7:db:b6: 42:4c:d3:3c:85:9f:52:c2:52:16:18:32:d9:56:5b:8d: 9c:f5:dd:22:dc:c5:b2:a7:94:e5:1e:11:15:64:97:da: 92:b0:d1:88:c3:9c:32:94:ce:44:4e:c5:51:01:42:ea: 56:5b:77:d3:93:2c:79:fc:49:ca:2a:c6:88:21:01:71: 9e:a7:70:47:27:50:b4:1e:38:b5:83:2e:12:34:da:28: 56:00:b7:2b:e3:ca:69:7d:8d:69:fe:5d:93:09:70:b3: 04:8b:9f:29:90:4d:59:7d:c1:c1:7f:74:13:db:88:12 Fingerprint (SHA-256): 26:23:54:7D:2A:F2:D1:A2:0B:2D:C6:12:D7:EF:D7:5A:73:5C:E8:70:4D:00:AE:48:1D:09:F5:3B:52:F9:84:F7 Fingerprint (SHA1): 49:F6:01:6E:0D:DB:D1:F8:DC:47:9E:F6:DA:22:0C:26:1D:42:F8:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191147 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191148 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191149 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128191150 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128191151 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191147 (0x433ed4ab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:27 2025 Not After : Thu Nov 28 11:12:27 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:fb:68:cf:19:84:ea:37:f9:ee:3f:fc:19:3a:d9:46: 99:6d:fa:cb:ff:2f:95:95:9c:97:7d:65:82:22:7e:82: 96:93:50:1e:6c:f8:1d:ac:e5:12:dc:a8:ab:56:26:ac: 07:f2:45:90:63:fa:44:fa:b4:bc:66:12:ad:90:80:43: d5:7e:f9:b9:d2:ac:24:1d:e7:16:15:bd:d7:44:ed:2b: 7b:47:d5:c4:7f:a3:79:92:b2:b0:51:71:ef:2f:65:ed: 7e:17:5b:00:a6:7b:ce:26:ec:98:1e:d4:ac:5b:c6:b5: ff:e4:6e:b8:82:45:5a:53:db:f5:da:b6:57:25:e0:f6: 1c:70:c9:df:96:d3:d4:12:bc:c0:4c:9c:9f:ea:e9:61: 96:79:d9:01:1f:6a:4e:e1:7a:90:d8:4b:04:28:bc:4c: 6a:e2:84:0a:a7:03:b9:a8:0b:1d:15:92:95:18:fe:e1: ab:ee:59:6b:58:92:2e:b3:bf:ab:d8:ac:d2:ba:a4:87: 3b:37:9c:0f:56:0b:b5:72:97:ac:af:dd:ba:e8:14:e0: 2b:5b:ab:23:11:42:3a:13:9e:a0:a6:64:13:26:51:60: 45:60:4c:98:b0:1c:80:b2:a3:80:8c:40:fd:66:8b:d4: a1:da:73:9f:73:27:2d:d9:dd:09:6d:a0:3b:f2:86:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:a1:67:3a:e0:27:07:0c:23:b3:06:38:ff:33:80:71: 35:04:c7:b4:02:40:70:85:0d:8c:cd:65:ce:99:f4:2e: 2b:fb:f6:91:37:3d:3a:b3:46:5d:ab:c1:d1:46:9d:9c: b8:49:98:46:56:5d:f3:57:16:63:0d:93:53:ec:5c:76: 6f:78:65:1e:06:02:25:ce:b8:1c:42:17:6c:06:1e:ae: 4e:bd:0c:7f:f5:c2:ff:75:d3:23:84:b3:0c:e2:1e:87: ae:bd:d6:cc:3a:e9:86:5c:f6:d4:12:75:9c:a0:ac:59: 67:ee:25:49:2d:a1:bc:7e:f2:43:d8:3d:ca:5d:47:30: 5f:59:7a:ff:3b:cc:24:9b:2c:c2:db:48:92:06:ba:dd: b8:be:7c:a9:c7:e1:79:89:41:a7:52:e9:d1:47:42:bc: c2:89:ab:30:57:ab:8f:e5:00:01:b0:0d:9c:ff:91:12: 92:8f:df:c7:b3:28:22:2d:c9:ce:32:af:06:09:be:08: 02:f1:33:de:57:38:04:5a:d0:e5:35:0d:f4:62:5b:da: cb:ca:96:83:c3:c3:9c:15:aa:d2:dc:fc:d8:5c:03:2b: e7:25:cd:5e:c7:79:44:46:38:90:14:84:72:85:9b:72: 33:70:7e:11:c5:20:f2:2a:d5:53:dd:57:dd:6d:f7:3d Fingerprint (SHA-256): 14:BD:CC:12:19:15:65:8D:5F:B3:01:21:E4:E6:8A:0A:FE:7D:2D:BC:2B:9C:F5:6A:58:E5:FD:F6:D3:ED:32:63 Fingerprint (SHA1): 09:9D:1B:D0:95:83:1D:36:A2:AC:B1:7D:94:2F:3C:03:9A:FF:65:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191148 (0x433ed4ac) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:28 2025 Not After : Thu Nov 28 11:12:28 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:89:a1:fd:65:cd:73:6c:ef:81:f7:f6:22:2e:af:60: 20:fb:09:76:94:16:7c:db:7c:99:5d:7d:40:51:58:ab: 6b:9c:92:74:15:98:69:f5:8a:30:f0:18:93:f2:3e:ad: af:d0:8c:70:2e:3e:6d:67:2f:3e:ab:10:59:12:31:59: 35:fb:f8:84:91:bf:67:61:53:98:29:92:5c:72:ee:39: be:50:c6:06:09:5a:89:dc:7b:37:fd:a3:bf:82:cc:91: 30:34:3c:df:e0:f4:b3:4b:51:0a:3c:30:f8:94:25:52: 2f:ae:d2:c4:64:92:e3:3e:07:31:7e:1f:b6:41:ad:ad: af:0a:99:a9:0d:0f:c9:d0:44:47:85:7f:75:8e:27:23: fa:2b:cf:88:96:ef:71:67:dc:e2:b7:72:6e:5a:22:88: 9f:14:63:7f:b0:cc:89:2a:f5:48:56:ea:2f:b6:ae:f2: 07:07:83:8a:b9:99:c0:55:4e:66:f5:89:c1:22:84:29: 63:6d:18:47:1f:cd:98:9d:e3:d8:53:1d:5c:0a:2b:09: 19:e3:bb:4e:ed:d6:6e:3e:d2:4a:47:af:09:90:64:ac: 10:fc:6a:86:bf:c0:fb:eb:55:73:8e:67:2f:2a:40:38: 9d:da:9c:2d:d7:4c:8f:6d:5e:de:88:68:36:16:e5:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:35:2c:79:47:37:47:7e:26:51:b2:75:eb:78:89:e1: f1:be:a9:e0:f4:85:9a:7e:08:28:d4:8a:35:be:99:d4: 15:90:bf:b2:90:12:c4:7c:c6:e3:3b:d8:01:e3:04:87: 96:7d:73:68:29:30:08:2f:ae:30:4a:5b:08:4a:38:d4: e5:10:cf:82:2b:e3:c2:c7:e9:42:78:fe:7e:91:cb:6d: fd:5d:ae:c1:8b:e6:b0:92:f8:15:fd:b7:4e:22:52:19: bc:63:6a:ff:fb:14:91:fa:6b:ff:02:e1:4e:70:09:f1: ab:66:fe:ca:b2:5b:34:ed:f9:9c:bb:96:fe:96:8f:b6: 5e:e5:24:3e:54:64:21:0f:02:05:fc:6a:0c:32:e7:dc: bf:08:a1:f9:b1:45:94:4b:34:02:aa:0a:7c:28:d5:a1: 33:51:fd:50:06:88:22:ea:c0:77:cf:e7:9e:50:33:b2: 41:e8:e1:7e:43:24:bd:10:7a:9e:ff:02:a8:ae:b2:52: 36:b6:32:56:d7:48:93:7e:1b:d4:35:1e:38:fe:89:0a: f5:22:a4:c4:fa:3d:85:41:99:f7:a4:80:79:90:c0:ff: 49:57:1c:d2:45:6a:12:52:41:54:e9:08:39:e3:93:e3: 75:bb:eb:f1:85:ed:5c:86:07:19:15:9c:23:f9:9c:3e Fingerprint (SHA-256): 70:4F:53:36:83:E2:D9:2D:33:01:76:60:EA:D9:71:6E:EF:E6:5B:AA:5A:01:44:65:1B:97:37:BD:12:F7:34:DA Fingerprint (SHA1): 6C:99:79:F6:6F:36:96:C2:5E:C9:74:FC:EC:CA:9B:85:1D:4C:3B:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191149 (0x433ed4ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:12:28 2025 Not After : Thu Nov 28 11:12:28 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:f2:8a:82:95:89:a5:c8:db:d4:42:ca:57:19:a7:d6: f4:22:4b:c8:53:36:94:47:88:37:f1:e4:d1:9c:dd:99: d9:e5:c1:bc:56:61:f2:30:ec:cd:04:26:29:60:49:7b: e6:40:a8:e5:78:b1:d5:cf:78:0d:70:e1:9d:03:b5:4a: d5:a1:28:12:a6:50:5d:45:ca:23:09:8a:28:14:40:8d: fa:0c:ce:0e:7e:c5:5d:5e:55:aa:ee:6d:aa:38:52:93: a8:71:8e:2c:12:a9:31:2d:d3:f3:6a:65:80:1e:76:c3: 5f:cf:89:91:a7:a6:26:6c:d7:1c:48:1b:79:f1:36:c6: 6c:eb:30:3d:90:a6:fa:6b:af:fa:07:94:d5:8f:58:af: ef:4b:72:53:5c:df:f3:ef:20:52:f5:3a:cb:4d:4a:22: 1c:68:c0:e7:50:d2:99:fc:27:5a:e1:a6:c8:8b:e0:4e: 9f:27:fc:b3:c3:20:4f:8f:be:dc:f4:4b:f2:91:67:31: 20:af:17:0a:32:79:1b:e0:b5:9e:23:c2:43:e9:0c:0a: 13:6e:55:d3:0d:32:8f:e5:8f:71:58:f4:f8:a9:5a:37: f5:a3:ed:d0:1b:6c:88:ab:95:81:53:f9:56:4b:17:94: 0d:ec:3f:ca:be:25:56:c3:b2:d6:27:96:92:8a:a9:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:be:b3:6e:0d:13:21:14:84:7e:53:88:65:e0:8a:53: 3a:c0:8a:95:0d:fb:da:a4:8a:e9:8f:61:5f:e9:7c:9a: 52:c0:b8:66:26:1f:09:fa:33:51:ab:11:e1:08:e1:e8: c1:8d:69:85:19:78:a3:ef:53:d5:86:76:72:41:5c:c8: b9:fe:b3:24:ae:b2:65:5b:7a:69:64:e5:db:86:ea:d6: 43:aa:fe:cd:f0:76:6e:8c:f1:96:29:65:55:04:b6:ae: c5:8a:ff:59:43:a1:ed:6d:34:72:32:6f:44:ea:87:de: 35:98:20:b5:17:b8:19:9f:31:f7:6c:a8:61:5d:9c:b6: 6e:a7:d3:c0:e9:45:46:e0:a9:63:d8:1a:14:a2:cc:95: 35:4e:7c:ef:0a:45:20:c4:c3:26:35:18:16:ca:f5:2c: bf:a9:5d:f9:12:80:13:4f:94:26:f8:d2:df:61:64:27: 57:3c:06:ee:c2:86:bb:34:63:6a:7f:71:f8:c1:4c:c8: 4c:60:a5:61:12:5f:95:63:0b:de:f2:72:3a:2c:c8:00: 62:3e:2e:7d:ba:ff:cc:b9:0e:e9:2d:82:86:7c:2a:8c: ae:37:8b:99:dc:ea:9e:65:7a:f5:ab:c8:20:d5:7c:ca: e6:86:12:20:30:15:c8:dd:17:22:71:0d:5b:42:fe:6b Fingerprint (SHA-256): 61:14:D3:B5:D6:0E:1E:5F:EA:57:C3:2E:9D:A0:86:FC:BB:FA:73:9E:4F:F5:BD:BA:B8:EC:49:DF:51:CC:B8:9A Fingerprint (SHA1): 84:D0:94:96:D4:BE:0D:65:65:0B:71:F4:0E:12:C1:73:9F:57:0F:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191152 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191153 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191154 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128191045.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191155 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191152 (0x433ed4b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:31 2025 Not After : Thu Nov 28 11:12:31 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:43:ff:b3:b6:eb:cc:cd:15:27:72:02:a7:16:2c:a1: f1:88:dd:65:03:d3:af:d6:e0:eb:2c:01:89:58:b1:82: 38:da:bb:97:ed:6f:f0:e0:9c:f8:3f:44:01:d5:18:a1: d9:9c:5d:24:e0:bb:85:7d:40:36:11:a4:8f:e1:ae:cc: 24:7b:d2:b2:2e:79:ff:49:ac:65:e9:17:d5:56:e8:b8: 7a:9b:4e:8e:eb:f7:c2:78:e6:d0:3f:f1:c8:33:84:10: e7:16:1c:fb:9c:aa:3e:4d:96:80:b3:d0:91:5f:b7:98: e8:80:f2:17:c5:0c:7c:50:c9:b5:15:dc:66:7c:66:78: ef:42:0d:ea:08:ca:a5:20:32:73:ea:ef:e5:b1:f9:7d: ce:89:a0:94:bd:03:bc:9a:9a:41:ac:a0:7d:f0:93:34: 27:6a:72:8e:fc:de:70:a2:2f:0f:89:fd:89:74:c9:5a: 44:49:57:6f:0a:66:e4:64:3d:45:a1:63:37:4b:12:a0: 0a:63:83:8c:4c:80:37:df:35:27:f7:c2:4e:e5:0b:40: 7b:28:d8:21:ae:16:ec:c7:fc:f7:08:ed:3d:b0:fb:04: 13:9d:99:41:a9:b4:d9:58:5d:bc:36:5b:75:0b:f4:28: 4c:66:b3:10:ad:de:fe:07:1b:d0:2d:a2:05:61:f4:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:dd:62:d4:47:53:6b:fb:8e:27:74:0b:59:64:b6:af: 6c:84:31:a4:d8:52:b0:0f:fe:ff:8a:e3:b4:f8:e4:5c: c3:af:44:ee:a4:1d:05:a0:58:dc:b8:f3:b9:d2:56:ec: 49:a9:ed:c5:97:23:5a:4d:02:d1:0b:c0:f9:e9:1b:b2: 5f:93:8b:94:d6:3d:03:5b:21:98:84:9d:62:a0:17:b1: fc:cb:7f:9c:23:5b:08:39:c3:73:e2:3f:51:f0:ca:ce: 56:30:fc:a3:a4:73:58:06:39:8c:1a:71:91:1c:79:1e: 52:68:fe:b6:08:5e:31:94:03:b9:23:06:2f:8e:b6:be: cd:e7:55:7f:17:e1:60:f2:b5:02:e5:75:02:3f:7d:6d: 39:85:2a:65:2e:4d:aa:52:8e:35:cc:d4:d2:6e:fb:e0: 0b:05:23:27:2b:e0:b5:ab:ae:9a:70:0e:b3:67:73:91: 99:34:8d:f3:52:90:ad:a1:b5:6d:07:7c:04:ed:ce:f2: 67:4b:98:85:ed:c0:ec:c7:2f:69:ed:ed:e9:ac:92:b1: ca:92:ef:e1:ba:66:2d:54:d2:c4:8c:dc:39:23:5e:67: 90:c0:75:40:21:3b:ba:0c:41:23:09:be:8d:9d:f7:89: 5d:e4:8e:27:4a:c8:f3:a9:67:4d:22:ec:22:f6:ca:d2 Fingerprint (SHA-256): 77:73:AE:4C:1E:2F:E3:28:B7:27:B1:03:26:85:E6:57:39:30:52:24:83:C6:89:A7:AA:DF:2A:46:37:60:AD:AD Fingerprint (SHA1): B6:DF:08:3C:0F:0F:5C:17:BF:92:F1:E4:C7:37:59:30:AE:E1:83:FB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191156 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191157 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191158 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191159 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191160 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191046.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191161 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191156 (0x433ed4b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:12:34 2025 Not After : Thu Nov 28 11:12:34 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:5a:13:7e:e8:20:28:ce:f5:3a:b4:1d:95:e1:27:36: e1:3c:22:0b:89:c0:e1:d2:3f:5a:52:9e:ae:5a:ae:0c: 69:37:21:d8:0f:bf:ed:e7:e1:de:db:cb:d4:1c:77:0a: 36:7f:81:6a:2c:b3:ae:cf:6b:13:de:2b:fa:4f:77:6e: 00:5f:37:8d:63:95:0a:19:5c:63:c6:20:98:5e:0e:09: 77:69:3f:a8:28:be:63:fa:64:e9:18:1c:81:23:fa:a5: 78:67:3f:9e:6f:67:81:a5:8a:26:be:dc:00:e2:8a:8f: ff:95:8c:7b:c5:30:0f:91:98:62:7e:e8:a4:dc:c5:d5: af:68:25:78:74:5b:29:0a:3f:6a:02:9d:a7:e2:e9:9c: 37:75:93:1a:a8:dc:a2:48:d4:65:87:f4:42:c1:ef:9d: f4:a3:38:b6:ed:a0:3d:98:e8:f9:3f:fa:a6:de:32:5e: 2c:9b:a6:8a:06:c3:c4:c7:a6:6c:70:8a:47:db:18:0d: a8:29:12:2c:fa:67:a6:6d:90:f5:67:84:ef:4b:10:d2: 15:93:55:f7:1b:af:d0:2b:0b:fc:b2:0e:3b:37:e9:41: 63:b0:d7:b5:5b:47:2f:c7:a4:dd:a6:bc:7e:22:54:c5: ec:a3:1b:bd:a0:a0:98:03:db:86:f8:e1:49:b8:ae:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:67:c9:fd:f8:24:f6:15:1d:db:cf:2c:b8:84:27:9f: b9:78:b9:25:b2:db:e4:76:ce:94:d6:d7:3d:a4:76:ae: 34:6d:0c:74:7d:7e:b3:9c:74:36:62:ee:f0:7f:f2:40: 2d:77:84:e2:36:a3:90:79:f3:d7:d4:fd:f7:b7:fa:30: 36:15:5e:08:d2:a8:60:59:1b:0d:0b:48:69:f5:7c:f3: f7:b8:29:80:a4:4f:8d:f5:1b:db:ff:cf:06:02:fa:51: 8e:10:94:71:a9:19:01:d0:15:1c:77:5d:1d:cd:e1:90: 5a:26:3a:5f:2e:81:ad:af:04:60:07:75:a7:bd:38:e3: 93:fb:9d:fe:f6:09:b4:cd:3e:3f:62:7b:d0:e6:9a:99: b6:a8:ae:20:fd:3f:89:61:4c:43:46:e0:55:90:67:74: 86:d3:b9:97:80:74:7f:45:a0:a7:11:b5:75:07:6c:c8: ff:50:35:ba:3a:f6:36:bf:fd:be:ef:02:e6:ff:ab:07: 4d:2d:26:09:ad:e2:01:07:b4:bc:c3:17:0f:14:bc:26: 1f:5e:c4:ae:2e:41:48:d5:f8:08:3b:a3:f0:bd:25:61: eb:15:a5:a4:61:1c:5e:d4:60:4d:33:96:c7:65:b3:c6: 3e:5c:26:61:f6:81:85:67:b4:95:d1:30:05:6f:6d:56 Fingerprint (SHA-256): A1:78:5C:05:72:0A:13:AA:EE:D3:33:6E:67:F4:F1:8F:6B:99:CA:C6:7E:C4:40:6B:53:A6:52:6C:07:A8:32:92 Fingerprint (SHA1): 5B:82:74:88:CF:D9:56:20:02:1A:E0:94:51:39:31:95:2A:8B:36:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191157 (0x433ed4b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:34 2025 Not After : Thu Nov 28 11:12:34 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:8b:eb:9c:e5:d3:a0:9f:1d:d2:4c:39:52:0c:96:fd: 80:52:56:d7:95:a7:b6:79:e9:87:8c:78:63:49:1b:8e: 39:14:ab:88:43:d6:89:a9:6d:97:a5:e7:6d:62:0f:e9: ed:f2:4a:66:69:ac:6d:d1:4e:4c:ad:ed:2f:06:f5:aa: b4:ed:37:0f:6f:c9:f5:16:c8:9a:38:95:c1:78:49:5a: bd:f6:72:cd:79:11:d8:ab:8c:06:44:ae:9e:4e:cb:39: 90:82:c9:2d:e4:02:c1:e4:92:d8:69:a4:87:c9:3d:d7: 2f:89:ca:50:dd:8b:18:86:fa:b5:bf:11:62:a3:7f:67: 07:a3:4c:4c:52:33:7e:61:d3:6d:f4:35:61:b2:0e:45: 4e:cc:57:17:88:19:82:44:9d:d1:d7:58:09:80:aa:5d: 0a:55:ac:6e:17:02:2a:4a:8d:10:8a:69:ac:99:e7:5f: e2:2a:96:98:ea:25:df:92:c9:e6:13:1c:d2:2d:61:68: f9:6f:9b:96:12:e7:02:fc:46:65:b8:68:68:a6:a4:d8: 45:3f:ac:61:19:64:c4:14:fa:b1:07:3e:f7:67:d4:64: 8e:8d:ae:c3:ba:bf:7b:56:71:e4:da:86:67:ee:ec:22: 3a:cb:a1:0d:09:ed:90:1d:cb:e3:ed:fe:b2:ad:69:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:9a:c3:e9:38:28:cd:eb:6e:0b:19:81:b0:b9:65:24: 20:96:73:e9:54:c4:a6:31:8f:de:dd:de:e8:ed:61:b1: 90:b2:b0:e5:02:90:4a:ae:21:75:1b:c7:c3:c4:77:72: 0e:a3:ae:d3:ba:96:91:7e:f3:5c:c9:70:dd:c1:07:59: 8e:8b:82:4b:5f:c5:71:cd:b2:97:be:66:e9:63:75:59: 38:36:34:b9:0a:66:d0:a2:6c:2a:3a:7b:00:0c:fa:1a: 2c:b1:69:80:3a:2d:cc:5c:a3:65:49:6a:bc:05:29:d9: 92:84:00:99:3c:a1:76:34:24:ef:5a:eb:bd:5f:02:d1: a6:08:92:cd:df:5b:b6:05:23:80:82:46:a5:ab:aa:cb: 77:80:32:b2:b4:3f:1d:45:c2:df:7e:0c:ad:9b:8c:af: 33:37:61:20:0f:78:ab:36:4b:ea:19:5f:10:84:02:f1: dc:d5:07:99:15:09:48:3e:9c:73:fb:d6:09:46:2d:1b: d7:c3:df:67:ec:44:e8:4a:9c:8b:b0:2f:21:de:f3:da: 8c:6d:a9:d2:7e:ab:fa:31:1d:44:63:77:ad:7b:10:51: b6:bb:ea:76:d2:2d:df:ff:c0:71:fd:d2:be:9a:fe:e2: 23:49:ef:e2:b6:ea:93:81:8a:38:76:d2:7b:7f:f2:4a Fingerprint (SHA-256): CC:47:C1:59:A2:CE:A2:9E:6C:9D:7F:DA:02:DF:06:80:7D:D3:25:F7:36:E3:A6:FF:F2:21:04:1B:30:16:2C:EA Fingerprint (SHA1): 21:5D:C0:38:C2:77:D1:AC:2B:72:6D:94:45:7D:BE:6F:DE:B2:EF:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191157 (0x433ed4b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:34 2025 Not After : Thu Nov 28 11:12:34 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:8b:eb:9c:e5:d3:a0:9f:1d:d2:4c:39:52:0c:96:fd: 80:52:56:d7:95:a7:b6:79:e9:87:8c:78:63:49:1b:8e: 39:14:ab:88:43:d6:89:a9:6d:97:a5:e7:6d:62:0f:e9: ed:f2:4a:66:69:ac:6d:d1:4e:4c:ad:ed:2f:06:f5:aa: b4:ed:37:0f:6f:c9:f5:16:c8:9a:38:95:c1:78:49:5a: bd:f6:72:cd:79:11:d8:ab:8c:06:44:ae:9e:4e:cb:39: 90:82:c9:2d:e4:02:c1:e4:92:d8:69:a4:87:c9:3d:d7: 2f:89:ca:50:dd:8b:18:86:fa:b5:bf:11:62:a3:7f:67: 07:a3:4c:4c:52:33:7e:61:d3:6d:f4:35:61:b2:0e:45: 4e:cc:57:17:88:19:82:44:9d:d1:d7:58:09:80:aa:5d: 0a:55:ac:6e:17:02:2a:4a:8d:10:8a:69:ac:99:e7:5f: e2:2a:96:98:ea:25:df:92:c9:e6:13:1c:d2:2d:61:68: f9:6f:9b:96:12:e7:02:fc:46:65:b8:68:68:a6:a4:d8: 45:3f:ac:61:19:64:c4:14:fa:b1:07:3e:f7:67:d4:64: 8e:8d:ae:c3:ba:bf:7b:56:71:e4:da:86:67:ee:ec:22: 3a:cb:a1:0d:09:ed:90:1d:cb:e3:ed:fe:b2:ad:69:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:9a:c3:e9:38:28:cd:eb:6e:0b:19:81:b0:b9:65:24: 20:96:73:e9:54:c4:a6:31:8f:de:dd:de:e8:ed:61:b1: 90:b2:b0:e5:02:90:4a:ae:21:75:1b:c7:c3:c4:77:72: 0e:a3:ae:d3:ba:96:91:7e:f3:5c:c9:70:dd:c1:07:59: 8e:8b:82:4b:5f:c5:71:cd:b2:97:be:66:e9:63:75:59: 38:36:34:b9:0a:66:d0:a2:6c:2a:3a:7b:00:0c:fa:1a: 2c:b1:69:80:3a:2d:cc:5c:a3:65:49:6a:bc:05:29:d9: 92:84:00:99:3c:a1:76:34:24:ef:5a:eb:bd:5f:02:d1: a6:08:92:cd:df:5b:b6:05:23:80:82:46:a5:ab:aa:cb: 77:80:32:b2:b4:3f:1d:45:c2:df:7e:0c:ad:9b:8c:af: 33:37:61:20:0f:78:ab:36:4b:ea:19:5f:10:84:02:f1: dc:d5:07:99:15:09:48:3e:9c:73:fb:d6:09:46:2d:1b: d7:c3:df:67:ec:44:e8:4a:9c:8b:b0:2f:21:de:f3:da: 8c:6d:a9:d2:7e:ab:fa:31:1d:44:63:77:ad:7b:10:51: b6:bb:ea:76:d2:2d:df:ff:c0:71:fd:d2:be:9a:fe:e2: 23:49:ef:e2:b6:ea:93:81:8a:38:76:d2:7b:7f:f2:4a Fingerprint (SHA-256): CC:47:C1:59:A2:CE:A2:9E:6C:9D:7F:DA:02:DF:06:80:7D:D3:25:F7:36:E3:A6:FF:F2:21:04:1B:30:16:2C:EA Fingerprint (SHA1): 21:5D:C0:38:C2:77:D1:AC:2B:72:6D:94:45:7D:BE:6F:DE:B2:EF:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191162 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191163 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191164 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191165 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191166 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191047.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191167 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191168 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128191048.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191169 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191162 (0x433ed4ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:12:37 2025 Not After : Thu Nov 28 11:12:37 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:14:c3:16:9c:94:12:4f:e6:be:30:20:ef:e6:b8:8e: f4:29:9c:d1:df:18:dd:50:02:a3:e5:6b:80:01:a4:97: ce:a5:cf:11:04:c3:39:7d:cb:c0:06:33:d5:aa:34:28: 87:53:cc:68:7d:92:c8:b6:d0:ca:ae:19:63:1f:da:f2: ca:ca:b2:5d:f3:67:68:38:d4:90:0c:20:04:b2:3b:29: 2e:a8:97:53:52:de:ce:92:14:89:d4:dc:35:ac:0e:1f: 62:32:72:fe:fb:90:4f:7f:0a:75:16:70:4f:7a:2f:83: f3:f9:95:86:70:87:97:c0:45:b1:22:24:d2:9a:eb:59: 87:f6:f0:78:e5:db:ab:75:4d:f4:c7:10:21:22:0a:13: e1:1f:4b:8b:a1:08:a4:19:03:c5:2e:40:2c:fb:dd:38: ce:8b:24:42:c7:e6:f8:a6:6e:96:78:ae:1a:97:c0:83: 88:89:f4:db:27:97:8a:63:18:47:76:aa:d2:c8:ed:d4: e5:65:de:01:65:eb:69:79:a5:1d:4b:1d:47:9b:c0:f5: 86:6f:c2:4d:0d:90:af:61:7c:5c:40:f7:77:e1:29:f7: 22:ea:93:6b:19:0b:0c:b7:14:0c:a4:1d:f3:d8:21:a9: 1f:32:15:b5:51:94:2d:77:a5:d9:8d:2a:8e:1f:e1:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:a1:25:66:8a:0c:a5:dc:84:69:84:92:84:f9:9f:61: 23:21:1a:a5:72:97:0c:00:8f:45:4c:c0:72:eb:f5:a9: 7a:01:dd:1a:27:a4:b9:7c:fa:24:ef:bf:39:33:f5:59: 9f:d1:5f:83:96:c7:c6:99:85:cf:77:53:40:02:2c:09: 10:b2:4e:29:56:51:31:22:de:08:28:8b:0e:16:b1:c7: bb:c2:80:42:cd:ec:e7:ec:d9:08:8a:b6:d4:20:03:5b: 2d:df:a6:aa:ac:70:40:97:d8:ba:17:c8:97:82:06:24: 6d:b4:ef:fd:1a:84:ba:80:28:f4:57:98:a7:67:ee:1e: 3c:ea:bc:44:47:5f:c5:4c:56:9f:fe:49:ad:82:45:23: 73:ed:0e:ac:c0:c9:b4:fb:09:17:4e:f4:77:ec:45:32: 51:3c:ea:1f:f7:3f:f0:2f:3c:d1:bc:93:eb:38:61:24: 71:05:bb:f9:37:6f:a8:b2:4f:34:bc:08:54:a0:5e:c7: c4:ef:9f:bb:13:d7:4d:64:8b:d8:01:f6:e0:3a:cd:0a: 87:e9:42:a2:16:07:10:7b:26:ea:5f:03:b1:a9:ba:ed: ee:d1:2e:6c:ab:69:0a:e5:12:a7:ca:ab:81:ef:d5:8f: 6f:52:1c:94:a8:f0:cc:f4:6e:be:84:44:62:30:de:5a Fingerprint (SHA-256): 67:CE:3E:F8:B9:60:9E:96:DD:36:04:1A:B2:B8:F8:D7:BB:90:DD:DD:A0:B6:D7:0A:D7:FE:79:11:7E:CE:5A:57 Fingerprint (SHA1): 30:82:BF:50:64:C3:92:34:63:6F:15:E6:0E:A9:65:E9:8B:9D:2F:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191163 (0x433ed4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:38 2025 Not After : Thu Nov 28 11:12:38 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:7d:9b:5a:b3:eb:45:28:90:14:eb:d0:54:fe:3d:f7: e1:10:80:7a:83:98:74:d9:43:13:b0:f4:75:f3:c6:bb: 90:8e:55:cd:75:6d:4e:5d:28:73:f7:3c:49:28:03:6e: 74:9a:5e:45:02:f4:1a:41:59:27:87:96:78:ac:66:b9: cd:4d:66:92:31:c7:7f:75:76:8d:ad:a2:04:9e:9c:87: 29:12:dc:78:12:1c:5c:d9:e5:ab:09:41:35:ab:57:14: 0c:e5:a7:16:eb:6b:e3:97:fc:6a:70:2d:92:04:5d:93: 5b:3a:ca:4a:68:2e:7c:46:e3:c1:a3:41:eb:29:6d:f7: 6a:9d:83:26:46:85:46:19:e3:8e:2e:37:b1:2e:8e:77: d4:9c:64:29:9b:cf:44:ed:29:ab:da:d4:4c:cb:6b:18: ee:9b:96:55:63:7e:c0:68:57:e1:02:ff:54:e5:b5:80: 82:4c:58:dd:55:34:97:20:21:0b:97:cc:34:1d:ca:49: d5:88:11:f7:e5:c8:f4:a0:6d:d6:19:e5:5d:10:40:4a: 20:5c:1d:80:0d:7f:b3:e8:58:73:aa:a4:0e:42:21:0f: 37:da:26:15:e1:3a:18:07:7d:ea:55:72:56:75:ea:4d: e6:5c:f0:4d:cc:c2:7d:b6:70:07:14:40:90:40:31:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:89:28:3a:83:e2:f1:5d:42:e5:96:27:75:35:dd:7b: d1:c7:fb:ba:b1:b9:6f:74:bf:80:02:fc:ec:a5:2d:22: ae:e1:12:e7:ec:06:25:0d:6b:54:59:4c:c3:2f:0d:09: e6:de:0c:30:d0:56:62:ba:5f:ef:82:a9:63:e6:49:69: e6:aa:32:de:27:30:f9:ba:17:ff:78:75:9d:ab:b0:5f: 1f:55:96:05:f7:1c:49:2d:44:77:50:c9:7a:cc:72:f8: cd:ab:86:a6:a3:bc:b9:2b:42:55:fc:f7:9f:94:ed:51: 31:2b:f4:34:23:e6:3c:f9:2f:bb:6a:2c:f0:23:f3:9d: 69:a1:3e:89:20:e8:4a:df:76:f1:8a:e2:95:37:df:7f: 68:f7:25:74:f2:12:72:c6:b7:b1:5e:c7:85:24:b0:b2: f0:4c:be:ab:80:99:66:72:cf:a6:5e:c4:1f:b4:d1:74: 23:bd:5d:e8:d5:76:15:7f:49:6d:5c:23:48:c6:1b:67: 9d:b5:12:44:38:fa:c4:7c:8f:85:2f:07:b6:7e:1b:97: 12:96:2f:d6:fa:fd:df:83:48:6b:f9:8a:80:41:8a:f3: 25:31:41:d9:0a:25:6f:84:f8:b4:8f:72:70:c9:fb:76: 86:b8:99:a8:0c:bf:b6:76:6c:f0:49:fa:eb:69:d1:f1 Fingerprint (SHA-256): CC:8F:53:BE:D7:5E:D5:A2:D3:2E:57:42:3D:34:4B:13:BD:49:85:3F:FF:4E:9E:66:8C:15:B9:2F:53:75:B7:90 Fingerprint (SHA1): 22:1F:90:4F:EC:AE:AE:F1:78:5C:71:C9:04:27:9D:C5:4F:7C:F5:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191163 (0x433ed4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:38 2025 Not After : Thu Nov 28 11:12:38 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:7d:9b:5a:b3:eb:45:28:90:14:eb:d0:54:fe:3d:f7: e1:10:80:7a:83:98:74:d9:43:13:b0:f4:75:f3:c6:bb: 90:8e:55:cd:75:6d:4e:5d:28:73:f7:3c:49:28:03:6e: 74:9a:5e:45:02:f4:1a:41:59:27:87:96:78:ac:66:b9: cd:4d:66:92:31:c7:7f:75:76:8d:ad:a2:04:9e:9c:87: 29:12:dc:78:12:1c:5c:d9:e5:ab:09:41:35:ab:57:14: 0c:e5:a7:16:eb:6b:e3:97:fc:6a:70:2d:92:04:5d:93: 5b:3a:ca:4a:68:2e:7c:46:e3:c1:a3:41:eb:29:6d:f7: 6a:9d:83:26:46:85:46:19:e3:8e:2e:37:b1:2e:8e:77: d4:9c:64:29:9b:cf:44:ed:29:ab:da:d4:4c:cb:6b:18: ee:9b:96:55:63:7e:c0:68:57:e1:02:ff:54:e5:b5:80: 82:4c:58:dd:55:34:97:20:21:0b:97:cc:34:1d:ca:49: d5:88:11:f7:e5:c8:f4:a0:6d:d6:19:e5:5d:10:40:4a: 20:5c:1d:80:0d:7f:b3:e8:58:73:aa:a4:0e:42:21:0f: 37:da:26:15:e1:3a:18:07:7d:ea:55:72:56:75:ea:4d: e6:5c:f0:4d:cc:c2:7d:b6:70:07:14:40:90:40:31:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:89:28:3a:83:e2:f1:5d:42:e5:96:27:75:35:dd:7b: d1:c7:fb:ba:b1:b9:6f:74:bf:80:02:fc:ec:a5:2d:22: ae:e1:12:e7:ec:06:25:0d:6b:54:59:4c:c3:2f:0d:09: e6:de:0c:30:d0:56:62:ba:5f:ef:82:a9:63:e6:49:69: e6:aa:32:de:27:30:f9:ba:17:ff:78:75:9d:ab:b0:5f: 1f:55:96:05:f7:1c:49:2d:44:77:50:c9:7a:cc:72:f8: cd:ab:86:a6:a3:bc:b9:2b:42:55:fc:f7:9f:94:ed:51: 31:2b:f4:34:23:e6:3c:f9:2f:bb:6a:2c:f0:23:f3:9d: 69:a1:3e:89:20:e8:4a:df:76:f1:8a:e2:95:37:df:7f: 68:f7:25:74:f2:12:72:c6:b7:b1:5e:c7:85:24:b0:b2: f0:4c:be:ab:80:99:66:72:cf:a6:5e:c4:1f:b4:d1:74: 23:bd:5d:e8:d5:76:15:7f:49:6d:5c:23:48:c6:1b:67: 9d:b5:12:44:38:fa:c4:7c:8f:85:2f:07:b6:7e:1b:97: 12:96:2f:d6:fa:fd:df:83:48:6b:f9:8a:80:41:8a:f3: 25:31:41:d9:0a:25:6f:84:f8:b4:8f:72:70:c9:fb:76: 86:b8:99:a8:0c:bf:b6:76:6c:f0:49:fa:eb:69:d1:f1 Fingerprint (SHA-256): CC:8F:53:BE:D7:5E:D5:A2:D3:2E:57:42:3D:34:4B:13:BD:49:85:3F:FF:4E:9E:66:8C:15:B9:2F:53:75:B7:90 Fingerprint (SHA1): 22:1F:90:4F:EC:AE:AE:F1:78:5C:71:C9:04:27:9D:C5:4F:7C:F5:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191162 (0x433ed4ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:12:37 2025 Not After : Thu Nov 28 11:12:37 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:14:c3:16:9c:94:12:4f:e6:be:30:20:ef:e6:b8:8e: f4:29:9c:d1:df:18:dd:50:02:a3:e5:6b:80:01:a4:97: ce:a5:cf:11:04:c3:39:7d:cb:c0:06:33:d5:aa:34:28: 87:53:cc:68:7d:92:c8:b6:d0:ca:ae:19:63:1f:da:f2: ca:ca:b2:5d:f3:67:68:38:d4:90:0c:20:04:b2:3b:29: 2e:a8:97:53:52:de:ce:92:14:89:d4:dc:35:ac:0e:1f: 62:32:72:fe:fb:90:4f:7f:0a:75:16:70:4f:7a:2f:83: f3:f9:95:86:70:87:97:c0:45:b1:22:24:d2:9a:eb:59: 87:f6:f0:78:e5:db:ab:75:4d:f4:c7:10:21:22:0a:13: e1:1f:4b:8b:a1:08:a4:19:03:c5:2e:40:2c:fb:dd:38: ce:8b:24:42:c7:e6:f8:a6:6e:96:78:ae:1a:97:c0:83: 88:89:f4:db:27:97:8a:63:18:47:76:aa:d2:c8:ed:d4: e5:65:de:01:65:eb:69:79:a5:1d:4b:1d:47:9b:c0:f5: 86:6f:c2:4d:0d:90:af:61:7c:5c:40:f7:77:e1:29:f7: 22:ea:93:6b:19:0b:0c:b7:14:0c:a4:1d:f3:d8:21:a9: 1f:32:15:b5:51:94:2d:77:a5:d9:8d:2a:8e:1f:e1:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:a1:25:66:8a:0c:a5:dc:84:69:84:92:84:f9:9f:61: 23:21:1a:a5:72:97:0c:00:8f:45:4c:c0:72:eb:f5:a9: 7a:01:dd:1a:27:a4:b9:7c:fa:24:ef:bf:39:33:f5:59: 9f:d1:5f:83:96:c7:c6:99:85:cf:77:53:40:02:2c:09: 10:b2:4e:29:56:51:31:22:de:08:28:8b:0e:16:b1:c7: bb:c2:80:42:cd:ec:e7:ec:d9:08:8a:b6:d4:20:03:5b: 2d:df:a6:aa:ac:70:40:97:d8:ba:17:c8:97:82:06:24: 6d:b4:ef:fd:1a:84:ba:80:28:f4:57:98:a7:67:ee:1e: 3c:ea:bc:44:47:5f:c5:4c:56:9f:fe:49:ad:82:45:23: 73:ed:0e:ac:c0:c9:b4:fb:09:17:4e:f4:77:ec:45:32: 51:3c:ea:1f:f7:3f:f0:2f:3c:d1:bc:93:eb:38:61:24: 71:05:bb:f9:37:6f:a8:b2:4f:34:bc:08:54:a0:5e:c7: c4:ef:9f:bb:13:d7:4d:64:8b:d8:01:f6:e0:3a:cd:0a: 87:e9:42:a2:16:07:10:7b:26:ea:5f:03:b1:a9:ba:ed: ee:d1:2e:6c:ab:69:0a:e5:12:a7:ca:ab:81:ef:d5:8f: 6f:52:1c:94:a8:f0:cc:f4:6e:be:84:44:62:30:de:5a Fingerprint (SHA-256): 67:CE:3E:F8:B9:60:9E:96:DD:36:04:1A:B2:B8:F8:D7:BB:90:DD:DD:A0:B6:D7:0A:D7:FE:79:11:7E:CE:5A:57 Fingerprint (SHA1): 30:82:BF:50:64:C3:92:34:63:6F:15:E6:0E:A9:65:E9:8B:9D:2F:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191163 (0x433ed4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:38 2025 Not After : Thu Nov 28 11:12:38 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:7d:9b:5a:b3:eb:45:28:90:14:eb:d0:54:fe:3d:f7: e1:10:80:7a:83:98:74:d9:43:13:b0:f4:75:f3:c6:bb: 90:8e:55:cd:75:6d:4e:5d:28:73:f7:3c:49:28:03:6e: 74:9a:5e:45:02:f4:1a:41:59:27:87:96:78:ac:66:b9: cd:4d:66:92:31:c7:7f:75:76:8d:ad:a2:04:9e:9c:87: 29:12:dc:78:12:1c:5c:d9:e5:ab:09:41:35:ab:57:14: 0c:e5:a7:16:eb:6b:e3:97:fc:6a:70:2d:92:04:5d:93: 5b:3a:ca:4a:68:2e:7c:46:e3:c1:a3:41:eb:29:6d:f7: 6a:9d:83:26:46:85:46:19:e3:8e:2e:37:b1:2e:8e:77: d4:9c:64:29:9b:cf:44:ed:29:ab:da:d4:4c:cb:6b:18: ee:9b:96:55:63:7e:c0:68:57:e1:02:ff:54:e5:b5:80: 82:4c:58:dd:55:34:97:20:21:0b:97:cc:34:1d:ca:49: d5:88:11:f7:e5:c8:f4:a0:6d:d6:19:e5:5d:10:40:4a: 20:5c:1d:80:0d:7f:b3:e8:58:73:aa:a4:0e:42:21:0f: 37:da:26:15:e1:3a:18:07:7d:ea:55:72:56:75:ea:4d: e6:5c:f0:4d:cc:c2:7d:b6:70:07:14:40:90:40:31:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:89:28:3a:83:e2:f1:5d:42:e5:96:27:75:35:dd:7b: d1:c7:fb:ba:b1:b9:6f:74:bf:80:02:fc:ec:a5:2d:22: ae:e1:12:e7:ec:06:25:0d:6b:54:59:4c:c3:2f:0d:09: e6:de:0c:30:d0:56:62:ba:5f:ef:82:a9:63:e6:49:69: e6:aa:32:de:27:30:f9:ba:17:ff:78:75:9d:ab:b0:5f: 1f:55:96:05:f7:1c:49:2d:44:77:50:c9:7a:cc:72:f8: cd:ab:86:a6:a3:bc:b9:2b:42:55:fc:f7:9f:94:ed:51: 31:2b:f4:34:23:e6:3c:f9:2f:bb:6a:2c:f0:23:f3:9d: 69:a1:3e:89:20:e8:4a:df:76:f1:8a:e2:95:37:df:7f: 68:f7:25:74:f2:12:72:c6:b7:b1:5e:c7:85:24:b0:b2: f0:4c:be:ab:80:99:66:72:cf:a6:5e:c4:1f:b4:d1:74: 23:bd:5d:e8:d5:76:15:7f:49:6d:5c:23:48:c6:1b:67: 9d:b5:12:44:38:fa:c4:7c:8f:85:2f:07:b6:7e:1b:97: 12:96:2f:d6:fa:fd:df:83:48:6b:f9:8a:80:41:8a:f3: 25:31:41:d9:0a:25:6f:84:f8:b4:8f:72:70:c9:fb:76: 86:b8:99:a8:0c:bf:b6:76:6c:f0:49:fa:eb:69:d1:f1 Fingerprint (SHA-256): CC:8F:53:BE:D7:5E:D5:A2:D3:2E:57:42:3D:34:4B:13:BD:49:85:3F:FF:4E:9E:66:8C:15:B9:2F:53:75:B7:90 Fingerprint (SHA1): 22:1F:90:4F:EC:AE:AE:F1:78:5C:71:C9:04:27:9D:C5:4F:7C:F5:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191163 (0x433ed4bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:38 2025 Not After : Thu Nov 28 11:12:38 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:7d:9b:5a:b3:eb:45:28:90:14:eb:d0:54:fe:3d:f7: e1:10:80:7a:83:98:74:d9:43:13:b0:f4:75:f3:c6:bb: 90:8e:55:cd:75:6d:4e:5d:28:73:f7:3c:49:28:03:6e: 74:9a:5e:45:02:f4:1a:41:59:27:87:96:78:ac:66:b9: cd:4d:66:92:31:c7:7f:75:76:8d:ad:a2:04:9e:9c:87: 29:12:dc:78:12:1c:5c:d9:e5:ab:09:41:35:ab:57:14: 0c:e5:a7:16:eb:6b:e3:97:fc:6a:70:2d:92:04:5d:93: 5b:3a:ca:4a:68:2e:7c:46:e3:c1:a3:41:eb:29:6d:f7: 6a:9d:83:26:46:85:46:19:e3:8e:2e:37:b1:2e:8e:77: d4:9c:64:29:9b:cf:44:ed:29:ab:da:d4:4c:cb:6b:18: ee:9b:96:55:63:7e:c0:68:57:e1:02:ff:54:e5:b5:80: 82:4c:58:dd:55:34:97:20:21:0b:97:cc:34:1d:ca:49: d5:88:11:f7:e5:c8:f4:a0:6d:d6:19:e5:5d:10:40:4a: 20:5c:1d:80:0d:7f:b3:e8:58:73:aa:a4:0e:42:21:0f: 37:da:26:15:e1:3a:18:07:7d:ea:55:72:56:75:ea:4d: e6:5c:f0:4d:cc:c2:7d:b6:70:07:14:40:90:40:31:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:89:28:3a:83:e2:f1:5d:42:e5:96:27:75:35:dd:7b: d1:c7:fb:ba:b1:b9:6f:74:bf:80:02:fc:ec:a5:2d:22: ae:e1:12:e7:ec:06:25:0d:6b:54:59:4c:c3:2f:0d:09: e6:de:0c:30:d0:56:62:ba:5f:ef:82:a9:63:e6:49:69: e6:aa:32:de:27:30:f9:ba:17:ff:78:75:9d:ab:b0:5f: 1f:55:96:05:f7:1c:49:2d:44:77:50:c9:7a:cc:72:f8: cd:ab:86:a6:a3:bc:b9:2b:42:55:fc:f7:9f:94:ed:51: 31:2b:f4:34:23:e6:3c:f9:2f:bb:6a:2c:f0:23:f3:9d: 69:a1:3e:89:20:e8:4a:df:76:f1:8a:e2:95:37:df:7f: 68:f7:25:74:f2:12:72:c6:b7:b1:5e:c7:85:24:b0:b2: f0:4c:be:ab:80:99:66:72:cf:a6:5e:c4:1f:b4:d1:74: 23:bd:5d:e8:d5:76:15:7f:49:6d:5c:23:48:c6:1b:67: 9d:b5:12:44:38:fa:c4:7c:8f:85:2f:07:b6:7e:1b:97: 12:96:2f:d6:fa:fd:df:83:48:6b:f9:8a:80:41:8a:f3: 25:31:41:d9:0a:25:6f:84:f8:b4:8f:72:70:c9:fb:76: 86:b8:99:a8:0c:bf:b6:76:6c:f0:49:fa:eb:69:d1:f1 Fingerprint (SHA-256): CC:8F:53:BE:D7:5E:D5:A2:D3:2E:57:42:3D:34:4B:13:BD:49:85:3F:FF:4E:9E:66:8C:15:B9:2F:53:75:B7:90 Fingerprint (SHA1): 22:1F:90:4F:EC:AE:AE:F1:78:5C:71:C9:04:27:9D:C5:4F:7C:F5:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191170 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191171 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128191172 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128191173 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128191174 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128191175 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191176 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191177 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191178 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191179 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191170 (0x433ed4c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:12:43 2025 Not After : Thu Nov 28 11:12:43 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:9d:fa:b6:16:36:92:16:b8:83:9f:98:c0:8a:d3:90: b8:50:b5:37:6b:10:4c:dd:a0:bd:24:6c:71:d2:0f:03: 94:f7:70:61:dc:eb:47:ed:cc:c5:43:ec:12:51:64:0e: c3:61:4d:01:39:2c:55:48:46:03:3c:7f:21:31:63:8b: 1c:60:b3:6c:b9:7d:5a:42:ba:a9:a3:f6:3d:09:8b:ab: 5a:10:e8:91:81:b7:0d:a9:ea:e8:93:23:42:f8:67:5f: 38:40:54:68:7d:1e:68:2f:1e:c1:07:08:40:e1:ad:78: 17:d5:ce:5e:29:ad:3f:33:cb:14:23:37:27:1d:1a:6e: c3:ba:90:1c:0f:b3:4e:a9:08:68:55:4e:d5:90:3c:a6: fe:d7:37:9f:01:3a:ed:89:63:92:55:41:5b:19:1e:56: 0e:98:0a:65:ef:2d:35:1f:2d:57:8a:1f:52:26:6b:f4: 4b:38:fa:93:04:ba:37:a9:55:ea:cb:73:55:bf:eb:b1: 8d:fd:fc:74:6c:31:30:a6:55:cc:2c:af:e2:05:42:99: 7f:4b:c5:b1:ab:55:5e:c8:8f:08:36:24:e7:af:44:e4: 72:55:15:2b:fe:5e:e0:45:ea:e8:3e:70:40:70:30:56: 69:29:5b:a0:03:49:4a:4a:3b:b5:39:6d:d3:cd:f0:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:f2:b0:13:c0:cb:42:c5:0e:d7:13:4e:3e:c6:08:93: 82:27:45:2e:0d:e5:85:40:e2:2a:81:dd:95:7f:12:bf: 6c:48:f1:e2:fa:06:34:e1:cd:96:b6:ee:2f:e0:75:63: 70:7a:65:a1:45:ab:4f:b6:89:e8:26:02:e5:64:21:c0: e7:c0:fa:89:48:3c:ab:4a:91:a9:8b:7f:31:e6:22:19: 5f:22:77:13:b6:19:64:13:0d:65:3e:e2:40:68:ff:61: bd:7c:7d:7d:11:c5:7c:00:fe:f7:f5:e5:03:5a:ef:9c: df:bc:3f:48:b0:1d:ca:73:1b:5e:8d:75:f8:f3:36:f6: f1:a8:c4:31:6e:9e:a0:41:b6:c9:aa:ef:fa:df:0a:07: 13:bb:22:26:9b:4a:04:63:04:d9:ce:38:51:fd:0f:78: 6d:1b:ca:78:47:fd:84:22:7f:36:db:59:ab:9c:5e:1f: 06:e5:57:95:ad:3e:99:2a:9a:94:80:76:b8:08:d5:ea: a2:03:a5:90:47:6a:96:cf:29:8c:e3:90:66:20:d2:68: d3:64:a6:48:7b:bd:83:a2:67:aa:7f:c9:79:3d:da:66: d7:1d:01:7d:a5:54:30:52:ff:62:2a:3f:c7:f9:8b:16: 9f:90:42:31:76:23:d1:e1:86:d3:a7:44:4e:7a:0a:41 Fingerprint (SHA-256): 55:49:DB:AA:7E:90:EB:52:B2:7B:8E:F5:18:E9:93:C9:A0:9A:A3:8F:2F:56:7A:43:AC:51:86:47:33:34:1F:4F Fingerprint (SHA1): C4:C2:7B:17:B2:4E:E8:7B:42:CA:3E:C0:61:26:6B:39:4A:33:08:1D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191171 (0x433ed4c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:12:44 2025 Not After : Thu Nov 28 11:12:44 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:14:4a:a8:68:a1:2a:d6:c5:cf:d7:8a:ba:88:86:f2: 37:be:b0:45:9a:86:df:c6:d7:e8:f6:a6:75:56:7e:10: c5:3a:53:f0:f7:ac:8e:ba:e3:a8:02:d4:ab:5b:b5:35: 7f:a9:26:3a:ad:72:c7:c7:73:0d:c4:d9:29:c9:31:3f: 82:87:58:50:81:cb:a6:e5:67:0e:a7:51:96:26:29:81: fc:c4:3e:1e:dc:2a:11:b8:32:0e:6b:e0:ed:cd:af:2c: 09:6e:6e:19:80:77:2a:c2:78:31:22:16:06:8e:ac:5a: 6e:31:71:57:d1:e5:b6:3b:8d:51:fb:3e:96:8f:94:1c: a8:2f:cc:5b:56:ad:d2:e9:e7:bf:c3:bc:5a:bb:30:3e: ed:ea:95:30:1b:a2:e3:d7:ea:3f:6c:d8:3b:6d:1a:8d: 23:dc:33:ca:e0:5d:ee:91:71:9e:a4:00:04:60:aa:b1: 94:cc:f7:00:a9:eb:51:db:81:e8:06:da:06:08:fc:79: 85:2b:07:4b:b7:2c:e3:13:a4:5c:04:24:e6:10:ea:21: 2c:bb:84:d4:86:9c:80:97:c2:4a:71:62:40:f9:23:26: 58:96:68:da:94:f4:92:bd:e3:c4:dd:eb:ef:ea:49:38: a5:92:f5:95:5a:18:f8:8c:47:5f:4f:f8:08:fc:ca:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:dc:5a:f4:90:ab:5e:c7:b2:86:1e:1d:b0:e7:e3:72: e2:10:4a:14:ed:20:af:a7:70:b3:a6:60:1a:43:e2:90: 78:cd:94:91:24:fd:0a:5e:82:43:b1:e1:fc:5f:3d:a1: 41:a2:a3:81:99:bb:28:83:fa:a2:d3:ac:e3:b9:07:90: 75:e9:59:f5:af:01:15:5d:fa:04:bc:a1:17:c8:4b:55: 9f:4e:f4:54:ce:98:cd:81:7d:b6:5d:cc:d1:ef:cb:12: d0:c4:c7:b8:a5:76:46:9b:e1:92:14:69:25:15:ce:ca: 39:95:88:cf:96:65:84:39:17:a2:d8:87:8a:81:cc:45: 26:0e:42:7e:ea:f1:af:c1:f5:48:4c:0c:85:aa:75:2a: 16:14:63:4b:fb:87:46:e9:50:a2:7a:3a:78:66:6a:b3: 91:61:a1:04:68:e3:e9:24:27:a1:c2:07:01:ae:63:be: a9:ab:be:b2:f5:02:f2:8b:b2:22:b9:bc:ca:42:9a:c9: 28:2a:8d:98:03:a4:d5:ad:b9:e6:23:e2:7e:41:ca:66: 3f:81:d2:e6:e0:3e:fe:ba:2e:97:36:aa:5b:1b:a3:b7: 30:7d:92:cf:39:02:e3:22:39:08:a9:15:21:55:a1:38: ad:9a:b5:98:e2:4f:1f:76:b9:4f:4b:a2:12:68:ce:53 Fingerprint (SHA-256): 60:7E:40:BE:97:E0:F4:8D:40:F4:61:30:B6:F4:9F:30:C6:6E:07:89:82:72:25:E3:34:32:64:AC:19:BB:02:AF Fingerprint (SHA1): E3:74:8A:46:42:F1:22:3F:42:68:76:76:83:6B:10:81:0E:45:64:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191180 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191181 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191182 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128191183 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191184 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128191185 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128191186 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128191187 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128191188 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191180 (0x433ed4cc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:51 2025 Not After : Thu Nov 28 11:12:51 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 19:6b:da:a6:aa:87:af:5a:64:d3:eb:eb:3b:0b:ea:ac: f1:5e:53:69:07:74:c8:f1:ac:0f:e8:21:21:e1:08:8e: 79:72:f8:83:b2:60:19:af:5b:8a:27:58:6f:7b:e3:33: 2b:09:34:c3:42:89:86:4a:91:57:a3:55:82:5c:64:32: 00:75:ce:50:e3:42:68:13:1e:d0:17:23:8a:2c:46:f1: 25:2f:77:aa:9c:e7:d5:54:27:1b:11:78:74:b8:55:c0: f7:77:ef:20:3c:39:9e:30:d9:e5:31:76:65:20:b5:34: 1a:87:31:2a:cc:ba:ca:80:12:fa:78:12:72:bd:13:2e: ee:9e:57:85:a0:c4:d0:bc:dc:d8:fe:7a:a3:54:db:7b: 74:83:f9:12:24:d9:6c:5c:a9:a8:9d:f7:ee:5f:da:5e: 0a:75:12:95:31:41:d2:40:c5:84:b9:94:c8:54:34:b0: 2a:9a:34:47:bd:19:ac:39:c5:e6:b7:2f:e3:4c:a9:ea: 9e:dd:fb:98:8a:6c:1e:ea:1c:54:23:15:81:68:24:ba: b0:9e:12:a4:64:9c:20:bb:e9:ea:ec:a7:e5:d9:af:aa: 0c:98:9e:ac:64:c1:4a:70:96:f8:4f:c9:c9:11:c9:73: 71:c3:33:68:78:b1:16:f2:73:56:50:08:dc:0d:fb:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:4d:bc:c6:27:95:66:f5:88:1e:98:84:32: cf:f7:c0:78:36:44:a9:11:61:73:7e:70:a4:0d:ff:30: 02:1c:57:78:6a:fd:f0:0a:1c:2d:d0:30:cd:a3:5d:ad: ae:d0:30:fb:bb:97:d8:31:30:da:44:a9:81:f8 Fingerprint (SHA-256): F8:C6:3D:A2:19:BA:F9:04:B4:54:BA:79:D7:A5:46:4B:2F:47:C5:DB:32:66:7A:AB:26:2A:D9:F7:6F:30:4A:32 Fingerprint (SHA1): BE:E9:52:54:68:E1:0C:48:D0:40:18:59:9D:64:EC:18:A9:F6:14:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191180 (0x433ed4cc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:51 2025 Not After : Thu Nov 28 11:12:51 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 19:6b:da:a6:aa:87:af:5a:64:d3:eb:eb:3b:0b:ea:ac: f1:5e:53:69:07:74:c8:f1:ac:0f:e8:21:21:e1:08:8e: 79:72:f8:83:b2:60:19:af:5b:8a:27:58:6f:7b:e3:33: 2b:09:34:c3:42:89:86:4a:91:57:a3:55:82:5c:64:32: 00:75:ce:50:e3:42:68:13:1e:d0:17:23:8a:2c:46:f1: 25:2f:77:aa:9c:e7:d5:54:27:1b:11:78:74:b8:55:c0: f7:77:ef:20:3c:39:9e:30:d9:e5:31:76:65:20:b5:34: 1a:87:31:2a:cc:ba:ca:80:12:fa:78:12:72:bd:13:2e: ee:9e:57:85:a0:c4:d0:bc:dc:d8:fe:7a:a3:54:db:7b: 74:83:f9:12:24:d9:6c:5c:a9:a8:9d:f7:ee:5f:da:5e: 0a:75:12:95:31:41:d2:40:c5:84:b9:94:c8:54:34:b0: 2a:9a:34:47:bd:19:ac:39:c5:e6:b7:2f:e3:4c:a9:ea: 9e:dd:fb:98:8a:6c:1e:ea:1c:54:23:15:81:68:24:ba: b0:9e:12:a4:64:9c:20:bb:e9:ea:ec:a7:e5:d9:af:aa: 0c:98:9e:ac:64:c1:4a:70:96:f8:4f:c9:c9:11:c9:73: 71:c3:33:68:78:b1:16:f2:73:56:50:08:dc:0d:fb:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:4d:bc:c6:27:95:66:f5:88:1e:98:84:32: cf:f7:c0:78:36:44:a9:11:61:73:7e:70:a4:0d:ff:30: 02:1c:57:78:6a:fd:f0:0a:1c:2d:d0:30:cd:a3:5d:ad: ae:d0:30:fb:bb:97:d8:31:30:da:44:a9:81:f8 Fingerprint (SHA-256): F8:C6:3D:A2:19:BA:F9:04:B4:54:BA:79:D7:A5:46:4B:2F:47:C5:DB:32:66:7A:AB:26:2A:D9:F7:6F:30:4A:32 Fingerprint (SHA1): BE:E9:52:54:68:E1:0C:48:D0:40:18:59:9D:64:EC:18:A9:F6:14:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191180 (0x433ed4cc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:51 2025 Not After : Thu Nov 28 11:12:51 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 19:6b:da:a6:aa:87:af:5a:64:d3:eb:eb:3b:0b:ea:ac: f1:5e:53:69:07:74:c8:f1:ac:0f:e8:21:21:e1:08:8e: 79:72:f8:83:b2:60:19:af:5b:8a:27:58:6f:7b:e3:33: 2b:09:34:c3:42:89:86:4a:91:57:a3:55:82:5c:64:32: 00:75:ce:50:e3:42:68:13:1e:d0:17:23:8a:2c:46:f1: 25:2f:77:aa:9c:e7:d5:54:27:1b:11:78:74:b8:55:c0: f7:77:ef:20:3c:39:9e:30:d9:e5:31:76:65:20:b5:34: 1a:87:31:2a:cc:ba:ca:80:12:fa:78:12:72:bd:13:2e: ee:9e:57:85:a0:c4:d0:bc:dc:d8:fe:7a:a3:54:db:7b: 74:83:f9:12:24:d9:6c:5c:a9:a8:9d:f7:ee:5f:da:5e: 0a:75:12:95:31:41:d2:40:c5:84:b9:94:c8:54:34:b0: 2a:9a:34:47:bd:19:ac:39:c5:e6:b7:2f:e3:4c:a9:ea: 9e:dd:fb:98:8a:6c:1e:ea:1c:54:23:15:81:68:24:ba: b0:9e:12:a4:64:9c:20:bb:e9:ea:ec:a7:e5:d9:af:aa: 0c:98:9e:ac:64:c1:4a:70:96:f8:4f:c9:c9:11:c9:73: 71:c3:33:68:78:b1:16:f2:73:56:50:08:dc:0d:fb:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:4d:bc:c6:27:95:66:f5:88:1e:98:84:32: cf:f7:c0:78:36:44:a9:11:61:73:7e:70:a4:0d:ff:30: 02:1c:57:78:6a:fd:f0:0a:1c:2d:d0:30:cd:a3:5d:ad: ae:d0:30:fb:bb:97:d8:31:30:da:44:a9:81:f8 Fingerprint (SHA-256): F8:C6:3D:A2:19:BA:F9:04:B4:54:BA:79:D7:A5:46:4B:2F:47:C5:DB:32:66:7A:AB:26:2A:D9:F7:6F:30:4A:32 Fingerprint (SHA1): BE:E9:52:54:68:E1:0C:48:D0:40:18:59:9D:64:EC:18:A9:F6:14:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191180 (0x433ed4cc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:51 2025 Not After : Thu Nov 28 11:12:51 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 19:6b:da:a6:aa:87:af:5a:64:d3:eb:eb:3b:0b:ea:ac: f1:5e:53:69:07:74:c8:f1:ac:0f:e8:21:21:e1:08:8e: 79:72:f8:83:b2:60:19:af:5b:8a:27:58:6f:7b:e3:33: 2b:09:34:c3:42:89:86:4a:91:57:a3:55:82:5c:64:32: 00:75:ce:50:e3:42:68:13:1e:d0:17:23:8a:2c:46:f1: 25:2f:77:aa:9c:e7:d5:54:27:1b:11:78:74:b8:55:c0: f7:77:ef:20:3c:39:9e:30:d9:e5:31:76:65:20:b5:34: 1a:87:31:2a:cc:ba:ca:80:12:fa:78:12:72:bd:13:2e: ee:9e:57:85:a0:c4:d0:bc:dc:d8:fe:7a:a3:54:db:7b: 74:83:f9:12:24:d9:6c:5c:a9:a8:9d:f7:ee:5f:da:5e: 0a:75:12:95:31:41:d2:40:c5:84:b9:94:c8:54:34:b0: 2a:9a:34:47:bd:19:ac:39:c5:e6:b7:2f:e3:4c:a9:ea: 9e:dd:fb:98:8a:6c:1e:ea:1c:54:23:15:81:68:24:ba: b0:9e:12:a4:64:9c:20:bb:e9:ea:ec:a7:e5:d9:af:aa: 0c:98:9e:ac:64:c1:4a:70:96:f8:4f:c9:c9:11:c9:73: 71:c3:33:68:78:b1:16:f2:73:56:50:08:dc:0d:fb:e0 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:4d:bc:c6:27:95:66:f5:88:1e:98:84:32: cf:f7:c0:78:36:44:a9:11:61:73:7e:70:a4:0d:ff:30: 02:1c:57:78:6a:fd:f0:0a:1c:2d:d0:30:cd:a3:5d:ad: ae:d0:30:fb:bb:97:d8:31:30:da:44:a9:81:f8 Fingerprint (SHA-256): F8:C6:3D:A2:19:BA:F9:04:B4:54:BA:79:D7:A5:46:4B:2F:47:C5:DB:32:66:7A:AB:26:2A:D9:F7:6F:30:4A:32 Fingerprint (SHA1): BE:E9:52:54:68:E1:0C:48:D0:40:18:59:9D:64:EC:18:A9:F6:14:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111300Z nextupdate=20261128111300Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:13:00 2025 Next Update: Sat Nov 28 11:13:00 2026 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111300Z nextupdate=20261128111300Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:13:00 2025 Next Update: Sat Nov 28 11:13:00 2026 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111301Z nextupdate=20261128111301Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:13:01 2025 Next Update: Sat Nov 28 11:13:01 2026 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111301Z nextupdate=20261128111301Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:13:01 2025 Next Update: Sat Nov 28 11:13:01 2026 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111302Z addcert 14 20251128111302Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:13:02 2025 Next Update: Sat Nov 28 11:13:01 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:13:02 2025 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111303Z addcert 15 20251128111303Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:13:03 2025 Next Update: Sat Nov 28 11:13:00 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:13:03 2025 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:56 2025 Not After : Thu Nov 28 11:12:56 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:29:4a:6f:3b:55:50:87:2f:d5:24:d5:64:98:08:5d: 73:27:3d:99:cb:69:7a:95:b8:22:35:65:98:22:a3:7d: 25:57:95:54:36:fd:a5:4a:59:7f:c8:3e:af:b8:6d:d1: 79:65:6c:1d:8b:3f:31:ba:af:54:4a:75:4e:4e:bf:a9: 56:b5:7a:da:53:4e:b6:0b:1d:2c:3c:3a:4e:8a:7d:ef: d1:e0:83:fe:70:97:2f:ee:2d:85:d8:98:e2:f9:27:60: 15:eb:9c:b8:ad:05:f9:dc:2f:cc:ae:66:ff:41:f9:dd: 22:1f:1f:a8:0e:28:e3:35:fe:ce:e4:fb:70:93:72:50: 35:e5:47:df:16:46:5c:0e:c4:4a:9a:33:1c:26:63:6b: e5:12:26:9e:a0:19:ff:cd:f4:11:58:0d:05:13:9f:05: 32:f1:26:2b:fb:30:0c:37:d0:62:cf:a2:ec:7d:d0:fd: de:75:65:67:29:12:a6:e6:dd:0a:0e:c7:ce:fb:cf:44: 11:81:93:a3:14:4a:84:0e:62:3b:79:5a:83:81:2a:bc: 6c:7c:30:7a:a0:7b:41:d4:20:0c:52:e1:e9:49:39:af: 99:bf:61:9e:2c:c8:89:65:1e:02:b7:88:c9:b2:07:59: a1:e5:f2:5e:f1:8d:53:f8:26:c9:8e:64:8e:95:80:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:b3:1c:a7:6e:c8:05:f7:89:22:d7:b2:d7:73:85:6d: c9:cb:29:fb:b9:ae:66:51:8c:e5:f2:d6:80:0c:ea:23: b6:a7:66:d8:45:fc:e5:7d:c0:56:20:12:b4:85:7d:e1: 17:0e:e1:86:e8:2e:d9:97:1a:d7:0e:71:ef:ed:74:ca: 8e:e6:a0:a8:f1:2b:76:63:41:e0:27:05:c5:36:b0:48: 31:4e:97:19:95:66:62:a5:23:3e:a9:17:c2:84:eb:6d: 27:0e:8b:51:d8:84:0b:e3:16:06:29:83:c1:78:5f:72: 85:d6:86:c6:0c:dd:c8:e0:91:f0:b3:ed:d5:90:23:91: bf:1b:00:c7:0b:5b:e5:d5:5b:96:ce:0e:4f:1c:7f:38: 1b:6b:e0:86:45:fb:35:64:2c:f7:23:eb:d5:36:d1:78: f6:d2:a4:7c:e0:f8:f3:5d:8c:06:e8:13:bf:13:8c:c7: b8:65:86:30:08:02:88:fa:eb:56:be:37:26:2e:5e:99: 4c:12:17:54:12:d9:8a:65:5f:5a:5e:ce:f1:32:14:9a: 44:a6:05:d3:26:e2:75:9e:9c:d0:41:f6:01:cc:a4:70: c8:32:65:9c:92:62:3c:3c:b4:d0:cc:1b:2e:25:65:c7: 9b:d2:92:d0:d8:ec:b7:db:db:ee:79:1a:b6:02:f7:6c Fingerprint (SHA-256): 04:01:3C:0D:AF:8A:C0:9F:80:5E:9E:CB:82:24:52:30:F4:1D:E9:D7:0C:FC:88:F5:4F:62:10:EC:1B:81:AB:8D Fingerprint (SHA1): CA:0B:CC:52:7E:48:EE:ED:3B:70:79:36:04:E5:2A:AF:CA:AE:49:96 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:12:56 2025 Not After : Thu Nov 28 11:12:56 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:29:4a:6f:3b:55:50:87:2f:d5:24:d5:64:98:08:5d: 73:27:3d:99:cb:69:7a:95:b8:22:35:65:98:22:a3:7d: 25:57:95:54:36:fd:a5:4a:59:7f:c8:3e:af:b8:6d:d1: 79:65:6c:1d:8b:3f:31:ba:af:54:4a:75:4e:4e:bf:a9: 56:b5:7a:da:53:4e:b6:0b:1d:2c:3c:3a:4e:8a:7d:ef: d1:e0:83:fe:70:97:2f:ee:2d:85:d8:98:e2:f9:27:60: 15:eb:9c:b8:ad:05:f9:dc:2f:cc:ae:66:ff:41:f9:dd: 22:1f:1f:a8:0e:28:e3:35:fe:ce:e4:fb:70:93:72:50: 35:e5:47:df:16:46:5c:0e:c4:4a:9a:33:1c:26:63:6b: e5:12:26:9e:a0:19:ff:cd:f4:11:58:0d:05:13:9f:05: 32:f1:26:2b:fb:30:0c:37:d0:62:cf:a2:ec:7d:d0:fd: de:75:65:67:29:12:a6:e6:dd:0a:0e:c7:ce:fb:cf:44: 11:81:93:a3:14:4a:84:0e:62:3b:79:5a:83:81:2a:bc: 6c:7c:30:7a:a0:7b:41:d4:20:0c:52:e1:e9:49:39:af: 99:bf:61:9e:2c:c8:89:65:1e:02:b7:88:c9:b2:07:59: a1:e5:f2:5e:f1:8d:53:f8:26:c9:8e:64:8e:95:80:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c0:b3:1c:a7:6e:c8:05:f7:89:22:d7:b2:d7:73:85:6d: c9:cb:29:fb:b9:ae:66:51:8c:e5:f2:d6:80:0c:ea:23: b6:a7:66:d8:45:fc:e5:7d:c0:56:20:12:b4:85:7d:e1: 17:0e:e1:86:e8:2e:d9:97:1a:d7:0e:71:ef:ed:74:ca: 8e:e6:a0:a8:f1:2b:76:63:41:e0:27:05:c5:36:b0:48: 31:4e:97:19:95:66:62:a5:23:3e:a9:17:c2:84:eb:6d: 27:0e:8b:51:d8:84:0b:e3:16:06:29:83:c1:78:5f:72: 85:d6:86:c6:0c:dd:c8:e0:91:f0:b3:ed:d5:90:23:91: bf:1b:00:c7:0b:5b:e5:d5:5b:96:ce:0e:4f:1c:7f:38: 1b:6b:e0:86:45:fb:35:64:2c:f7:23:eb:d5:36:d1:78: f6:d2:a4:7c:e0:f8:f3:5d:8c:06:e8:13:bf:13:8c:c7: b8:65:86:30:08:02:88:fa:eb:56:be:37:26:2e:5e:99: 4c:12:17:54:12:d9:8a:65:5f:5a:5e:ce:f1:32:14:9a: 44:a6:05:d3:26:e2:75:9e:9c:d0:41:f6:01:cc:a4:70: c8:32:65:9c:92:62:3c:3c:b4:d0:cc:1b:2e:25:65:c7: 9b:d2:92:d0:d8:ec:b7:db:db:ee:79:1a:b6:02:f7:6c Fingerprint (SHA-256): 04:01:3C:0D:AF:8A:C0:9F:80:5E:9E:CB:82:24:52:30:F4:1D:E9:D7:0C:FC:88:F5:4F:62:10:EC:1B:81:AB:8D Fingerprint (SHA1): CA:0B:CC:52:7E:48:EE:ED:3B:70:79:36:04:E5:2A:AF:CA:AE:49:96 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #914: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #915: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #916: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #917: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #918: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111305Z nextupdate=20261128111305Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:13:05 2025 Next Update: Sat Nov 28 11:13:05 2026 CRL Extensions: chains.sh: #919: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111306Z addcert 3 20251128111306Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:13:06 2025 Next Update: Sat Nov 28 11:13:05 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:13:06 2025 CRL Extensions: chains.sh: #920: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111307Z addcert 4 20251128111307Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:13:07 2025 Next Update: Sat Nov 28 11:13:05 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:13:07 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:13:06 2025 CRL Extensions: chains.sh: #921: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #922: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #923: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #924: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #925: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #926: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #927: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #928: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #929: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #930: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #931: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #932: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #933: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #934: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:46 2025 Not After : Thu Nov 28 11:10:46 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:de:1f:02:6e:9c:11:8d:14:99:cc:04:bf:ff:f4:4c: b8:8b:a4:d8:63:3b:35:c5:13:dd:d0:db:00:0a:70:2f: a8:37:44:d5:96:78:87:a3:89:26:6c:94:f9:3a:2c:0a: a2:5a:b2:dc:4a:5c:e5:ef:6b:de:17:e0:6b:be:f1:64: 28:2e:f3:13:23:4e:f0:6a:d0:f6:5d:03:a0:70:49:1d: b2:af:3d:66:e4:23:b7:00:01:45:62:90:9a:c0:b3:24: 69:70:66:df:ee:aa:4e:93:20:46:43:d1:ac:e3:2e:1b: 2e:fd:e5:0f:4d:80:fc:a9:e4:70:6d:76:1c:57:f9:6b: 5a:81:18:ab:d6:80:46:63:0e:42:0c:af:df:71:63:e2: 5b:fa:a1:00:24:3f:a2:f9:e7:6f:5e:c3:59:b9:2e:0a: 22:46:15:2d:b2:86:21:30:24:e9:3f:94:46:9a:8b:f4: 10:31:d0:c6:b6:12:45:4e:4f:5a:72:eb:35:57:d8:33: 9e:fe:23:b2:75:84:ad:e1:13:24:4c:9d:00:fa:3e:eb: 34:13:da:16:8b:dc:1c:ec:34:db:17:ed:80:9e:d2:36: 9c:27:12:f3:77:b2:72:48:36:e8:63:92:4e:e8:0a:12: f8:99:fc:83:f3:e1:72:57:d5:60:17:4d:50:e4:9e:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:a8:a7:03:e0:13:8e:f2:a4:d3:27:12:3d:9e:cb:3b: ec:2c:48:f7:05:a6:fd:07:24:a9:a9:d9:9e:ec:0b:df: 53:04:29:04:ad:0d:b6:8d:a3:03:8d:da:18:24:c4:1c: 2a:98:fc:b1:52:d1:0d:00:ad:7c:2e:30:5a:63:06:5c: 84:44:b4:a8:87:22:97:a1:55:dc:78:1d:28:ba:ad:17: 85:e6:21:f9:02:79:0e:33:2d:7e:6e:40:b7:15:9f:ad: 43:4e:52:7b:79:30:d7:ff:81:99:6d:23:ad:53:81:a0: 0b:bb:a5:9a:e1:95:50:d5:ec:16:4b:b6:4e:4d:d2:0a: a9:0f:f1:ff:29:6b:a0:e5:7d:28:33:f9:08:ef:90:0e: 34:83:34:a0:95:94:a8:88:74:94:ad:b3:aa:a6:01:89: 39:0f:3f:c0:c9:e8:a9:55:87:cc:e9:7c:67:1f:1c:6a: a9:9a:d1:22:9b:bb:4b:95:41:9b:c8:2c:da:39:6e:f6: 94:6c:3d:99:f0:ec:ef:6b:8a:cc:e8:42:12:3c:28:20: d9:10:f1:46:dc:36:ba:76:e0:f4:d4:8f:0f:c0:db:2e: 06:cd:75:62:7f:10:55:03:e7:a9:cf:62:a1:f3:a2:ab: 71:eb:39:9a:47:83:70:04:79:ff:0d:f0:83:0f:c4:eb Fingerprint (SHA-256): FA:9F:34:98:3E:45:9C:64:C3:1D:B0:D6:1F:FD:E7:E1:0A:FA:6E:FB:8D:38:E4:88:EA:D6:1E:1D:95:72:E9:16 Fingerprint (SHA1): 2B:9F:53:8F:89:96:19:33:10:A1:56:57:42:D6:AD:CC:A5:CE:1D:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #935: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #936: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #937: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #938: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #939: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #940: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #941: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #942: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191189 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #944: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #945: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #946: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128191190 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #947: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #948: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #949: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191066.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #950: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191049.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #951: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #953: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191066.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #954: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128191191 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #955: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #956: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #957: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191066.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #958: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191050.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #959: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #960: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #961: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128191192 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #963: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #965: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191066.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #966: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191051.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #967: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #969: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191066.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #970: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191052.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #971: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111315Z nextupdate=20261128111315Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:13:15 2025 Next Update: Sat Nov 28 11:13:15 2026 CRL Extensions: chains.sh: #973: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111315Z nextupdate=20261128111315Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:13:15 2025 Next Update: Sat Nov 28 11:13:15 2026 CRL Extensions: chains.sh: #974: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111316Z nextupdate=20261128111316Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:13:16 2025 Next Update: Sat Nov 28 11:13:16 2026 CRL Extensions: chains.sh: #975: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111316Z nextupdate=20261128111316Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:13:16 2025 Next Update: Sat Nov 28 11:13:16 2026 CRL Extensions: chains.sh: #976: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111317Z addcert 20 20251128111317Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:13:17 2025 Next Update: Sat Nov 28 11:13:15 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:13:17 2025 CRL Extensions: chains.sh: #977: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111318Z addcert 40 20251128111318Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:13:18 2025 Next Update: Sat Nov 28 11:13:15 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:13:17 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:13:18 2025 CRL Extensions: chains.sh: #978: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #979: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #980: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #981: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191189 (0x433ed4d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:09 2025 Not After : Thu Nov 28 11:13:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:21:2b:f2:7c:de:29:61:3d:09:5a:8d:9f:6f:18:a4: 3f:71:7b:b6:41:2f:e5:e1:8e:43:31:64:72:f7:bb:64: 29:1e:07:7c:93:c1:a0:5d:0e:d3:b7:bb:1e:f2:5b:ac: 19:f0:3d:0d:45:f2:11:8c:8c:eb:72:b4:98:c3:8b:5d: 06:c5:55:5f:24:b6:6b:0a:e4:cb:51:26:09:50:c8:85: 6d:f4:8e:00:18:3e:9a:e5:89:6b:a1:d7:6f:b6:cf:19: a2:44:4b:e3:d6:f7:2a:e6:68:a7:40:fb:d1:99:e4:16: 46:fd:34:6c:b0:3d:7a:ac:19:d6:ad:1a:fb:ac:28:ea: 30:51:c7:f6:c1:b4:a9:6e:b8:b7:92:b6:b8:55:2b:8a: 98:87:f1:b6:57:d8:3b:35:40:0a:6c:38:21:d4:99:d2: 42:41:ed:68:64:83:49:37:12:d2:b8:0c:f7:90:25:19: 07:e4:a0:80:2a:e0:04:81:ac:63:b7:be:87:70:4c:c9: ac:b1:1b:ca:f2:d9:ed:91:61:be:35:d0:c5:bd:f0:14: a0:ea:92:6b:31:61:4d:c9:b9:09:aa:f7:77:fd:31:f3: f1:ef:36:2c:ba:88:13:f3:38:26:4f:55:88:86:dc:46: 77:d8:84:27:1a:b7:c6:1f:36:e3:0e:7b:ba:33:c5:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:dd:24:d0:b9:0f:69:21:ae:a9:83:bc:ab:d2:f6:84: c2:dc:39:25:3f:54:53:b2:65:62:0b:66:01:5c:3e:f7: 7f:56:b0:13:c4:13:c5:80:e9:05:05:86:90:bf:f8:f6: 69:6c:d2:e7:fa:f6:cd:13:98:8b:d6:a2:4f:81:cf:ea: c4:bf:d8:46:56:fb:cf:92:43:9b:5e:a4:b5:40:15:2b: 87:6f:46:29:6e:1b:15:08:af:63:7e:67:54:a9:3a:f9: 0c:4b:01:c2:2c:a1:77:c7:1a:c3:23:b6:52:67:89:8d: 59:06:f0:e4:a3:17:13:9f:7c:a5:1d:06:46:02:46:77: 03:89:f8:b5:a9:7d:9a:7f:6d:31:67:0a:f4:5d:ab:63: 5b:9d:fa:19:df:cd:fc:94:0a:fa:4c:ab:da:97:97:d0: 25:02:0e:51:38:c9:37:45:e9:15:bb:4a:e0:b2:db:40: a8:14:c3:5b:98:fe:70:3a:4a:75:4e:10:be:07:f6:b5: 84:76:13:e3:35:32:dc:12:62:89:a8:4d:c6:09:8b:61: 56:ca:e4:7a:d9:ba:17:7f:46:72:dd:3e:ee:d2:3c:1d: 1f:99:be:14:1e:cf:b8:9f:41:f5:70:0c:cc:50:80:3e: 65:45:a7:74:94:51:aa:76:22:b1:4f:de:1a:18:5d:e8 Fingerprint (SHA-256): 8B:E5:CE:03:26:51:88:60:74:5A:74:7E:BA:31:13:98:E4:94:17:FB:50:A5:B8:49:5C:8F:9C:87:B4:32:E2:5B Fingerprint (SHA1): C6:61:4B:AA:1A:F3:E9:00:9B:9F:C2:84:12:0B:B3:EB:1C:BA:B8:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #982: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #983: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191189 (0x433ed4d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:09 2025 Not After : Thu Nov 28 11:13:09 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:21:2b:f2:7c:de:29:61:3d:09:5a:8d:9f:6f:18:a4: 3f:71:7b:b6:41:2f:e5:e1:8e:43:31:64:72:f7:bb:64: 29:1e:07:7c:93:c1:a0:5d:0e:d3:b7:bb:1e:f2:5b:ac: 19:f0:3d:0d:45:f2:11:8c:8c:eb:72:b4:98:c3:8b:5d: 06:c5:55:5f:24:b6:6b:0a:e4:cb:51:26:09:50:c8:85: 6d:f4:8e:00:18:3e:9a:e5:89:6b:a1:d7:6f:b6:cf:19: a2:44:4b:e3:d6:f7:2a:e6:68:a7:40:fb:d1:99:e4:16: 46:fd:34:6c:b0:3d:7a:ac:19:d6:ad:1a:fb:ac:28:ea: 30:51:c7:f6:c1:b4:a9:6e:b8:b7:92:b6:b8:55:2b:8a: 98:87:f1:b6:57:d8:3b:35:40:0a:6c:38:21:d4:99:d2: 42:41:ed:68:64:83:49:37:12:d2:b8:0c:f7:90:25:19: 07:e4:a0:80:2a:e0:04:81:ac:63:b7:be:87:70:4c:c9: ac:b1:1b:ca:f2:d9:ed:91:61:be:35:d0:c5:bd:f0:14: a0:ea:92:6b:31:61:4d:c9:b9:09:aa:f7:77:fd:31:f3: f1:ef:36:2c:ba:88:13:f3:38:26:4f:55:88:86:dc:46: 77:d8:84:27:1a:b7:c6:1f:36:e3:0e:7b:ba:33:c5:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:dd:24:d0:b9:0f:69:21:ae:a9:83:bc:ab:d2:f6:84: c2:dc:39:25:3f:54:53:b2:65:62:0b:66:01:5c:3e:f7: 7f:56:b0:13:c4:13:c5:80:e9:05:05:86:90:bf:f8:f6: 69:6c:d2:e7:fa:f6:cd:13:98:8b:d6:a2:4f:81:cf:ea: c4:bf:d8:46:56:fb:cf:92:43:9b:5e:a4:b5:40:15:2b: 87:6f:46:29:6e:1b:15:08:af:63:7e:67:54:a9:3a:f9: 0c:4b:01:c2:2c:a1:77:c7:1a:c3:23:b6:52:67:89:8d: 59:06:f0:e4:a3:17:13:9f:7c:a5:1d:06:46:02:46:77: 03:89:f8:b5:a9:7d:9a:7f:6d:31:67:0a:f4:5d:ab:63: 5b:9d:fa:19:df:cd:fc:94:0a:fa:4c:ab:da:97:97:d0: 25:02:0e:51:38:c9:37:45:e9:15:bb:4a:e0:b2:db:40: a8:14:c3:5b:98:fe:70:3a:4a:75:4e:10:be:07:f6:b5: 84:76:13:e3:35:32:dc:12:62:89:a8:4d:c6:09:8b:61: 56:ca:e4:7a:d9:ba:17:7f:46:72:dd:3e:ee:d2:3c:1d: 1f:99:be:14:1e:cf:b8:9f:41:f5:70:0c:cc:50:80:3e: 65:45:a7:74:94:51:aa:76:22:b1:4f:de:1a:18:5d:e8 Fingerprint (SHA-256): 8B:E5:CE:03:26:51:88:60:74:5A:74:7E:BA:31:13:98:E4:94:17:FB:50:A5:B8:49:5C:8F:9C:87:B4:32:E2:5B Fingerprint (SHA1): C6:61:4B:AA:1A:F3:E9:00:9B:9F:C2:84:12:0B:B3:EB:1C:BA:B8:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #984: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #985: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #986: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191193 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #987: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #988: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #989: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #990: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191194 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #991: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #992: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #994: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191195 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #995: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #996: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #997: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #998: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128191196 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #999: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1000: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1001: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191197 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1002: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1003: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1004: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1005: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128191198 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1006: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1007: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1008: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1009: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128191199 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1010: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1011: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1012: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1013: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1014: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191193 (0x433ed4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:19 2025 Not After : Thu Nov 28 11:13:19 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:2c:95:bc:9c:2f:a2:1d:22:e4:9d:14:e6:51:0a:76: a8:02:48:e5:22:43:82:1e:75:ab:4f:1f:09:a7:1f:8b: c4:62:bf:0f:2c:dc:64:bc:b1:d3:7d:1e:64:14:cf:e7: 1b:dd:e3:4f:7d:fa:2b:d5:e7:b1:87:04:9d:d3:4e:36: 2e:dd:3e:c5:4a:24:ad:19:4d:9f:a7:e9:27:98:86:15: a8:c1:ea:18:d8:f8:9f:98:e5:57:c3:1b:ad:44:0f:40: a7:5c:2a:18:d7:50:27:b5:81:6d:5d:9e:01:2d:14:96: 22:d9:69:34:6d:c1:41:f8:b1:a7:b5:7a:b9:ce:da:76: be:d9:fd:99:6e:7f:c1:65:64:da:5c:df:98:b6:36:79: f9:51:ca:6a:62:6d:ce:19:33:37:7b:45:72:8e:c1:69: 5a:64:23:84:75:89:23:02:e0:15:30:04:62:04:08:df: 02:c3:7c:62:29:6f:2b:90:b0:c6:b7:67:4f:2e:9a:e2: 2c:62:c8:99:30:b5:08:a9:0b:0d:3f:cb:ab:07:8d:39: 8e:91:e6:a7:f3:a9:e4:6b:fc:f9:fa:fb:3b:3d:43:57: da:21:08:a4:de:c9:8f:a5:ae:84:05:a6:bc:d3:19:33: ea:b7:f1:f4:c5:65:02:2f:21:77:59:4b:67:54:f7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:23:af:6b:4c:35:05:7b:ff:e7:51:78:71:fb:a1:58: 37:c8:28:ab:f5:3f:71:02:6c:74:3d:1e:f7:b3:9a:eb: ac:b1:76:9a:7b:a7:43:95:61:52:39:7b:2c:b1:96:97: 8d:0d:bb:32:f2:8b:bb:8d:60:72:4a:f1:01:5b:b6:fd: 27:63:e9:18:5b:1a:70:e1:50:2a:20:65:14:ca:30:4e: 47:d0:29:16:e2:02:7c:6b:de:27:8b:a4:ea:63:7c:2b: c6:5a:95:1e:36:e3:4f:ed:62:84:38:5f:14:64:93:a2: f8:f1:e1:2e:c9:40:77:13:40:30:c1:43:27:18:bd:af: bc:0c:b1:f5:f4:93:80:29:de:fc:51:8b:0b:81:30:bc: fb:95:11:7f:3d:23:56:e9:1c:ec:61:ba:06:c6:e7:c1: 1f:ce:69:30:e9:00:f1:cc:49:05:e2:2f:c5:93:66:11: 79:e4:d4:e7:e7:87:ae:f0:a9:0c:84:79:f3:fb:33:ef: c6:16:53:98:34:b5:43:32:00:91:a4:7e:54:c9:ea:b0: eb:86:c5:76:05:a0:54:cd:2f:1c:f9:66:67:33:29:7a: 52:8f:4d:2f:ca:37:46:33:b9:f5:8f:51:86:ef:89:ec: 8e:18:c4:36:c8:5c:3c:39:a6:4b:5c:c5:b7:ad:48:8f Fingerprint (SHA-256): D4:8B:4F:26:6B:61:78:C2:E9:2C:BE:53:C8:79:97:84:8F:DB:B3:32:11:19:2D:DE:E7:4A:68:ED:9E:B0:C3:3E Fingerprint (SHA1): 49:80:E5:94:DB:75:6C:03:CD:D2:C0:10:E7:9D:D8:13:3B:F7:94:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191195 (0x433ed4db) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:21 2025 Not After : Thu Nov 28 11:13:21 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:cc:2b:4b:03:1f:d7:f5:f6:bf:5c:c0:83:99:56:fa: ee:ea:a8:85:41:5a:32:88:e5:d0:f8:b3:1d:a9:cd:55: 4e:72:b1:a8:0c:4c:71:a1:f0:41:62:3b:f0:8e:f0:5d: 80:13:b7:86:7d:9e:1f:fb:7e:be:5f:bc:58:0d:cf:55: 57:12:9b:68:ef:e3:8a:b4:af:c1:c7:99:45:0d:4d:48: 51:a5:87:e7:ba:ac:d1:4b:7b:72:05:c9:e9:67:92:ef: ce:bd:58:04:54:2e:39:1c:9b:df:b0:e7:4a:4a:84:2e: 19:38:ff:00:4e:ae:cf:26:41:5f:03:af:0e:d1:16:6a: 34:91:27:65:46:55:97:4c:b4:79:e3:10:9e:84:66:96: bf:c4:28:2e:10:ab:83:66:c8:01:38:44:b3:fb:0c:fb: 16:ac:a1:3f:71:b9:5e:c3:32:2a:c0:b8:42:61:99:f0: c7:1b:1e:c6:58:4c:b2:ae:f3:a6:31:ad:9e:b6:7f:36: 5f:40:44:14:36:2c:80:ae:40:60:94:c0:88:45:4f:e6: 08:ed:72:cf:3a:44:89:b1:26:ce:60:2f:d7:b2:c6:b6: ca:20:76:56:64:3d:45:70:d6:aa:a8:3a:a4:ce:cd:c2: cb:15:1f:15:56:74:b2:da:a7:3e:7d:89:13:74:01:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:f5:4d:be:d8:87:e5:b6:7c:4e:8e:32:ab:04:06:6d: 94:61:60:da:5c:cc:df:02:92:42:03:a4:91:5d:79:90: eb:f8:b0:b4:ab:07:ac:c0:70:ea:a1:63:10:a9:b8:a4: 0d:81:86:b5:33:67:85:c1:ec:a0:8c:ef:39:d5:d2:06: f5:e4:04:81:07:c6:8c:7a:95:c5:37:e0:7b:34:6e:34: 65:29:60:6f:16:5b:f5:b4:8b:e1:ef:d1:f9:78:bb:ac: e1:12:b0:e2:54:4b:cf:e8:73:1b:08:ce:2c:b2:45:30: f6:58:13:15:ea:9b:dd:b1:92:92:f7:e8:55:63:50:53: 8f:c1:53:53:f0:a2:a9:bf:72:3b:db:44:cd:fd:80:02: 84:c3:62:11:15:55:bc:7b:95:2e:1c:51:1d:14:20:8a: 42:f1:c2:45:12:9c:0b:e7:fb:51:4b:d7:36:5f:6b:d9: c8:85:f2:1c:66:07:e6:a3:4f:f4:49:55:79:61:5e:c4: d5:dd:d6:7e:56:19:4f:7a:f1:ec:23:0f:52:5b:ea:d3: 02:18:05:f9:02:54:99:ad:86:30:73:db:0e:94:1c:16: 49:0c:26:7d:99:3f:af:14:4e:39:c7:67:f9:96:42:ec: 5c:4d:36:72:ce:f6:cf:3c:e7:33:71:05:17:ce:25:b2 Fingerprint (SHA-256): 72:AA:74:20:7F:4C:0D:99:77:9E:B4:A8:37:6B:1F:3F:3D:83:31:66:65:BA:12:07:FC:E0:08:4D:23:14:61:E4 Fingerprint (SHA1): 7D:AC:06:82:B5:91:B0:E9:E8:97:C8:17:86:F4:1D:0C:11:1C:30:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191193 (0x433ed4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:19 2025 Not After : Thu Nov 28 11:13:19 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:2c:95:bc:9c:2f:a2:1d:22:e4:9d:14:e6:51:0a:76: a8:02:48:e5:22:43:82:1e:75:ab:4f:1f:09:a7:1f:8b: c4:62:bf:0f:2c:dc:64:bc:b1:d3:7d:1e:64:14:cf:e7: 1b:dd:e3:4f:7d:fa:2b:d5:e7:b1:87:04:9d:d3:4e:36: 2e:dd:3e:c5:4a:24:ad:19:4d:9f:a7:e9:27:98:86:15: a8:c1:ea:18:d8:f8:9f:98:e5:57:c3:1b:ad:44:0f:40: a7:5c:2a:18:d7:50:27:b5:81:6d:5d:9e:01:2d:14:96: 22:d9:69:34:6d:c1:41:f8:b1:a7:b5:7a:b9:ce:da:76: be:d9:fd:99:6e:7f:c1:65:64:da:5c:df:98:b6:36:79: f9:51:ca:6a:62:6d:ce:19:33:37:7b:45:72:8e:c1:69: 5a:64:23:84:75:89:23:02:e0:15:30:04:62:04:08:df: 02:c3:7c:62:29:6f:2b:90:b0:c6:b7:67:4f:2e:9a:e2: 2c:62:c8:99:30:b5:08:a9:0b:0d:3f:cb:ab:07:8d:39: 8e:91:e6:a7:f3:a9:e4:6b:fc:f9:fa:fb:3b:3d:43:57: da:21:08:a4:de:c9:8f:a5:ae:84:05:a6:bc:d3:19:33: ea:b7:f1:f4:c5:65:02:2f:21:77:59:4b:67:54:f7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:23:af:6b:4c:35:05:7b:ff:e7:51:78:71:fb:a1:58: 37:c8:28:ab:f5:3f:71:02:6c:74:3d:1e:f7:b3:9a:eb: ac:b1:76:9a:7b:a7:43:95:61:52:39:7b:2c:b1:96:97: 8d:0d:bb:32:f2:8b:bb:8d:60:72:4a:f1:01:5b:b6:fd: 27:63:e9:18:5b:1a:70:e1:50:2a:20:65:14:ca:30:4e: 47:d0:29:16:e2:02:7c:6b:de:27:8b:a4:ea:63:7c:2b: c6:5a:95:1e:36:e3:4f:ed:62:84:38:5f:14:64:93:a2: f8:f1:e1:2e:c9:40:77:13:40:30:c1:43:27:18:bd:af: bc:0c:b1:f5:f4:93:80:29:de:fc:51:8b:0b:81:30:bc: fb:95:11:7f:3d:23:56:e9:1c:ec:61:ba:06:c6:e7:c1: 1f:ce:69:30:e9:00:f1:cc:49:05:e2:2f:c5:93:66:11: 79:e4:d4:e7:e7:87:ae:f0:a9:0c:84:79:f3:fb:33:ef: c6:16:53:98:34:b5:43:32:00:91:a4:7e:54:c9:ea:b0: eb:86:c5:76:05:a0:54:cd:2f:1c:f9:66:67:33:29:7a: 52:8f:4d:2f:ca:37:46:33:b9:f5:8f:51:86:ef:89:ec: 8e:18:c4:36:c8:5c:3c:39:a6:4b:5c:c5:b7:ad:48:8f Fingerprint (SHA-256): D4:8B:4F:26:6B:61:78:C2:E9:2C:BE:53:C8:79:97:84:8F:DB:B3:32:11:19:2D:DE:E7:4A:68:ED:9E:B0:C3:3E Fingerprint (SHA1): 49:80:E5:94:DB:75:6C:03:CD:D2:C0:10:E7:9D:D8:13:3B:F7:94:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1018: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191193 (0x433ed4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:19 2025 Not After : Thu Nov 28 11:13:19 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:2c:95:bc:9c:2f:a2:1d:22:e4:9d:14:e6:51:0a:76: a8:02:48:e5:22:43:82:1e:75:ab:4f:1f:09:a7:1f:8b: c4:62:bf:0f:2c:dc:64:bc:b1:d3:7d:1e:64:14:cf:e7: 1b:dd:e3:4f:7d:fa:2b:d5:e7:b1:87:04:9d:d3:4e:36: 2e:dd:3e:c5:4a:24:ad:19:4d:9f:a7:e9:27:98:86:15: a8:c1:ea:18:d8:f8:9f:98:e5:57:c3:1b:ad:44:0f:40: a7:5c:2a:18:d7:50:27:b5:81:6d:5d:9e:01:2d:14:96: 22:d9:69:34:6d:c1:41:f8:b1:a7:b5:7a:b9:ce:da:76: be:d9:fd:99:6e:7f:c1:65:64:da:5c:df:98:b6:36:79: f9:51:ca:6a:62:6d:ce:19:33:37:7b:45:72:8e:c1:69: 5a:64:23:84:75:89:23:02:e0:15:30:04:62:04:08:df: 02:c3:7c:62:29:6f:2b:90:b0:c6:b7:67:4f:2e:9a:e2: 2c:62:c8:99:30:b5:08:a9:0b:0d:3f:cb:ab:07:8d:39: 8e:91:e6:a7:f3:a9:e4:6b:fc:f9:fa:fb:3b:3d:43:57: da:21:08:a4:de:c9:8f:a5:ae:84:05:a6:bc:d3:19:33: ea:b7:f1:f4:c5:65:02:2f:21:77:59:4b:67:54:f7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:23:af:6b:4c:35:05:7b:ff:e7:51:78:71:fb:a1:58: 37:c8:28:ab:f5:3f:71:02:6c:74:3d:1e:f7:b3:9a:eb: ac:b1:76:9a:7b:a7:43:95:61:52:39:7b:2c:b1:96:97: 8d:0d:bb:32:f2:8b:bb:8d:60:72:4a:f1:01:5b:b6:fd: 27:63:e9:18:5b:1a:70:e1:50:2a:20:65:14:ca:30:4e: 47:d0:29:16:e2:02:7c:6b:de:27:8b:a4:ea:63:7c:2b: c6:5a:95:1e:36:e3:4f:ed:62:84:38:5f:14:64:93:a2: f8:f1:e1:2e:c9:40:77:13:40:30:c1:43:27:18:bd:af: bc:0c:b1:f5:f4:93:80:29:de:fc:51:8b:0b:81:30:bc: fb:95:11:7f:3d:23:56:e9:1c:ec:61:ba:06:c6:e7:c1: 1f:ce:69:30:e9:00:f1:cc:49:05:e2:2f:c5:93:66:11: 79:e4:d4:e7:e7:87:ae:f0:a9:0c:84:79:f3:fb:33:ef: c6:16:53:98:34:b5:43:32:00:91:a4:7e:54:c9:ea:b0: eb:86:c5:76:05:a0:54:cd:2f:1c:f9:66:67:33:29:7a: 52:8f:4d:2f:ca:37:46:33:b9:f5:8f:51:86:ef:89:ec: 8e:18:c4:36:c8:5c:3c:39:a6:4b:5c:c5:b7:ad:48:8f Fingerprint (SHA-256): D4:8B:4F:26:6B:61:78:C2:E9:2C:BE:53:C8:79:97:84:8F:DB:B3:32:11:19:2D:DE:E7:4A:68:ED:9E:B0:C3:3E Fingerprint (SHA1): 49:80:E5:94:DB:75:6C:03:CD:D2:C0:10:E7:9D:D8:13:3B:F7:94:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1019: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191195 (0x433ed4db) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:21 2025 Not After : Thu Nov 28 11:13:21 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:cc:2b:4b:03:1f:d7:f5:f6:bf:5c:c0:83:99:56:fa: ee:ea:a8:85:41:5a:32:88:e5:d0:f8:b3:1d:a9:cd:55: 4e:72:b1:a8:0c:4c:71:a1:f0:41:62:3b:f0:8e:f0:5d: 80:13:b7:86:7d:9e:1f:fb:7e:be:5f:bc:58:0d:cf:55: 57:12:9b:68:ef:e3:8a:b4:af:c1:c7:99:45:0d:4d:48: 51:a5:87:e7:ba:ac:d1:4b:7b:72:05:c9:e9:67:92:ef: ce:bd:58:04:54:2e:39:1c:9b:df:b0:e7:4a:4a:84:2e: 19:38:ff:00:4e:ae:cf:26:41:5f:03:af:0e:d1:16:6a: 34:91:27:65:46:55:97:4c:b4:79:e3:10:9e:84:66:96: bf:c4:28:2e:10:ab:83:66:c8:01:38:44:b3:fb:0c:fb: 16:ac:a1:3f:71:b9:5e:c3:32:2a:c0:b8:42:61:99:f0: c7:1b:1e:c6:58:4c:b2:ae:f3:a6:31:ad:9e:b6:7f:36: 5f:40:44:14:36:2c:80:ae:40:60:94:c0:88:45:4f:e6: 08:ed:72:cf:3a:44:89:b1:26:ce:60:2f:d7:b2:c6:b6: ca:20:76:56:64:3d:45:70:d6:aa:a8:3a:a4:ce:cd:c2: cb:15:1f:15:56:74:b2:da:a7:3e:7d:89:13:74:01:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:f5:4d:be:d8:87:e5:b6:7c:4e:8e:32:ab:04:06:6d: 94:61:60:da:5c:cc:df:02:92:42:03:a4:91:5d:79:90: eb:f8:b0:b4:ab:07:ac:c0:70:ea:a1:63:10:a9:b8:a4: 0d:81:86:b5:33:67:85:c1:ec:a0:8c:ef:39:d5:d2:06: f5:e4:04:81:07:c6:8c:7a:95:c5:37:e0:7b:34:6e:34: 65:29:60:6f:16:5b:f5:b4:8b:e1:ef:d1:f9:78:bb:ac: e1:12:b0:e2:54:4b:cf:e8:73:1b:08:ce:2c:b2:45:30: f6:58:13:15:ea:9b:dd:b1:92:92:f7:e8:55:63:50:53: 8f:c1:53:53:f0:a2:a9:bf:72:3b:db:44:cd:fd:80:02: 84:c3:62:11:15:55:bc:7b:95:2e:1c:51:1d:14:20:8a: 42:f1:c2:45:12:9c:0b:e7:fb:51:4b:d7:36:5f:6b:d9: c8:85:f2:1c:66:07:e6:a3:4f:f4:49:55:79:61:5e:c4: d5:dd:d6:7e:56:19:4f:7a:f1:ec:23:0f:52:5b:ea:d3: 02:18:05:f9:02:54:99:ad:86:30:73:db:0e:94:1c:16: 49:0c:26:7d:99:3f:af:14:4e:39:c7:67:f9:96:42:ec: 5c:4d:36:72:ce:f6:cf:3c:e7:33:71:05:17:ce:25:b2 Fingerprint (SHA-256): 72:AA:74:20:7F:4C:0D:99:77:9E:B4:A8:37:6B:1F:3F:3D:83:31:66:65:BA:12:07:FC:E0:08:4D:23:14:61:E4 Fingerprint (SHA1): 7D:AC:06:82:B5:91:B0:E9:E8:97:C8:17:86:F4:1D:0C:11:1C:30:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1021: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1022: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1023: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191193 (0x433ed4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:19 2025 Not After : Thu Nov 28 11:13:19 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:2c:95:bc:9c:2f:a2:1d:22:e4:9d:14:e6:51:0a:76: a8:02:48:e5:22:43:82:1e:75:ab:4f:1f:09:a7:1f:8b: c4:62:bf:0f:2c:dc:64:bc:b1:d3:7d:1e:64:14:cf:e7: 1b:dd:e3:4f:7d:fa:2b:d5:e7:b1:87:04:9d:d3:4e:36: 2e:dd:3e:c5:4a:24:ad:19:4d:9f:a7:e9:27:98:86:15: a8:c1:ea:18:d8:f8:9f:98:e5:57:c3:1b:ad:44:0f:40: a7:5c:2a:18:d7:50:27:b5:81:6d:5d:9e:01:2d:14:96: 22:d9:69:34:6d:c1:41:f8:b1:a7:b5:7a:b9:ce:da:76: be:d9:fd:99:6e:7f:c1:65:64:da:5c:df:98:b6:36:79: f9:51:ca:6a:62:6d:ce:19:33:37:7b:45:72:8e:c1:69: 5a:64:23:84:75:89:23:02:e0:15:30:04:62:04:08:df: 02:c3:7c:62:29:6f:2b:90:b0:c6:b7:67:4f:2e:9a:e2: 2c:62:c8:99:30:b5:08:a9:0b:0d:3f:cb:ab:07:8d:39: 8e:91:e6:a7:f3:a9:e4:6b:fc:f9:fa:fb:3b:3d:43:57: da:21:08:a4:de:c9:8f:a5:ae:84:05:a6:bc:d3:19:33: ea:b7:f1:f4:c5:65:02:2f:21:77:59:4b:67:54:f7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:23:af:6b:4c:35:05:7b:ff:e7:51:78:71:fb:a1:58: 37:c8:28:ab:f5:3f:71:02:6c:74:3d:1e:f7:b3:9a:eb: ac:b1:76:9a:7b:a7:43:95:61:52:39:7b:2c:b1:96:97: 8d:0d:bb:32:f2:8b:bb:8d:60:72:4a:f1:01:5b:b6:fd: 27:63:e9:18:5b:1a:70:e1:50:2a:20:65:14:ca:30:4e: 47:d0:29:16:e2:02:7c:6b:de:27:8b:a4:ea:63:7c:2b: c6:5a:95:1e:36:e3:4f:ed:62:84:38:5f:14:64:93:a2: f8:f1:e1:2e:c9:40:77:13:40:30:c1:43:27:18:bd:af: bc:0c:b1:f5:f4:93:80:29:de:fc:51:8b:0b:81:30:bc: fb:95:11:7f:3d:23:56:e9:1c:ec:61:ba:06:c6:e7:c1: 1f:ce:69:30:e9:00:f1:cc:49:05:e2:2f:c5:93:66:11: 79:e4:d4:e7:e7:87:ae:f0:a9:0c:84:79:f3:fb:33:ef: c6:16:53:98:34:b5:43:32:00:91:a4:7e:54:c9:ea:b0: eb:86:c5:76:05:a0:54:cd:2f:1c:f9:66:67:33:29:7a: 52:8f:4d:2f:ca:37:46:33:b9:f5:8f:51:86:ef:89:ec: 8e:18:c4:36:c8:5c:3c:39:a6:4b:5c:c5:b7:ad:48:8f Fingerprint (SHA-256): D4:8B:4F:26:6B:61:78:C2:E9:2C:BE:53:C8:79:97:84:8F:DB:B3:32:11:19:2D:DE:E7:4A:68:ED:9E:B0:C3:3E Fingerprint (SHA1): 49:80:E5:94:DB:75:6C:03:CD:D2:C0:10:E7:9D:D8:13:3B:F7:94:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1024: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191197 (0x433ed4dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:13:22 2025 Not After : Thu Nov 28 11:13:22 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:21:a7:3a:70:2f:51:64:e7:36:07:ac:d8:1f:76:3f: bf:aa:97:6f:f7:c0:08:06:59:26:5e:b5:e8:4e:fa:29: 14:40:d7:01:52:3f:06:f8:83:c8:7c:0c:d1:28:79:a9: ff:0b:8d:8a:b2:e0:47:46:66:26:90:9a:0b:49:13:42: 78:bc:0e:8d:e5:22:88:55:ae:88:ed:b0:9b:a2:e9:ac: 0e:e9:01:e6:d3:c6:98:18:0e:2b:0f:2a:70:85:37:18: 0c:2e:4a:36:57:ea:46:ca:a3:ce:76:51:a0:b4:9d:85: 3f:53:87:ff:24:47:6e:98:c0:89:43:28:b2:18:2a:58: a6:4c:30:70:da:b7:84:e2:f7:c3:86:8a:0e:54:b5:fc: ad:72:bb:ea:77:6a:ab:ec:48:eb:66:27:29:25:9f:3d: 71:1e:79:ac:9f:a2:fd:2a:07:cb:aa:36:84:58:99:1b: 67:ae:e4:43:6e:c1:e7:e6:c8:37:90:3f:fc:81:b7:2d: 4e:38:4a:d9:f8:44:d4:fa:5f:e3:ef:81:de:36:10:57: 66:ae:1b:e3:9f:b7:c8:e1:35:49:d4:c9:70:f2:0a:20: be:19:f4:17:e8:ef:8f:42:26:64:d0:26:96:c8:61:28: 88:74:13:e2:7e:63:be:98:a0:da:4d:4d:57:70:d0:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:e9:f8:87:a3:63:ab:82:03:5e:53:03:45:0b:6c:b8: 9f:66:01:c4:b6:65:4d:e8:1f:64:20:7d:0d:99:1a:8f: ad:9c:28:5b:ec:9d:0b:a6:e5:6e:f0:a1:60:49:5d:3c: 39:e3:17:92:7e:80:a7:c9:ce:f8:51:86:34:36:77:a4: 5c:d3:2c:ed:90:99:3c:e3:eb:80:82:f1:0a:01:9a:ef: ab:38:38:73:82:82:48:9e:ce:d0:a7:4b:a9:51:b8:da: 2a:5d:70:3e:5c:2f:29:c2:1d:60:ef:f7:f9:95:a3:99: 09:06:4c:f6:0c:bf:c3:78:2b:a3:f5:f2:36:e9:b8:09: ab:08:d8:b6:b1:bc:02:c7:96:46:d2:5a:81:79:5d:d5: 14:1b:ae:17:9b:ae:95:a1:19:c4:c1:46:02:a2:b8:1b: 94:25:9f:75:fb:76:34:49:48:e4:a0:4c:01:7d:b1:f8: a1:0a:8a:72:59:70:e8:38:b0:0e:24:bc:d2:bc:eb:be: c0:0f:c0:c4:0f:c8:8f:39:e7:a5:ad:69:3d:ad:75:70: fa:5e:c7:8a:ad:74:1f:2d:9b:95:6e:9f:3b:94:bf:e0: 7c:02:a8:e1:77:1f:3a:86:15:f1:4f:99:3f:d6:03:3e: 99:93:38:e4:1c:59:43:3a:d5:1c:1d:a8:ab:bf:fe:3c Fingerprint (SHA-256): BB:6C:DF:A2:B9:BB:8D:9C:C7:AA:6E:44:77:BF:93:9E:D3:CE:A0:10:D1:C8:22:D9:DF:1E:12:F8:D3:F3:11:25 Fingerprint (SHA1): 4F:D7:D5:50:A0:FC:00:A7:4F:08:F7:16:C3:C3:2B:7F:3A:3B:B8:2C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1025: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191193 (0x433ed4d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:19 2025 Not After : Thu Nov 28 11:13:19 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:2c:95:bc:9c:2f:a2:1d:22:e4:9d:14:e6:51:0a:76: a8:02:48:e5:22:43:82:1e:75:ab:4f:1f:09:a7:1f:8b: c4:62:bf:0f:2c:dc:64:bc:b1:d3:7d:1e:64:14:cf:e7: 1b:dd:e3:4f:7d:fa:2b:d5:e7:b1:87:04:9d:d3:4e:36: 2e:dd:3e:c5:4a:24:ad:19:4d:9f:a7:e9:27:98:86:15: a8:c1:ea:18:d8:f8:9f:98:e5:57:c3:1b:ad:44:0f:40: a7:5c:2a:18:d7:50:27:b5:81:6d:5d:9e:01:2d:14:96: 22:d9:69:34:6d:c1:41:f8:b1:a7:b5:7a:b9:ce:da:76: be:d9:fd:99:6e:7f:c1:65:64:da:5c:df:98:b6:36:79: f9:51:ca:6a:62:6d:ce:19:33:37:7b:45:72:8e:c1:69: 5a:64:23:84:75:89:23:02:e0:15:30:04:62:04:08:df: 02:c3:7c:62:29:6f:2b:90:b0:c6:b7:67:4f:2e:9a:e2: 2c:62:c8:99:30:b5:08:a9:0b:0d:3f:cb:ab:07:8d:39: 8e:91:e6:a7:f3:a9:e4:6b:fc:f9:fa:fb:3b:3d:43:57: da:21:08:a4:de:c9:8f:a5:ae:84:05:a6:bc:d3:19:33: ea:b7:f1:f4:c5:65:02:2f:21:77:59:4b:67:54:f7:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:23:af:6b:4c:35:05:7b:ff:e7:51:78:71:fb:a1:58: 37:c8:28:ab:f5:3f:71:02:6c:74:3d:1e:f7:b3:9a:eb: ac:b1:76:9a:7b:a7:43:95:61:52:39:7b:2c:b1:96:97: 8d:0d:bb:32:f2:8b:bb:8d:60:72:4a:f1:01:5b:b6:fd: 27:63:e9:18:5b:1a:70:e1:50:2a:20:65:14:ca:30:4e: 47:d0:29:16:e2:02:7c:6b:de:27:8b:a4:ea:63:7c:2b: c6:5a:95:1e:36:e3:4f:ed:62:84:38:5f:14:64:93:a2: f8:f1:e1:2e:c9:40:77:13:40:30:c1:43:27:18:bd:af: bc:0c:b1:f5:f4:93:80:29:de:fc:51:8b:0b:81:30:bc: fb:95:11:7f:3d:23:56:e9:1c:ec:61:ba:06:c6:e7:c1: 1f:ce:69:30:e9:00:f1:cc:49:05:e2:2f:c5:93:66:11: 79:e4:d4:e7:e7:87:ae:f0:a9:0c:84:79:f3:fb:33:ef: c6:16:53:98:34:b5:43:32:00:91:a4:7e:54:c9:ea:b0: eb:86:c5:76:05:a0:54:cd:2f:1c:f9:66:67:33:29:7a: 52:8f:4d:2f:ca:37:46:33:b9:f5:8f:51:86:ef:89:ec: 8e:18:c4:36:c8:5c:3c:39:a6:4b:5c:c5:b7:ad:48:8f Fingerprint (SHA-256): D4:8B:4F:26:6B:61:78:C2:E9:2C:BE:53:C8:79:97:84:8F:DB:B3:32:11:19:2D:DE:E7:4A:68:ED:9E:B0:C3:3E Fingerprint (SHA1): 49:80:E5:94:DB:75:6C:03:CD:D2:C0:10:E7:9D:D8:13:3B:F7:94:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1027: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1028: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1029: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1030: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1031: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191198 (0x433ed4de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:13:23 2025 Not After : Thu Nov 28 11:13:23 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:09:92:72:56:39:a5:b7:d9:69:e9:a0:3f:55:62:f9: 38:6a:42:0b:f5:fc:70:11:ed:88:3c:77:20:aa:5d:cd: 27:e6:47:a6:25:30:9e:79:d6:99:32:a2:3a:b5:aa:61: 27:2e:0e:57:60:2f:5e:af:97:b8:4c:26:27:49:28:65: 1b:55:da:c5:ba:c1:26:94:ae:1c:38:2e:c1:5a:21:ea: c8:a6:b3:28:37:59:88:b9:e2:91:df:45:2c:45:fc:9e: 7e:40:d5:a1:52:b6:23:71:21:bc:4b:78:96:20:42:a7: db:df:5f:80:dc:af:82:06:5e:57:40:e0:d9:ba:82:8b: 03:b6:fa:7a:94:9e:e6:bc:27:bc:f7:d0:f5:c9:56:90: ca:04:fb:4f:f3:cd:fc:24:34:d8:37:5b:f0:e2:13:a6: bc:a9:b6:83:46:ef:1c:63:e9:25:8e:c2:f9:27:a8:5b: cf:f7:0a:9c:c4:62:b0:45:8f:93:bc:b2:80:d5:1b:57: c2:97:75:68:e8:94:7e:b2:6e:61:66:9a:34:14:25:dd: 48:b0:80:2a:ea:30:1d:3d:91:97:a5:20:3f:6b:f4:8d: 2b:e7:16:2d:62:cb:c5:bd:4f:e0:87:bf:e5:54:85:33: 2d:cf:f6:99:e0:ee:bb:d2:1e:4a:06:8b:f2:0d:3e:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:60:46:a0:6d:c6:ce:aa:5f:2c:6c:47:39:59:26:38: 58:94:7c:59:04:66:89:db:ae:0f:7e:45:5e:56:ba:e2: 88:ad:50:79:a4:b5:f8:29:f5:5a:ed:0d:95:bb:06:66: 4a:84:b3:ba:98:68:f1:9e:8d:a8:00:ad:6b:53:23:8d: c1:b3:c3:74:79:3a:15:ef:1f:93:a2:1e:84:58:15:6a: de:d7:8d:32:65:5e:1f:99:02:c0:b6:9d:33:c1:bf:71: eb:a8:0d:70:78:bd:7e:e3:56:32:8d:38:33:21:4c:1b: 91:31:be:dc:62:c2:74:c0:7f:f7:c6:08:31:ad:ac:78: 55:7a:b7:a7:e1:f5:07:f6:4d:5f:16:04:c2:c2:ba:a7: c5:71:f9:fe:8f:e1:96:83:2b:fb:f5:a1:52:c8:31:c3: e4:45:a3:1b:c4:35:ed:92:b0:10:5b:2f:37:ce:0c:b4: 9d:6f:73:46:ff:d6:92:ae:87:e3:17:14:1e:94:e0:a3: 20:0a:b0:bf:84:06:59:d3:2d:e1:1c:03:ed:53:26:af: cc:39:7a:0a:76:3e:83:0b:31:2c:9a:f8:cb:9f:25:82: 4b:d4:69:cd:67:21:bf:33:ef:3a:9a:55:49:ad:3c:30: 99:30:0c:37:07:ad:af:bb:b2:0d:b4:56:4f:bb:65:88 Fingerprint (SHA-256): 5A:63:24:33:5C:04:D7:6D:AC:FC:D7:CC:EC:7A:F9:46:4F:7C:74:98:41:1C:47:70:F9:BE:9D:5F:D4:4E:86:C1 Fingerprint (SHA1): E5:71:E2:D4:4B:52:14:13:48:6B:D1:D8:73:8F:E6:B9:52:51:53:2B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1032: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1033: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1034: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1035: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1036: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1037: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1038: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1039: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1040: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1041: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1042: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1043: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1044: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1045: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1046: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1047: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1048: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #1049: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1050: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1051: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1052: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1053: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1054: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1055: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1056: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1057: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2191009 at Fri Nov 28 19:13:28 CST 2025 kill -USR1 2191009 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2191009 killed at Fri Nov 28 19:13:28 CST 2025 httpserv starting at Fri Nov 28 19:13:28 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:13:28 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2203389 >/dev/null 2>/dev/null httpserv with PID 2203389 found at Fri Nov 28 19:13:28 CST 2025 httpserv with PID 2203389 started at Fri Nov 28 19:13:28 CST 2025 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1058: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1059: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191200 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1060: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1061: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1062: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191201 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1063: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1064: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1065: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1066: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191202 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1067: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1068: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191203 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1069: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1070: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1071: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1072: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1073: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128191204 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1074: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1075: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1076: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1077: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1078: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191201 (0x433ed4e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c3:b2:75:e5:26:4c:3f:4b:46:43:ca:1b:c4:a4:55: d2:f5:a8:5b:8f:21:7c:75:c3:0b:92:af:69:82:29:92: cd:ac:e0:6f:82:87:21:32:61:04:17:54:af:e6:42:1f: 31:37:03:8f:64:d9:91:bb:94:a3:e3:0a:45:ab:60:19: 3a:78:d1:50:81:cc:eb:5b:68:81:7f:6b:da:22:51:f2: ea:9f:13:1f:61:1a:c4:d4:df:54:0f:76:ac:09:35:08: 03:60:2d:33:de:56:20:73:d1:2d:db:da:37:af:f4:0b: d0:a1:be:2a:b8:fa:f4:1d:4e:09:d8:09:07:98:fa:cd: f0:11:8f:d4:26:27:9b:fe:40:12:7f:41:f4:78:db:24: 47:79:b0:ef:75:b9:24:dc:57:1a:c6:7c:7d:27:da:45: 06:44:9e:23:03:48:27:e4:b0:74:a2:22:9f:db:8b:a5: 18:08:27:7d:65:48:42:57:5b:43:0a:6a:57:03:59:81: 5a:07:9a:d0:ee:a3:7f:b7:87:88:7c:03:d7:ca:e1:8a: de:03:b0:c2:79:e2:7a:f8:26:98:c0:65:6c:b9:29:a8: c4:88:5e:98:f7:ec:fa:76:f2:62:e1:51:fa:36:74:51: 53:be:c6:7c:ac:a1:19:a4:c5:61:c0:cb:39:04:5b:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ad:75:0f:36:a9:42:f6:9f:02:27:a1:d0:d2:1b:97: 83:53:ee:4b:18:e3:cf:63:04:a3:cc:92:c0:68:7d:ac: da:cf:2c:2c:8f:2a:6d:c3:26:56:88:06:d3:56:e3:b5: 80:07:85:ac:db:f7:d0:e8:e5:56:8c:7c:07:f8:98:d8: 52:1d:8d:b9:34:e3:7d:e6:94:e5:d5:63:67:85:db:da: 56:38:8d:55:80:c1:65:55:91:68:fb:b5:b4:29:97:cd: 65:a1:42:ce:27:56:a0:a3:21:92:92:20:25:f4:d4:21: ec:f7:d4:bf:2d:94:69:60:c1:75:7f:9f:ae:1e:81:f8: f5:c9:59:2f:11:60:96:ef:6c:59:6e:60:7c:f3:ab:3f: b9:e8:69:e3:51:73:83:f0:20:0a:66:86:f8:24:55:82: 07:e8:45:82:59:d4:23:79:27:86:43:2f:dc:ed:f2:5c: e3:24:b3:8c:48:4f:50:1b:a7:20:18:f2:6e:28:91:21: 9c:58:0b:a3:73:fd:e8:2b:50:c2:e7:53:a1:53:3a:63: 9c:4b:a5:9a:da:d8:0e:02:d7:2f:a7:df:14:95:fb:3f: 57:3f:c6:fc:49:3b:30:d7:07:38:a7:da:0b:e2:73:d7: b5:77:54:96:24:fa:3b:a0:52:1e:8b:96:f3:57:2b:10 Fingerprint (SHA-256): 2F:C7:A5:13:C7:9A:EB:26:CD:0D:E7:72:DF:7F:C4:DC:37:40:EE:BA:C5:BF:A4:D0:A0:04:AE:3C:DC:BA:37:3E Fingerprint (SHA1): 08:7F:99:66:B2:BD:34:C1:A5:83:27:D8:62:BD:E5:14:C6:E6:74:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1079: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191200 (0x433ed4e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:1f:e1:b3:30:3f:cd:cc:f5:95:94:51:d2:16:06:01: 47:a1:3a:6c:93:4b:15:cd:ef:e4:55:61:38:70:31:0b: 7a:f4:2d:c4:4a:49:b7:d4:a0:34:b4:a5:a2:d1:f7:9e: ed:ac:84:29:64:13:f6:4c:19:c2:04:23:04:aa:f6:5c: de:92:8c:b9:dc:bb:9c:d2:9a:cc:13:8c:41:de:73:73: a1:9a:71:66:22:ad:1f:65:d9:58:3b:10:5c:00:ed:0c: ef:a8:47:66:69:81:09:b7:d9:f1:d9:db:16:3c:d3:c9: c8:97:7e:d9:1d:e0:67:2f:0d:a2:53:02:5a:8b:b2:6d: 92:10:94:bc:fc:0f:d3:9c:83:82:99:43:e6:01:21:40: 51:2d:c6:9a:66:f3:a9:38:18:af:28:66:1c:97:d3:37: af:a6:57:a4:6b:78:c5:95:24:87:e9:a5:75:b1:be:f6: 37:d1:a2:bc:27:69:d6:85:c9:df:8c:61:9b:7d:9d:1a: cd:45:2b:f2:b9:3d:66:5e:26:23:a3:17:4d:f6:0d:11: 82:66:12:ba:e8:65:7a:4b:c0:ed:f2:dd:aa:26:97:61: da:e1:88:18:d4:14:5f:2b:c4:cb:c4:10:93:37:49:73: 32:56:72:5d:d3:a7:69:71:27:fe:f9:49:41:1a:b5:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b8:a3:93:e8:3b:72:89:65:0e:94:74:78:70:41:e7: 1a:1c:87:48:ac:56:10:f6:f2:00:09:ae:e7:de:5e:ac: 4a:93:b4:3a:cc:3c:7f:48:6e:06:cc:98:eb:57:19:13: 38:ff:b5:7e:4f:f5:e2:30:1c:69:43:f6:c7:12:79:4c: 6e:4a:6c:0e:64:25:46:d2:23:43:63:b2:ed:74:7f:ba: 03:b3:b3:45:8d:06:f1:c0:0f:ae:00:e5:b9:da:a3:bc: 46:02:73:09:89:5b:79:b6:4f:a9:96:9f:b1:02:d9:ba: fb:30:c2:be:bb:82:87:11:d0:09:2d:6b:4e:63:b9:90: ff:04:db:dd:9d:1f:27:5f:df:79:a0:9e:c1:62:7a:05: 0a:1e:5f:10:bb:5f:c1:0b:83:87:36:e1:f8:fc:3a:66: cc:61:12:58:a8:7d:f1:c3:5d:6c:4f:9e:3e:e7:f0:0b: 50:e6:a0:5a:b9:b7:a7:1f:88:bc:75:96:4f:69:0e:c3: 55:41:72:ac:3d:51:56:7e:5c:72:39:24:54:5e:ba:eb: 38:1e:98:92:3a:49:66:29:0b:7c:83:a0:fa:99:2a:e6: 12:dd:81:6b:31:4d:43:ee:13:5c:fd:6a:77:a0:77:05: fc:78:24:4e:aa:e2:15:7b:09:d3:57:fa:ca:3e:cf:b6 Fingerprint (SHA-256): 53:D8:37:5A:53:1F:A9:71:48:F1:6C:A3:01:10:9B:5C:7E:92:4B:AF:99:88:58:12:EE:08:71:E1:2C:87:5E:6E Fingerprint (SHA1): 72:F2:35:42:FD:8A:E1:9D:DB:0D:8A:9A:4C:2B:BD:85:88:17:85:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1080: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1081: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1082: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1083: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191200 (0x433ed4e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:1f:e1:b3:30:3f:cd:cc:f5:95:94:51:d2:16:06:01: 47:a1:3a:6c:93:4b:15:cd:ef:e4:55:61:38:70:31:0b: 7a:f4:2d:c4:4a:49:b7:d4:a0:34:b4:a5:a2:d1:f7:9e: ed:ac:84:29:64:13:f6:4c:19:c2:04:23:04:aa:f6:5c: de:92:8c:b9:dc:bb:9c:d2:9a:cc:13:8c:41:de:73:73: a1:9a:71:66:22:ad:1f:65:d9:58:3b:10:5c:00:ed:0c: ef:a8:47:66:69:81:09:b7:d9:f1:d9:db:16:3c:d3:c9: c8:97:7e:d9:1d:e0:67:2f:0d:a2:53:02:5a:8b:b2:6d: 92:10:94:bc:fc:0f:d3:9c:83:82:99:43:e6:01:21:40: 51:2d:c6:9a:66:f3:a9:38:18:af:28:66:1c:97:d3:37: af:a6:57:a4:6b:78:c5:95:24:87:e9:a5:75:b1:be:f6: 37:d1:a2:bc:27:69:d6:85:c9:df:8c:61:9b:7d:9d:1a: cd:45:2b:f2:b9:3d:66:5e:26:23:a3:17:4d:f6:0d:11: 82:66:12:ba:e8:65:7a:4b:c0:ed:f2:dd:aa:26:97:61: da:e1:88:18:d4:14:5f:2b:c4:cb:c4:10:93:37:49:73: 32:56:72:5d:d3:a7:69:71:27:fe:f9:49:41:1a:b5:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b8:a3:93:e8:3b:72:89:65:0e:94:74:78:70:41:e7: 1a:1c:87:48:ac:56:10:f6:f2:00:09:ae:e7:de:5e:ac: 4a:93:b4:3a:cc:3c:7f:48:6e:06:cc:98:eb:57:19:13: 38:ff:b5:7e:4f:f5:e2:30:1c:69:43:f6:c7:12:79:4c: 6e:4a:6c:0e:64:25:46:d2:23:43:63:b2:ed:74:7f:ba: 03:b3:b3:45:8d:06:f1:c0:0f:ae:00:e5:b9:da:a3:bc: 46:02:73:09:89:5b:79:b6:4f:a9:96:9f:b1:02:d9:ba: fb:30:c2:be:bb:82:87:11:d0:09:2d:6b:4e:63:b9:90: ff:04:db:dd:9d:1f:27:5f:df:79:a0:9e:c1:62:7a:05: 0a:1e:5f:10:bb:5f:c1:0b:83:87:36:e1:f8:fc:3a:66: cc:61:12:58:a8:7d:f1:c3:5d:6c:4f:9e:3e:e7:f0:0b: 50:e6:a0:5a:b9:b7:a7:1f:88:bc:75:96:4f:69:0e:c3: 55:41:72:ac:3d:51:56:7e:5c:72:39:24:54:5e:ba:eb: 38:1e:98:92:3a:49:66:29:0b:7c:83:a0:fa:99:2a:e6: 12:dd:81:6b:31:4d:43:ee:13:5c:fd:6a:77:a0:77:05: fc:78:24:4e:aa:e2:15:7b:09:d3:57:fa:ca:3e:cf:b6 Fingerprint (SHA-256): 53:D8:37:5A:53:1F:A9:71:48:F1:6C:A3:01:10:9B:5C:7E:92:4B:AF:99:88:58:12:EE:08:71:E1:2C:87:5E:6E Fingerprint (SHA1): 72:F2:35:42:FD:8A:E1:9D:DB:0D:8A:9A:4C:2B:BD:85:88:17:85:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1084: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191201 (0x433ed4e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c3:b2:75:e5:26:4c:3f:4b:46:43:ca:1b:c4:a4:55: d2:f5:a8:5b:8f:21:7c:75:c3:0b:92:af:69:82:29:92: cd:ac:e0:6f:82:87:21:32:61:04:17:54:af:e6:42:1f: 31:37:03:8f:64:d9:91:bb:94:a3:e3:0a:45:ab:60:19: 3a:78:d1:50:81:cc:eb:5b:68:81:7f:6b:da:22:51:f2: ea:9f:13:1f:61:1a:c4:d4:df:54:0f:76:ac:09:35:08: 03:60:2d:33:de:56:20:73:d1:2d:db:da:37:af:f4:0b: d0:a1:be:2a:b8:fa:f4:1d:4e:09:d8:09:07:98:fa:cd: f0:11:8f:d4:26:27:9b:fe:40:12:7f:41:f4:78:db:24: 47:79:b0:ef:75:b9:24:dc:57:1a:c6:7c:7d:27:da:45: 06:44:9e:23:03:48:27:e4:b0:74:a2:22:9f:db:8b:a5: 18:08:27:7d:65:48:42:57:5b:43:0a:6a:57:03:59:81: 5a:07:9a:d0:ee:a3:7f:b7:87:88:7c:03:d7:ca:e1:8a: de:03:b0:c2:79:e2:7a:f8:26:98:c0:65:6c:b9:29:a8: c4:88:5e:98:f7:ec:fa:76:f2:62:e1:51:fa:36:74:51: 53:be:c6:7c:ac:a1:19:a4:c5:61:c0:cb:39:04:5b:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ad:75:0f:36:a9:42:f6:9f:02:27:a1:d0:d2:1b:97: 83:53:ee:4b:18:e3:cf:63:04:a3:cc:92:c0:68:7d:ac: da:cf:2c:2c:8f:2a:6d:c3:26:56:88:06:d3:56:e3:b5: 80:07:85:ac:db:f7:d0:e8:e5:56:8c:7c:07:f8:98:d8: 52:1d:8d:b9:34:e3:7d:e6:94:e5:d5:63:67:85:db:da: 56:38:8d:55:80:c1:65:55:91:68:fb:b5:b4:29:97:cd: 65:a1:42:ce:27:56:a0:a3:21:92:92:20:25:f4:d4:21: ec:f7:d4:bf:2d:94:69:60:c1:75:7f:9f:ae:1e:81:f8: f5:c9:59:2f:11:60:96:ef:6c:59:6e:60:7c:f3:ab:3f: b9:e8:69:e3:51:73:83:f0:20:0a:66:86:f8:24:55:82: 07:e8:45:82:59:d4:23:79:27:86:43:2f:dc:ed:f2:5c: e3:24:b3:8c:48:4f:50:1b:a7:20:18:f2:6e:28:91:21: 9c:58:0b:a3:73:fd:e8:2b:50:c2:e7:53:a1:53:3a:63: 9c:4b:a5:9a:da:d8:0e:02:d7:2f:a7:df:14:95:fb:3f: 57:3f:c6:fc:49:3b:30:d7:07:38:a7:da:0b:e2:73:d7: b5:77:54:96:24:fa:3b:a0:52:1e:8b:96:f3:57:2b:10 Fingerprint (SHA-256): 2F:C7:A5:13:C7:9A:EB:26:CD:0D:E7:72:DF:7F:C4:DC:37:40:EE:BA:C5:BF:A4:D0:A0:04:AE:3C:DC:BA:37:3E Fingerprint (SHA1): 08:7F:99:66:B2:BD:34:C1:A5:83:27:D8:62:BD:E5:14:C6:E6:74:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1085: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1086: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1087: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1088: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1089: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1090: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191201 (0x433ed4e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c3:b2:75:e5:26:4c:3f:4b:46:43:ca:1b:c4:a4:55: d2:f5:a8:5b:8f:21:7c:75:c3:0b:92:af:69:82:29:92: cd:ac:e0:6f:82:87:21:32:61:04:17:54:af:e6:42:1f: 31:37:03:8f:64:d9:91:bb:94:a3:e3:0a:45:ab:60:19: 3a:78:d1:50:81:cc:eb:5b:68:81:7f:6b:da:22:51:f2: ea:9f:13:1f:61:1a:c4:d4:df:54:0f:76:ac:09:35:08: 03:60:2d:33:de:56:20:73:d1:2d:db:da:37:af:f4:0b: d0:a1:be:2a:b8:fa:f4:1d:4e:09:d8:09:07:98:fa:cd: f0:11:8f:d4:26:27:9b:fe:40:12:7f:41:f4:78:db:24: 47:79:b0:ef:75:b9:24:dc:57:1a:c6:7c:7d:27:da:45: 06:44:9e:23:03:48:27:e4:b0:74:a2:22:9f:db:8b:a5: 18:08:27:7d:65:48:42:57:5b:43:0a:6a:57:03:59:81: 5a:07:9a:d0:ee:a3:7f:b7:87:88:7c:03:d7:ca:e1:8a: de:03:b0:c2:79:e2:7a:f8:26:98:c0:65:6c:b9:29:a8: c4:88:5e:98:f7:ec:fa:76:f2:62:e1:51:fa:36:74:51: 53:be:c6:7c:ac:a1:19:a4:c5:61:c0:cb:39:04:5b:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ad:75:0f:36:a9:42:f6:9f:02:27:a1:d0:d2:1b:97: 83:53:ee:4b:18:e3:cf:63:04:a3:cc:92:c0:68:7d:ac: da:cf:2c:2c:8f:2a:6d:c3:26:56:88:06:d3:56:e3:b5: 80:07:85:ac:db:f7:d0:e8:e5:56:8c:7c:07:f8:98:d8: 52:1d:8d:b9:34:e3:7d:e6:94:e5:d5:63:67:85:db:da: 56:38:8d:55:80:c1:65:55:91:68:fb:b5:b4:29:97:cd: 65:a1:42:ce:27:56:a0:a3:21:92:92:20:25:f4:d4:21: ec:f7:d4:bf:2d:94:69:60:c1:75:7f:9f:ae:1e:81:f8: f5:c9:59:2f:11:60:96:ef:6c:59:6e:60:7c:f3:ab:3f: b9:e8:69:e3:51:73:83:f0:20:0a:66:86:f8:24:55:82: 07:e8:45:82:59:d4:23:79:27:86:43:2f:dc:ed:f2:5c: e3:24:b3:8c:48:4f:50:1b:a7:20:18:f2:6e:28:91:21: 9c:58:0b:a3:73:fd:e8:2b:50:c2:e7:53:a1:53:3a:63: 9c:4b:a5:9a:da:d8:0e:02:d7:2f:a7:df:14:95:fb:3f: 57:3f:c6:fc:49:3b:30:d7:07:38:a7:da:0b:e2:73:d7: b5:77:54:96:24:fa:3b:a0:52:1e:8b:96:f3:57:2b:10 Fingerprint (SHA-256): 2F:C7:A5:13:C7:9A:EB:26:CD:0D:E7:72:DF:7F:C4:DC:37:40:EE:BA:C5:BF:A4:D0:A0:04:AE:3C:DC:BA:37:3E Fingerprint (SHA1): 08:7F:99:66:B2:BD:34:C1:A5:83:27:D8:62:BD:E5:14:C6:E6:74:61 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1091: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191201 (0x433ed4e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c3:b2:75:e5:26:4c:3f:4b:46:43:ca:1b:c4:a4:55: d2:f5:a8:5b:8f:21:7c:75:c3:0b:92:af:69:82:29:92: cd:ac:e0:6f:82:87:21:32:61:04:17:54:af:e6:42:1f: 31:37:03:8f:64:d9:91:bb:94:a3:e3:0a:45:ab:60:19: 3a:78:d1:50:81:cc:eb:5b:68:81:7f:6b:da:22:51:f2: ea:9f:13:1f:61:1a:c4:d4:df:54:0f:76:ac:09:35:08: 03:60:2d:33:de:56:20:73:d1:2d:db:da:37:af:f4:0b: d0:a1:be:2a:b8:fa:f4:1d:4e:09:d8:09:07:98:fa:cd: f0:11:8f:d4:26:27:9b:fe:40:12:7f:41:f4:78:db:24: 47:79:b0:ef:75:b9:24:dc:57:1a:c6:7c:7d:27:da:45: 06:44:9e:23:03:48:27:e4:b0:74:a2:22:9f:db:8b:a5: 18:08:27:7d:65:48:42:57:5b:43:0a:6a:57:03:59:81: 5a:07:9a:d0:ee:a3:7f:b7:87:88:7c:03:d7:ca:e1:8a: de:03:b0:c2:79:e2:7a:f8:26:98:c0:65:6c:b9:29:a8: c4:88:5e:98:f7:ec:fa:76:f2:62:e1:51:fa:36:74:51: 53:be:c6:7c:ac:a1:19:a4:c5:61:c0:cb:39:04:5b:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ad:75:0f:36:a9:42:f6:9f:02:27:a1:d0:d2:1b:97: 83:53:ee:4b:18:e3:cf:63:04:a3:cc:92:c0:68:7d:ac: da:cf:2c:2c:8f:2a:6d:c3:26:56:88:06:d3:56:e3:b5: 80:07:85:ac:db:f7:d0:e8:e5:56:8c:7c:07:f8:98:d8: 52:1d:8d:b9:34:e3:7d:e6:94:e5:d5:63:67:85:db:da: 56:38:8d:55:80:c1:65:55:91:68:fb:b5:b4:29:97:cd: 65:a1:42:ce:27:56:a0:a3:21:92:92:20:25:f4:d4:21: ec:f7:d4:bf:2d:94:69:60:c1:75:7f:9f:ae:1e:81:f8: f5:c9:59:2f:11:60:96:ef:6c:59:6e:60:7c:f3:ab:3f: b9:e8:69:e3:51:73:83:f0:20:0a:66:86:f8:24:55:82: 07:e8:45:82:59:d4:23:79:27:86:43:2f:dc:ed:f2:5c: e3:24:b3:8c:48:4f:50:1b:a7:20:18:f2:6e:28:91:21: 9c:58:0b:a3:73:fd:e8:2b:50:c2:e7:53:a1:53:3a:63: 9c:4b:a5:9a:da:d8:0e:02:d7:2f:a7:df:14:95:fb:3f: 57:3f:c6:fc:49:3b:30:d7:07:38:a7:da:0b:e2:73:d7: b5:77:54:96:24:fa:3b:a0:52:1e:8b:96:f3:57:2b:10 Fingerprint (SHA-256): 2F:C7:A5:13:C7:9A:EB:26:CD:0D:E7:72:DF:7F:C4:DC:37:40:EE:BA:C5:BF:A4:D0:A0:04:AE:3C:DC:BA:37:3E Fingerprint (SHA1): 08:7F:99:66:B2:BD:34:C1:A5:83:27:D8:62:BD:E5:14:C6:E6:74:61 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1092: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1093: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1094: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1095: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1096: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1097: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191200 (0x433ed4e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:1f:e1:b3:30:3f:cd:cc:f5:95:94:51:d2:16:06:01: 47:a1:3a:6c:93:4b:15:cd:ef:e4:55:61:38:70:31:0b: 7a:f4:2d:c4:4a:49:b7:d4:a0:34:b4:a5:a2:d1:f7:9e: ed:ac:84:29:64:13:f6:4c:19:c2:04:23:04:aa:f6:5c: de:92:8c:b9:dc:bb:9c:d2:9a:cc:13:8c:41:de:73:73: a1:9a:71:66:22:ad:1f:65:d9:58:3b:10:5c:00:ed:0c: ef:a8:47:66:69:81:09:b7:d9:f1:d9:db:16:3c:d3:c9: c8:97:7e:d9:1d:e0:67:2f:0d:a2:53:02:5a:8b:b2:6d: 92:10:94:bc:fc:0f:d3:9c:83:82:99:43:e6:01:21:40: 51:2d:c6:9a:66:f3:a9:38:18:af:28:66:1c:97:d3:37: af:a6:57:a4:6b:78:c5:95:24:87:e9:a5:75:b1:be:f6: 37:d1:a2:bc:27:69:d6:85:c9:df:8c:61:9b:7d:9d:1a: cd:45:2b:f2:b9:3d:66:5e:26:23:a3:17:4d:f6:0d:11: 82:66:12:ba:e8:65:7a:4b:c0:ed:f2:dd:aa:26:97:61: da:e1:88:18:d4:14:5f:2b:c4:cb:c4:10:93:37:49:73: 32:56:72:5d:d3:a7:69:71:27:fe:f9:49:41:1a:b5:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b8:a3:93:e8:3b:72:89:65:0e:94:74:78:70:41:e7: 1a:1c:87:48:ac:56:10:f6:f2:00:09:ae:e7:de:5e:ac: 4a:93:b4:3a:cc:3c:7f:48:6e:06:cc:98:eb:57:19:13: 38:ff:b5:7e:4f:f5:e2:30:1c:69:43:f6:c7:12:79:4c: 6e:4a:6c:0e:64:25:46:d2:23:43:63:b2:ed:74:7f:ba: 03:b3:b3:45:8d:06:f1:c0:0f:ae:00:e5:b9:da:a3:bc: 46:02:73:09:89:5b:79:b6:4f:a9:96:9f:b1:02:d9:ba: fb:30:c2:be:bb:82:87:11:d0:09:2d:6b:4e:63:b9:90: ff:04:db:dd:9d:1f:27:5f:df:79:a0:9e:c1:62:7a:05: 0a:1e:5f:10:bb:5f:c1:0b:83:87:36:e1:f8:fc:3a:66: cc:61:12:58:a8:7d:f1:c3:5d:6c:4f:9e:3e:e7:f0:0b: 50:e6:a0:5a:b9:b7:a7:1f:88:bc:75:96:4f:69:0e:c3: 55:41:72:ac:3d:51:56:7e:5c:72:39:24:54:5e:ba:eb: 38:1e:98:92:3a:49:66:29:0b:7c:83:a0:fa:99:2a:e6: 12:dd:81:6b:31:4d:43:ee:13:5c:fd:6a:77:a0:77:05: fc:78:24:4e:aa:e2:15:7b:09:d3:57:fa:ca:3e:cf:b6 Fingerprint (SHA-256): 53:D8:37:5A:53:1F:A9:71:48:F1:6C:A3:01:10:9B:5C:7E:92:4B:AF:99:88:58:12:EE:08:71:E1:2C:87:5E:6E Fingerprint (SHA1): 72:F2:35:42:FD:8A:E1:9D:DB:0D:8A:9A:4C:2B:BD:85:88:17:85:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1098: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191200 (0x433ed4e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:13:28 2025 Not After : Thu Nov 28 11:13:28 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:1f:e1:b3:30:3f:cd:cc:f5:95:94:51:d2:16:06:01: 47:a1:3a:6c:93:4b:15:cd:ef:e4:55:61:38:70:31:0b: 7a:f4:2d:c4:4a:49:b7:d4:a0:34:b4:a5:a2:d1:f7:9e: ed:ac:84:29:64:13:f6:4c:19:c2:04:23:04:aa:f6:5c: de:92:8c:b9:dc:bb:9c:d2:9a:cc:13:8c:41:de:73:73: a1:9a:71:66:22:ad:1f:65:d9:58:3b:10:5c:00:ed:0c: ef:a8:47:66:69:81:09:b7:d9:f1:d9:db:16:3c:d3:c9: c8:97:7e:d9:1d:e0:67:2f:0d:a2:53:02:5a:8b:b2:6d: 92:10:94:bc:fc:0f:d3:9c:83:82:99:43:e6:01:21:40: 51:2d:c6:9a:66:f3:a9:38:18:af:28:66:1c:97:d3:37: af:a6:57:a4:6b:78:c5:95:24:87:e9:a5:75:b1:be:f6: 37:d1:a2:bc:27:69:d6:85:c9:df:8c:61:9b:7d:9d:1a: cd:45:2b:f2:b9:3d:66:5e:26:23:a3:17:4d:f6:0d:11: 82:66:12:ba:e8:65:7a:4b:c0:ed:f2:dd:aa:26:97:61: da:e1:88:18:d4:14:5f:2b:c4:cb:c4:10:93:37:49:73: 32:56:72:5d:d3:a7:69:71:27:fe:f9:49:41:1a:b5:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b8:a3:93:e8:3b:72:89:65:0e:94:74:78:70:41:e7: 1a:1c:87:48:ac:56:10:f6:f2:00:09:ae:e7:de:5e:ac: 4a:93:b4:3a:cc:3c:7f:48:6e:06:cc:98:eb:57:19:13: 38:ff:b5:7e:4f:f5:e2:30:1c:69:43:f6:c7:12:79:4c: 6e:4a:6c:0e:64:25:46:d2:23:43:63:b2:ed:74:7f:ba: 03:b3:b3:45:8d:06:f1:c0:0f:ae:00:e5:b9:da:a3:bc: 46:02:73:09:89:5b:79:b6:4f:a9:96:9f:b1:02:d9:ba: fb:30:c2:be:bb:82:87:11:d0:09:2d:6b:4e:63:b9:90: ff:04:db:dd:9d:1f:27:5f:df:79:a0:9e:c1:62:7a:05: 0a:1e:5f:10:bb:5f:c1:0b:83:87:36:e1:f8:fc:3a:66: cc:61:12:58:a8:7d:f1:c3:5d:6c:4f:9e:3e:e7:f0:0b: 50:e6:a0:5a:b9:b7:a7:1f:88:bc:75:96:4f:69:0e:c3: 55:41:72:ac:3d:51:56:7e:5c:72:39:24:54:5e:ba:eb: 38:1e:98:92:3a:49:66:29:0b:7c:83:a0:fa:99:2a:e6: 12:dd:81:6b:31:4d:43:ee:13:5c:fd:6a:77:a0:77:05: fc:78:24:4e:aa:e2:15:7b:09:d3:57:fa:ca:3e:cf:b6 Fingerprint (SHA-256): 53:D8:37:5A:53:1F:A9:71:48:F1:6C:A3:01:10:9B:5C:7E:92:4B:AF:99:88:58:12:EE:08:71:E1:2C:87:5E:6E Fingerprint (SHA1): 72:F2:35:42:FD:8A:E1:9D:DB:0D:8A:9A:4C:2B:BD:85:88:17:85:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1099: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1100: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191205 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1101: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1102: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1103: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191206 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1104: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1105: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1106: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191207 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1107: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1108: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1109: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191208 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1110: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1111: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1112: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191209 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1113: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1114: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1115: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191210 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1116: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1117: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1118: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191211 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1119: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1120: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1121: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191212 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1122: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1123: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1124: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191213 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1125: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1126: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1127: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1128: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128191214 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1129: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1130: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128191215 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1131: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1132: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128191216 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1133: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1134: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1135: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1136: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1137: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128191217 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1138: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1139: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128191218 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1140: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1141: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128191219 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1142: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1143: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1144: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1145: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1146: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128191220 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1147: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1148: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128191221 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1149: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1150: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128191222 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1151: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1152: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1153: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1154: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1155: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128191223 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1156: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1157: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128191224 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1158: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1159: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128191225 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1160: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1161: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1162: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1163: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128191226 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1165: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1167: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1168: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191227 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1169: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1170: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191205 (0x433ed4e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:13:32 2025 Not After : Thu Nov 28 11:13:32 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:6a:26:c0:ab:8d:e9:5c:da:d2:5b:aa:d4:b3:cd:26: 31:71:c8:dd:c4:3d:28:6f:d2:37:c4:57:f8:27:dd:8a: 4d:78:92:4b:9e:11:33:d2:4c:b4:a4:aa:6e:df:ee:93: f5:aa:3c:07:f1:23:6b:21:08:be:f7:6b:43:04:ec:b2: 90:a5:5d:71:1c:b8:46:09:03:dc:40:8b:41:e3:c0:0d: d1:b7:4c:1b:75:3b:19:64:6a:d7:b1:1a:e6:30:c6:14: 46:2c:52:bb:de:d3:79:a2:33:98:ca:eb:2d:b5:5d:14: b0:71:ec:db:67:2a:87:84:e4:9a:d4:16:6c:bc:f1:7b: cf:d5:67:7f:55:a0:81:bb:48:84:7a:ba:dc:d9:36:c4: bf:21:b7:4c:ab:f0:da:48:2b:13:cc:03:40:4d:b1:e4: bf:79:19:41:bb:a1:e7:98:b4:68:98:a1:70:e5:71:d7: 65:d1:37:d1:b3:da:65:60:87:26:ed:10:26:d2:54:68: b7:92:fe:89:d5:9e:c8:6b:83:97:4f:91:93:4c:fd:b9: b5:2f:29:ff:cf:39:5c:7c:1e:30:ad:94:c2:fc:ea:52: 27:61:c1:0c:85:63:a2:93:ae:3a:8d:d5:24:9f:54:5c: d8:8f:02:a2:d2:11:ee:84:a4:cb:a2:d5:72:30:19:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:78:41:a8:45:42:17:65:8a:dd:00:19:9c:14:3a:38: 25:7b:1b:7f:9d:32:2d:0b:ac:9f:be:61:25:4a:07:d3: ae:e1:20:b7:5f:0f:03:52:b4:56:78:f4:95:7c:ba:d8: b5:0d:ee:3e:7c:ae:f2:7f:78:eb:32:9f:f3:de:84:32: ac:3e:09:0a:cb:79:c2:91:49:d0:b9:9d:9e:91:1a:d6: ab:95:a4:ab:12:e0:6e:d5:3c:4e:4a:d7:bb:b2:d0:6b: 9b:30:98:ff:30:1e:6b:e2:23:d9:9c:43:ed:00:ec:95: 6d:e9:36:a0:3a:7a:fe:7f:ff:c7:02:19:bf:2b:96:0b: e1:eb:2c:18:66:a8:1e:d3:70:a2:7d:05:0f:2b:a1:a7: f8:b8:44:f0:a6:c1:70:35:7f:57:19:a2:72:64:f2:a9: 20:a6:28:f5:dd:10:47:51:cc:ad:07:0f:04:40:7f:68: df:14:79:e4:0d:c1:ba:2e:41:45:5a:0b:66:ad:72:e9: 59:23:be:c3:d1:b0:27:a7:08:d5:15:67:94:a9:23:37: cc:bb:fe:c9:50:1b:a6:e6:fd:93:38:18:39:a8:4a:4e: 69:fe:99:26:36:46:b7:4a:60:87:66:4f:f6:93:a9:cf: 45:ba:70:35:6d:60:e3:0e:5a:e1:aa:ea:fb:7a:22:a8 Fingerprint (SHA-256): B6:8F:32:0C:09:80:C8:61:D0:7E:0D:F7:97:41:7E:13:B2:6E:0B:0E:E5:54:8C:60:CC:26:3F:33:0D:D9:1D:AC Fingerprint (SHA1): 6D:45:76:4F:70:74:CD:AE:00:34:99:9A:B8:2F:44:3E:FA:7B:2C:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1171: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191206 (0x433ed4e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:13:33 2025 Not After : Thu Nov 28 11:13:33 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:3c:06:6f:d0:18:17:cd:a7:14:00:26:90:53:d1:87: 2a:cd:63:1b:1d:65:67:4a:7e:ba:94:5f:68:6a:b5:7a: 89:dd:2a:5a:af:95:bf:9a:48:4d:4d:bd:45:db:a0:b2: 23:62:59:1b:b0:9b:6e:f5:f2:6c:e4:25:32:5e:aa:39: f9:e4:61:73:18:17:13:9e:0f:2d:b0:cb:3c:52:8f:96: 73:31:36:a0:cb:bf:1b:6b:84:4a:81:13:61:c9:28:51: cf:93:33:9d:c6:bb:44:5e:d9:3f:58:59:3f:36:a1:82: af:23:21:07:4e:11:f7:cf:10:89:eb:09:13:56:43:46: 23:e5:78:5c:51:49:0d:e5:4e:20:a3:ca:f4:ed:9e:f0: 20:1d:6a:72:af:74:cb:38:ec:92:14:b1:90:1a:7c:d7: 5d:b5:95:fe:29:c4:45:60:1b:56:57:b5:d0:fb:46:1a: 88:6d:79:b6:74:ed:29:39:73:04:de:8f:41:25:1c:50: 10:43:26:82:d0:e3:83:ce:46:28:a8:f2:98:c6:4c:64: 81:51:9d:89:31:28:fa:e7:e7:2c:1d:e9:39:6e:65:3e: 0d:0d:85:e1:ab:2d:e7:64:df:da:41:25:dd:ac:2f:5b: 5a:cd:ff:ef:70:ac:72:d1:cb:86:34:c7:82:c0:63:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:55:a2:d1:ef:1c:9f:34:3d:77:0f:8c:85:15:a5:27: 5a:1a:2c:d1:21:eb:dd:79:e8:49:d7:87:4d:c6:f7:2e: 3c:46:5e:da:8d:0f:0d:35:a4:43:32:50:c6:c2:88:25: 37:a0:07:21:02:12:56:a1:f8:ef:68:f7:b5:60:39:ec: 2e:ef:96:18:3d:7a:11:65:9e:fa:49:79:98:b7:54:f5: 24:4d:2e:84:a9:51:7e:9b:aa:8d:ac:cf:37:e6:1f:4a: 59:7e:af:cc:72:29:f7:75:bc:c3:4d:cb:39:a8:4e:bf: 37:de:a6:01:05:1d:8a:d3:7d:ed:d2:1b:f4:eb:5a:80: b2:af:f9:1a:14:3e:72:83:7a:02:e6:c8:49:5c:fc:e7: c2:aa:fa:a2:5c:4d:db:fe:88:56:49:7f:70:bc:92:70: cd:ad:7e:df:2f:86:6c:7f:cc:73:1b:e3:e5:74:c6:2d: c8:f7:21:96:68:31:c8:f1:80:9d:e8:23:c2:fa:05:6d: 9d:d4:20:72:71:25:df:a6:4c:a5:a8:0f:d2:26:73:d7: 77:80:11:b3:96:22:47:12:4b:2a:fb:19:12:1a:14:2e: d6:77:f2:d9:82:81:e5:83:23:57:9d:20:b7:38:47:19: 0a:9b:ba:68:bb:7e:f2:b7:45:0c:2c:47:93:7d:fc:c9 Fingerprint (SHA-256): CF:8A:86:CE:B3:52:7D:AD:33:C2:29:59:B3:BA:AC:A9:08:22:88:F1:A7:DE:3C:A9:81:83:68:A0:CD:B2:49:59 Fingerprint (SHA1): 85:46:7A:E5:8D:EE:80:CB:C6:5E:44:6C:9A:BE:A4:A2:A8:EF:F1:BC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1172: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191207 (0x433ed4e7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:13:34 2025 Not After : Thu Nov 28 11:13:34 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:69:47:0e:99:04:00:67:72:4f:84:9f:ba:7e:fa:07: df:78:5c:44:b0:d6:b5:de:c0:e1:29:7c:4b:3d:bf:c5: 99:5f:9c:a4:27:bf:58:b6:a1:5a:59:e8:99:90:26:40: 25:cf:2f:15:f5:c0:ae:af:53:34:95:7a:e9:24:ce:8c: 69:fe:c6:fb:84:f6:cf:c3:85:e3:ec:85:eb:90:ac:a6: 50:7e:3e:36:fc:9f:5b:d7:49:53:54:f2:48:56:6d:ac: 75:56:c4:c0:8c:97:ba:b7:f8:6e:c4:b8:44:4c:1a:8c: 8c:ed:af:aa:ea:a2:31:5b:a3:9d:bc:ba:32:55:07:56: 51:3b:57:88:ac:68:b2:0d:11:92:74:9a:c5:f4:25:c0: 65:16:72:c1:58:a7:c1:8c:03:3c:fc:3e:b1:b0:f1:a0: df:f3:57:09:96:1f:ad:2e:ce:06:ec:d9:cc:43:a3:e7: 9b:45:7d:85:de:14:7b:72:ca:21:e0:c2:3d:6c:67:13: aa:82:1f:69:bb:1c:9f:05:4f:35:96:f9:2b:4c:be:c4: f6:ff:27:67:75:cf:03:bc:3b:03:82:d9:3e:13:b9:9d: e6:e4:22:65:68:be:d2:e2:4b:fd:f6:c0:1c:68:ab:c7: c9:f0:c3:97:78:44:df:0c:a3:e5:0b:f5:a1:a5:20:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:60:76:d0:80:c4:da:42:b4:8f:d1:ee:85:e7:4d:35: a5:7c:79:d0:17:54:c0:ee:2b:8e:de:7b:7d:01:fd:e7: 7c:04:75:86:21:c0:f2:80:aa:21:48:33:99:a4:8e:82: 31:21:37:fa:3d:e7:c4:86:7c:ca:c1:8c:1c:2f:16:da: 67:7b:36:c4:3f:70:21:dd:18:8f:a9:8b:a2:4b:b1:83: c4:cc:b3:60:e6:dd:37:30:f6:25:8f:5b:80:a8:6c:99: 34:06:81:53:e6:4c:12:9f:a5:ae:1c:5b:ed:ce:e9:c8: 4a:a5:6c:93:56:9a:df:2f:f0:78:d5:21:d3:00:ae:65: 4d:4a:6e:43:8c:56:48:bf:e8:61:19:dc:cc:23:36:2c: 23:e2:ff:14:40:b1:2f:65:96:b4:b9:99:94:d3:25:4e: 12:56:99:88:62:25:ea:89:52:4e:4b:3f:ca:21:bf:de: 7f:21:4c:12:f0:de:dd:86:ad:2e:91:81:a7:b3:ea:55: e0:8d:a9:a8:b9:cd:52:f4:da:bb:2c:0b:d7:00:e6:f2: 69:d8:79:28:84:b8:6a:b0:03:72:82:45:f7:7d:b2:f6: d1:70:9a:fb:30:11:20:e6:9a:c7:e3:0d:65:27:94:98: c3:1e:55:73:74:17:ba:d8:1b:62:ec:86:10:28:55:28 Fingerprint (SHA-256): D8:4D:7C:B0:07:E6:9A:C2:BD:8F:83:17:16:FB:9E:26:DF:0A:25:06:CC:D6:DD:51:AC:E0:74:D0:11:21:A8:15 Fingerprint (SHA1): 73:2A:A5:03:DC:74:62:9E:7D:3D:20:64:D2:73:1E:A0:7A:04:00:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1173: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191208 (0x433ed4e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:13:34 2025 Not After : Thu Nov 28 11:13:34 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:cc:ad:f1:a2:77:da:13:1d:5f:23:d5:07:7e:55:84: 73:93:00:d0:e3:2f:70:cc:27:12:cd:ca:83:2e:c0:e8: 1e:0e:f8:45:ae:57:74:8a:1b:1c:56:34:36:7e:e7:b7: 7e:a6:aa:6e:8c:d0:9f:5c:54:8d:9a:64:18:0f:1a:a5: 60:a7:48:08:53:93:c6:6c:a9:22:21:f5:38:01:54:d1: 05:c9:1a:82:63:a7:0f:88:ae:ca:96:12:1f:e1:2e:5d: 38:ec:d5:2e:61:5d:f5:99:0f:da:40:3e:3a:76:8c:0c: a7:90:f2:17:bb:21:9c:4b:e7:5d:71:9a:f3:53:c9:35: 45:24:95:79:8c:f5:26:8f:fc:28:9f:83:53:27:66:ec: ae:3e:32:53:04:ed:8b:30:a3:c8:1a:4a:64:6b:b7:c2: 50:44:58:5f:78:4f:2a:35:f4:9a:9a:ca:93:b5:ec:80: 4d:fb:a9:b0:65:8b:19:ab:26:97:c8:16:fe:50:54:df: 33:87:1c:74:e8:29:7a:a1:7a:74:d4:a1:e4:3c:67:da: df:49:dc:98:1d:b4:6a:fb:0c:8c:50:fa:d4:85:9f:ad: 8a:9b:4c:bd:b8:53:4b:94:37:9a:b6:9d:c2:d8:0f:08: 93:91:d0:89:75:b6:28:90:f8:3a:12:77:5e:e4:d3:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:98:87:89:4d:ad:5a:bf:65:04:5e:fa:77:a4:3c:49: 1d:b6:15:57:67:16:c2:60:10:4a:3e:1e:5b:b7:f1:bc: 8d:68:66:6d:39:d8:d1:47:44:f8:22:2d:20:53:ee:1b: c9:92:62:da:35:e8:9e:d4:b9:2f:04:c2:16:68:26:99: c4:a0:13:b9:b7:62:6c:36:15:0f:de:d1:36:80:7b:13: b0:d6:59:dd:dd:8a:a7:5a:88:b2:5c:6e:63:22:50:2c: 86:23:23:5a:a3:72:ca:99:8d:48:b6:34:c1:50:c5:9a: e9:ea:9a:fb:37:bf:6b:c8:1b:e2:50:1d:bf:4f:8c:75: 27:8d:43:e4:d0:2f:19:7f:30:4a:b6:17:fb:f7:c8:3e: 6a:b0:d8:e8:9d:84:13:de:ee:42:72:a0:fd:1a:81:5a: 75:40:eb:e1:ac:3c:2c:a8:2b:9b:71:c3:1b:f0:31:18: d8:e4:55:79:1e:4d:54:49:31:b8:84:15:d0:a1:c6:3e: 81:bb:94:14:c1:4b:08:0f:fc:61:e5:c3:1f:7e:f4:2c: a0:0c:8a:e2:5c:15:95:aa:d1:35:a1:e5:8f:d0:dd:cf: a9:b7:74:14:77:6e:97:52:ee:cd:ce:3f:d7:8d:a5:42: 88:3c:7f:54:b5:96:cb:60:99:ba:51:6a:47:25:fd:7b Fingerprint (SHA-256): 66:40:57:26:4C:58:D7:03:FC:62:7A:9B:95:16:3B:FE:9A:E4:8A:01:E2:36:C5:4F:B1:AB:BE:75:F2:A6:03:3A Fingerprint (SHA1): 0C:24:26:E8:73:29:52:E1:87:FD:73:8E:B7:86:EF:48:D2:57:47:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1174: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191209 (0x433ed4e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:13:35 2025 Not After : Thu Nov 28 11:13:35 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:a4:0f:01:d1:b1:e9:b0:4f:5e:0f:d9:69:fa:ab:d0: 28:e0:32:9b:45:e6:8d:14:25:cc:9e:0e:1f:9f:43:42: 3f:00:64:63:e5:05:94:e9:d2:b5:67:97:7c:f0:96:cc: d0:2b:73:16:55:15:36:ba:7b:5c:9a:f8:04:ed:e7:5f: 31:65:1c:f2:6a:f7:ed:65:68:67:2c:76:2c:a1:ed:dc: 0d:31:bf:5a:db:36:03:5e:d8:a2:f5:a0:26:cc:2c:b1: ed:fd:f2:5d:85:f4:ef:f5:24:57:83:29:66:2c:15:5f: 91:d1:a9:91:82:0f:63:27:ea:7b:b8:e7:70:fd:95:84: 9d:86:0a:79:4d:ba:fd:24:9b:49:26:34:05:5d:c8:de: b4:e0:dc:85:e7:9e:f4:ac:46:9e:73:3a:86:b8:45:e9: 89:f8:9a:c2:64:3b:08:27:c2:b2:3d:11:17:d1:98:d9: ae:0b:6f:0a:5e:03:28:41:c6:bf:c7:33:48:6c:b6:fe: 0f:86:07:40:5a:e9:af:d3:d9:5b:3f:ca:55:5e:c3:0e: fa:22:cc:ca:b7:d8:3a:b2:d6:57:a8:5f:45:00:a5:d7: 0d:7a:58:38:73:e5:59:ee:2e:74:7e:e0:5f:45:28:e2: 9e:92:94:33:7b:0e:f4:33:ca:38:f2:28:69:90:0b:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:9b:3e:50:05:12:09:82:7f:f8:7a:45:8a:81:48:a5: ea:90:f1:65:31:c8:26:89:64:5f:b8:78:70:54:b9:99: 08:05:91:d4:e9:9b:58:ce:f4:45:44:9b:06:30:8b:3b: d2:15:1b:eb:7e:1b:65:1a:3e:02:f9:35:09:85:fa:26: 79:74:9d:26:88:3c:f2:35:76:bc:08:d5:62:d1:30:4f: 27:8c:f8:e6:a6:ff:26:ec:10:a3:ac:1b:46:d7:f4:fa: d5:5a:b7:cd:c0:a4:43:99:6d:7f:25:a4:86:8d:a0:83: 0f:8a:a8:ee:7b:9e:e1:b6:06:e9:2c:de:b4:2e:27:fb: da:9c:14:55:29:23:f1:83:7c:4b:98:4b:29:77:0c:27: 46:b7:66:17:a8:2f:9f:e1:1d:ca:94:13:62:1a:9b:86: 46:23:50:73:a1:6e:4d:10:6b:33:a1:c0:2b:a7:66:95: 0e:79:fd:39:94:a8:e3:98:d6:31:a5:d5:de:3c:3d:3b: 25:a2:31:94:76:72:3d:5f:e4:54:fa:c4:7d:46:ac:65: c8:df:bb:e4:14:e6:fb:7a:a7:27:2d:6f:75:02:ab:61: 48:d4:e7:1d:a7:12:01:7f:3e:09:44:ed:b4:07:bc:4f: a0:34:cb:bb:d6:59:6d:7a:7d:80:13:43:fd:cb:38:f7 Fingerprint (SHA-256): 72:70:4F:BE:15:E4:B8:74:77:12:4A:E8:FC:BE:F1:54:09:7B:28:E7:99:58:46:3B:F4:4E:90:BD:EC:82:7D:94 Fingerprint (SHA1): 71:E3:BD:CF:70:36:13:5F:F6:4E:05:EB:80:CB:21:A5:E0:B9:E7:50 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1175: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191210 (0x433ed4ea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:13:35 2025 Not After : Thu Nov 28 11:13:35 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:55:b6:42:38:ff:be:8d:0d:d3:c1:bc:0e:a4:e7:0a: 9d:36:9a:d8:74:64:35:4f:e0:12:4c:0d:89:6a:37:32: 88:65:ed:4f:ef:45:b0:c6:e1:70:4a:75:ae:5a:2e:5b: c3:60:cd:7d:f2:6c:90:5d:b5:b8:3b:54:f0:4d:28:59: 1d:60:cb:f0:f7:3b:fb:17:bb:ba:74:97:11:ae:be:cd: be:18:c2:d0:8a:b0:43:c8:0b:86:17:57:77:3a:ca:21: 40:0f:72:a4:92:35:43:f9:ae:a2:ea:82:60:0b:e3:6c: 93:e2:39:49:23:23:95:59:04:b2:98:9d:d1:9a:17:05: e8:bf:d0:ab:8a:48:a9:ee:5f:af:84:e9:87:19:57:8a: 74:6b:07:a6:8f:59:ac:a8:78:41:96:b8:51:fe:8d:fb: 4d:7f:c3:c2:0a:be:72:ad:3c:6c:99:f2:15:2e:40:b3: 50:f7:dd:a1:a9:ca:56:fc:bf:9b:03:81:25:5d:62:27: 9d:2d:d3:6a:82:b3:30:dd:40:87:20:1a:94:83:45:d9: 4a:e8:e8:65:5c:78:b7:fa:6f:48:96:18:60:9b:c7:21: f9:2c:de:bc:5c:65:e7:69:c5:0a:14:0e:c2:d1:43:7f: 06:31:fa:d4:fb:ed:0b:04:d7:14:30:98:5e:3a:23:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:e7:80:80:56:21:58:33:ad:cd:3a:22:e0:af:58:73: f3:3f:b1:86:b4:42:ae:fa:e9:88:e9:ae:ff:e1:ca:32: 79:c4:62:e1:7e:55:35:29:73:b9:0b:fe:af:a6:c9:2d: 97:cc:c8:3a:d6:57:d3:a1:71:a9:72:a0:aa:e2:35:e0: 8e:88:42:cf:21:af:5c:fe:f2:dc:14:ea:b8:2e:27:22: 91:42:61:52:a6:d6:a6:4b:ed:81:5e:c7:be:9b:69:18: 3a:e9:49:dd:f5:1f:2f:20:2b:9e:82:fe:51:f1:9e:5a: f6:69:0a:b3:42:91:f4:f9:18:ca:ca:ff:26:b8:19:96: 67:86:d7:4f:89:51:92:6e:43:aa:61:80:fe:1d:1e:2b: ab:47:33:e4:b0:a0:7a:09:5c:d1:14:5a:a5:3b:88:76: 85:6e:d9:48:27:72:7d:e9:b2:ff:0a:07:7b:ea:0d:4b: 86:9c:44:fb:2d:6a:11:2f:6c:20:25:cc:a9:b6:47:e7: 25:e2:5d:b5:cb:54:02:ae:38:27:95:51:a1:22:0d:93: 49:18:b9:b8:b1:98:36:af:07:1d:b0:05:12:fb:b8:2f: 32:40:ee:85:40:09:45:52:7f:c0:d0:cd:fc:9c:29:eb: 3b:90:13:35:a0:ad:c2:ea:5d:6f:84:1c:c7:ba:37:0f Fingerprint (SHA-256): 4D:C9:F6:2B:36:02:27:07:59:36:53:65:3B:A2:3D:6C:E5:7F:E6:07:DD:D2:87:62:5A:CA:1B:82:73:15:67:AD Fingerprint (SHA1): E8:04:FD:F9:8A:2B:C3:2B:18:24:C9:AE:47:43:89:A3:2D:20:B3:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1176: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191211 (0x433ed4eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:13:36 2025 Not After : Thu Nov 28 11:13:36 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:61:42:db:eb:27:0a:1b:ce:95:7f:bf:4e:47:b7:22: 3a:4e:00:06:0a:08:2c:5b:7e:80:da:c9:01:19:f8:be: 81:f2:0a:6a:95:eb:67:a6:2a:84:33:2d:5a:91:c7:24: da:00:92:2c:23:58:34:0a:26:7b:d7:3b:41:d3:44:5e: b1:b1:f3:72:64:b1:f1:b9:09:73:1e:32:70:f2:5c:dc: 27:5c:bd:54:60:12:7c:06:0d:ab:d6:b9:f9:cd:2d:f6: 83:fd:56:bf:9c:35:23:a6:92:48:d5:10:f1:b6:81:f1: ac:f9:52:66:d8:76:93:6d:20:57:d0:87:f2:5e:81:ee: fb:e2:ce:49:08:82:19:7e:77:48:31:88:28:30:f1:b7: a9:95:76:28:19:76:19:21:c9:f7:f8:67:fa:6f:73:7d: 47:ff:21:d2:2c:25:d3:80:1f:09:5e:0b:f4:23:0b:27: 5f:2e:06:c4:6c:fb:59:6d:b3:e8:67:bc:cf:44:f5:af: 87:40:0c:50:e9:c2:64:17:b1:e7:a9:75:80:e1:88:7a: 01:16:f4:4f:ec:e1:51:11:7f:75:29:8a:59:d4:40:2d: 7f:cf:12:d4:4e:26:10:df:72:30:fe:ff:89:0c:d4:c9: e5:83:76:91:01:ec:20:58:27:77:3e:1e:d8:d5:33:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:f3:b1:b7:aa:5b:1c:d0:9a:93:d8:3f:dd:99:2c:0a: 8b:be:9d:fa:46:59:b7:82:70:62:9b:b2:6c:c2:e8:a7: 73:33:5e:8c:82:64:75:c5:77:c1:07:80:30:a7:88:40: 33:04:42:ea:c7:28:11:e8:eb:ca:f7:b6:af:c9:77:51: 0e:6b:66:20:14:d7:dd:97:46:cd:43:b9:3e:81:6d:a1: 23:9b:16:99:87:3c:b8:cd:60:4d:de:44:de:b8:45:7f: eb:d0:d4:3e:b1:e8:c4:41:30:5f:85:bb:2c:ba:07:a5: 75:55:56:35:6c:83:6e:92:51:a7:a7:40:fb:bb:2e:a1: 27:e1:84:d6:a1:a2:c6:81:8e:8f:3c:44:de:fa:1d:29: dd:1a:18:fc:3d:b6:b6:24:d3:a4:e4:60:77:3f:8a:e0: 82:0d:4b:3f:3e:fd:f5:32:10:2e:d8:a8:46:34:ce:bf: bd:90:74:da:b3:44:9b:62:42:cc:e2:d0:9e:ce:21:8a: 96:36:99:05:86:8e:ea:49:f8:c9:88:a9:68:a4:d9:b2: ba:10:ab:2a:69:5f:0a:c7:45:a0:2b:e9:51:ee:d3:b8: 9a:49:11:ef:ee:97:3a:88:e8:31:4f:c5:f5:3f:5a:a2: b7:3c:03:7b:94:2f:18:1d:98:a2:b0:15:d4:13:a0:e8 Fingerprint (SHA-256): FF:53:0B:0D:7A:61:83:A2:E1:2C:BA:2E:F2:04:AD:5C:C0:D4:DE:D8:B6:52:8E:0A:D2:C2:64:37:14:D3:EE:91 Fingerprint (SHA1): 37:4A:5D:AC:2D:BA:D4:8F:6C:E8:BC:A4:11:1C:C9:41:21:45:23:91 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1177: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191212 (0x433ed4ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:13:37 2025 Not After : Thu Nov 28 11:13:37 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:8d:62:d2:19:57:a7:3c:85:e6:69:65:9f:be:3c:fa: 67:d8:31:6e:42:1d:a7:5a:6a:cb:56:a1:c7:71:ce:0e: a8:be:40:da:a3:b1:ca:5f:ff:18:25:ee:fa:d3:18:4d: ca:b4:02:fe:b3:80:95:18:f5:27:51:6a:7d:7a:8b:b2: 87:21:47:72:52:d9:4c:5e:38:a0:25:d4:f8:16:72:b8: 27:dd:fc:aa:0d:16:3b:bf:52:2d:f6:7b:c0:56:43:b4: c0:e3:40:be:90:e9:ec:c4:dd:91:79:01:c1:e2:9d:ee: 7c:57:46:1d:96:b5:16:6f:ce:2f:fe:a1:d7:95:50:4e: 3d:cd:4e:e5:5f:75:36:cf:cb:0b:4e:e5:b8:63:10:06: 5d:5b:2f:43:77:38:8b:87:d0:9c:6b:2a:be:87:10:0e: c8:b2:97:8a:23:fe:76:1d:ae:d2:31:06:06:23:b2:24: 49:60:89:1c:47:7b:85:ff:02:1d:6c:34:5e:57:32:ef: 32:42:27:c8:11:f4:6d:49:68:b9:63:ce:3e:60:be:60: 39:62:fa:2e:74:0e:63:17:7b:33:ad:6b:fc:2c:0f:cc: b3:47:a3:c1:dd:b8:4d:22:a2:57:32:8c:eb:0f:22:20: 95:12:3b:06:14:99:8b:25:bb:00:14:8c:bf:af:44:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:36:25:28:47:0b:e0:4d:10:70:df:31:35:e9:af:1c: 0e:6a:02:82:74:5f:f4:dc:b7:d4:85:b3:ee:c9:a2:ef: b8:31:fe:1f:6f:1c:b6:3a:03:ba:af:36:7f:5e:ba:d3: 5b:f9:a9:4c:7d:57:a6:14:8b:56:0c:6f:80:fa:3f:79: 3d:e6:fd:43:e1:a0:13:b5:82:09:c5:c0:2b:14:32:7b: b4:a1:2a:1c:75:cf:0c:bc:6d:4a:21:54:cb:a9:53:39: 1d:2f:fe:48:a9:be:1f:19:ad:ea:f7:54:0b:49:24:a8: 68:db:af:b9:b1:b3:4e:63:b3:02:38:0a:09:ed:98:9b: 73:6c:cf:ae:15:48:6b:90:90:5d:19:a1:bc:18:7c:ee: 09:0b:58:b6:0f:ea:c8:b5:a0:e3:1c:57:7e:3d:fd:da: 58:c4:0d:2a:10:e1:57:09:76:68:01:08:c6:4b:5c:3f: be:d7:40:b0:56:1a:12:f3:e3:4f:8e:be:a3:10:fd:c2: fc:19:ac:4f:54:a2:e3:7c:6e:0e:d1:4a:25:38:3a:dd: b8:7b:32:a0:36:2b:73:65:47:a4:12:60:d0:c4:06:8a: 55:f4:e7:23:f0:9d:b9:24:29:c8:5e:8d:39:f4:7f:fc: 27:24:d3:d9:28:ce:11:08:95:57:89:e7:83:1f:b5:96 Fingerprint (SHA-256): 06:D4:3E:8B:5C:02:27:11:19:EF:B5:C3:0C:04:24:F1:BA:4B:D7:16:BF:E1:46:D6:D4:97:0C:A5:EE:EE:AD:8A Fingerprint (SHA1): 99:7A:3B:32:F5:2D:66:2D:DF:D2:0C:3C:8F:F4:07:2B:E7:6B:93:8C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1178: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191213 (0x433ed4ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:13:37 2025 Not After : Thu Nov 28 11:13:37 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:47:92:0a:dc:7a:66:6c:c4:68:d1:4d:09:41:8b:d3: ce:a6:8e:72:2a:7f:29:ed:66:5c:5b:b8:62:a5:0c:76: 97:d6:e3:c8:37:b8:d5:d5:ff:62:c7:14:7a:dc:d3:13: aa:2a:bb:30:30:65:6e:41:22:75:82:e8:66:92:87:a7: 04:d7:2a:53:27:35:19:73:eb:ee:11:b2:db:a3:2d:a9: bc:47:2f:ef:27:56:49:63:5b:9d:1b:1a:1c:5a:93:59: b8:36:03:b6:1e:12:f7:e8:78:31:26:cb:a7:7e:40:2c: 17:7e:c3:00:14:64:cd:55:38:d2:06:91:51:f3:f3:ae: 91:d6:4c:37:7a:2e:c0:7b:fb:0d:ec:d7:c2:5e:d8:e2: e1:f9:ee:eb:c4:90:88:f9:64:86:aa:e9:24:cb:4e:09: 50:99:52:9d:d7:59:b2:1a:e9:f0:b2:a6:f2:42:85:6c: d5:07:5a:f2:2b:e3:9b:71:28:f2:21:35:0c:3f:5c:e5: bc:62:42:eb:ea:48:7a:43:6f:fb:f8:2b:f9:40:ff:36: 89:9d:75:d8:a4:16:a9:54:ab:a4:3e:ee:1f:55:ca:9f: ce:90:0f:9a:66:72:e6:07:dd:eb:99:a3:f5:db:21:87: 15:9c:1c:2b:8b:d5:01:bf:fb:fc:cd:ac:57:e7:8e:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:66:b8:3b:1d:49:78:f0:c7:57:e3:33:39:7b:c9:33: 31:5c:07:e1:37:ef:29:8c:05:7b:ee:58:08:a3:a6:e0: d4:9b:a0:70:06:00:dd:e8:8a:fd:40:50:cf:77:18:77: 63:1b:ba:02:ba:44:2b:eb:5e:f4:fd:4c:a1:8c:8f:fd: bb:e3:ef:aa:47:37:8e:31:9a:be:6a:08:0a:71:1b:93: 3b:b9:09:73:3e:1b:09:a2:04:25:01:47:e4:a7:c8:e8: f4:de:55:02:e8:06:e9:41:10:d7:56:3d:20:91:76:56: b3:b0:c4:41:8b:ba:d6:db:19:d3:d1:86:f1:e9:91:e9: 23:dd:9c:e8:79:ac:c4:50:e0:96:07:e0:78:ae:89:7e: dc:69:bc:5d:34:5e:71:56:3c:f7:9f:9e:5a:81:66:bd: 04:e1:78:e2:f0:37:09:a9:00:13:1a:4a:7d:c5:2a:bf: fd:c2:ff:70:ed:1c:55:e9:e1:85:ef:2a:cb:1d:cc:b9: 2c:d8:9b:fb:f1:2f:ed:4d:ff:64:37:88:cc:c5:2f:f5: 79:0a:76:34:1d:6d:33:dd:4a:1a:e2:8d:1f:56:ee:a5: 4b:ff:63:51:ee:36:fa:2c:af:d2:d5:76:23:90:99:7b: 76:58:a5:d6:57:68:f5:b7:95:9d:37:a6:a2:cb:8c:97 Fingerprint (SHA-256): C1:96:E2:EE:05:D7:F8:4F:8F:8D:E6:24:4B:F0:BF:02:43:8B:B9:2C:F7:D5:CF:D1:22:E8:F8:E6:7F:43:05:71 Fingerprint (SHA1): 48:BC:D2:4A:43:87:A2:6C:CF:FC:80:8D:13:27:09:28:CB:9F:8B:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1179: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1180: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191228 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1181: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1182: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1183: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1184: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191229 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1185: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1186: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1187: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1188: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191230 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1189: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1190: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1191: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1192: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191231 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1193: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1194: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1195: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191228 (0x433ed4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:44 2025 Not After : Thu Nov 28 11:13:44 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b1:5b:6d:eb:f4:47:e6:a2:c4:72:12:81:b1:3f:81: 8f:4e:5f:40:a7:f9:79:92:7a:71:94:e3:58:a2:39:90: d2:37:68:45:5b:ad:36:19:1c:a3:28:33:d7:a6:9a:5d: 52:7a:6e:b1:4d:1c:83:65:d1:9d:6d:58:e2:67:3a:c9: d1:e5:7e:f5:e4:2f:a3:c0:58:db:0f:97:d2:3b:8a:2e: 59:10:bf:5f:40:78:db:aa:1c:da:62:28:da:ba:fe:84: fa:9e:33:d8:ca:d9:88:f8:f3:f6:be:ac:61:81:55:13: e2:ba:db:7c:7b:eb:97:89:e7:39:7c:c2:47:20:e1:8f: e2:4f:67:15:94:c6:a2:f0:71:df:8e:f4:07:92:b0:8a: 74:23:5c:ad:46:20:25:62:2f:24:7a:79:0e:05:df:f3: 76:4e:1f:2b:20:b3:0f:45:ad:59:43:08:4d:15:2e:3b: 65:67:70:85:f1:8c:2b:09:d7:c0:8d:d6:90:21:ea:ea: 30:f7:8b:dc:35:b5:27:84:86:44:f6:64:c3:eb:5b:39: f0:36:23:24:af:06:e2:3b:6c:cd:b2:67:83:9c:77:c1: 91:c2:c4:eb:87:7f:84:1d:5e:9c:41:cf:d7:35:ff:69: 62:0d:31:4d:e0:d2:ad:db:4a:53:25:bf:21:66:98:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c3:9b:92:30:82:94:4a:69:db:d8:75:7d:6d:f4:60:c8: 58:5c:71:95:6b:3a:5f:ac:3a:d6:ac:0b:53:6d:eb:00: ad:60:a6:9d:27:7e:3b:c9:48:14:b4:a2:78:12:94:cb: ac:d2:03:64:bd:47:43:0b:fd:41:9e:36:1a:0c:bd:0e: c7:ac:d1:51:69:b1:6c:5d:61:e6:f6:bf:e0:b0:86:43: ae:22:80:ef:7d:2b:cd:46:ff:ba:5d:99:96:41:ba:87: d4:0e:94:5d:9a:01:f9:1e:c9:d9:9f:35:f2:c2:0d:cb: 28:39:01:2f:bb:aa:33:85:1b:a1:52:6b:78:f7:dd:40: 88:dd:c0:39:e4:4c:e1:b3:0c:d0:43:63:f1:ef:67:45: 66:3a:5e:70:1a:66:36:ff:9f:f3:3b:c6:e0:bb:f6:b8: 60:28:7f:98:7a:79:41:0d:db:a2:a7:2c:be:f5:51:16: e8:e3:66:65:a7:74:ae:3f:db:48:7f:6f:25:b7:08:e8: 90:41:f5:5b:7e:e9:da:d7:d1:a7:8b:a8:24:66:0d:fb: b3:b1:e5:a9:76:cd:74:fe:40:1f:01:dc:71:37:8d:d9: 4b:b8:27:06:ee:33:39:15:e0:01:71:6c:60:d2:73:b2: 4c:09:4e:6c:f8:05:ca:52:12:4b:ef:1a:86:7c:9c:5e Fingerprint (SHA-256): AC:6B:6B:CA:44:AD:29:09:0F:65:23:1A:B2:90:C1:D0:F6:03:B1:57:A5:AA:38:E2:23:10:13:87:42:E1:8F:9C Fingerprint (SHA1): B4:55:9A:29:BD:53:E6:D3:38:59:90:02:78:7E:A9:AA:9C:D0:9D:44 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1196: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1197: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191229 (0x433ed4fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:45 2025 Not After : Thu Nov 28 11:13:45 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b6:36:9e:21:ac:49:67:f8:84:9a:86:6d:98:5d:6f: 5a:05:89:9e:71:6f:22:f5:cc:73:ff:74:53:bb:04:11: 24:3f:ed:68:e1:2a:0f:06:92:08:ab:5d:87:ce:e4:a4: 84:41:7c:34:fd:3d:42:1c:aa:10:d8:91:e0:fc:65:c1: 04:9c:eb:7f:5b:0b:37:63:06:b3:ce:e7:46:ba:9f:1e: ff:f9:da:3a:f0:b8:d5:ff:df:33:25:03:1c:7d:fc:7b: 59:a8:c2:fb:c6:9d:49:e3:50:50:c3:78:25:0e:6f:aa: 89:d6:10:37:3c:c4:59:fb:70:00:dc:ac:14:cf:c5:2b: 47:54:ec:fd:bb:67:7e:d9:b7:1c:5f:8c:cd:91:07:20: e1:bb:37:78:40:2d:7d:45:16:1f:0f:6c:ab:93:b9:bf: 27:4f:db:c7:3a:64:d6:b8:04:22:9a:96:7e:c3:fc:e3: 5b:4d:43:14:d9:a8:0e:62:50:2c:9b:13:be:11:c9:0d: 8e:ab:f7:ad:df:8b:f5:25:b3:71:ae:14:0e:59:bc:96: 4c:a5:87:18:b6:fa:6f:11:89:6f:46:7c:ce:18:0e:9f: dc:3c:55:2b:af:18:9f:1d:37:a1:bd:15:d4:57:78:40: 21:08:3b:5e:75:71:8d:b1:8c:37:a7:eb:f0:dc:65:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:4f:cb:8f:0c:41:b3:88:9d:36:0d:6b:5a:e3:d7:33: f8:ed:d3:8e:79:78:e9:6e:6f:4c:c2:66:43:cf:40:00: 76:e9:fd:a9:fa:aa:0e:3c:32:c4:0f:79:68:8c:f3:e5: 81:9a:ac:39:29:af:59:d8:cb:82:8a:4a:e8:72:02:f6: 43:e4:53:8a:a5:4c:de:f2:a6:9e:74:d0:f5:8e:de:77: dd:7c:9f:c8:48:02:d0:f5:08:d4:e1:08:9b:b8:bd:38: d2:b1:c7:ab:53:b7:64:3c:30:cf:60:e5:a8:10:ab:cb: 8c:8a:1c:f0:9f:c9:7c:d8:8d:16:e9:60:e2:fc:25:e1: 50:d1:55:e5:fd:d6:f9:2e:17:b7:20:5b:99:49:c5:22: 4b:d6:df:e1:e9:e4:b0:6c:69:d2:f9:4e:0f:af:62:21: 55:c2:20:61:c8:e9:e6:33:de:a2:26:c4:32:f4:bf:29: 28:46:ab:bc:39:17:28:58:b4:64:21:1e:70:48:d9:23: bc:99:b1:d3:cd:3a:bf:62:f9:23:0f:4d:46:ef:01:89: 19:5b:8a:37:6a:b9:97:50:19:22:44:88:2c:e5:a0:5e: cb:56:58:26:6e:25:ae:a0:30:87:46:2c:43:ea:5b:71: f3:fd:33:05:a8:b8:24:eb:4f:ee:ef:57:ba:1c:26:f8 Fingerprint (SHA-256): 50:E2:B8:63:21:73:4C:F6:13:8C:D9:0E:F0:20:46:2B:64:24:64:12:F7:3D:59:52:98:A8:75:EF:33:C2:A8:71 Fingerprint (SHA1): 4C:D0:F2:13:62:CD:03:08:13:31:6A:2E:9A:41:C9:7E:BA:79:91:AA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1198: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1199: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191230 (0x433ed4fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:46 2025 Not After : Thu Nov 28 11:13:46 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:ca:0d:bf:ad:92:fd:24:d7:34:e8:fe:67:03:d8:34: 73:28:1d:d4:8a:c0:35:b3:83:5f:b4:4b:f3:4e:c7:4b: f3:9e:f2:67:57:ec:30:2c:5c:85:a8:f3:6c:65:36:f2: a7:06:bf:3b:6a:71:e0:be:85:a0:91:2b:f5:ab:7d:1e: 13:b6:d2:2e:55:3a:42:6c:8b:0d:e2:63:c9:07:65:23: f7:b9:5d:9e:d6:28:9c:18:b8:18:25:51:c8:33:55:dd: 6d:99:34:b2:91:4a:1a:58:65:bc:8a:fe:ba:ec:48:c0: fb:d6:49:55:65:3a:e6:36:f3:ad:64:98:cc:1e:92:54: 4e:ab:dc:98:eb:ef:4f:61:36:02:55:40:d7:87:f8:3b: 88:3e:0f:ed:03:43:ff:27:48:d0:53:7f:c3:71:bb:d4: b4:2a:0c:62:ef:20:ca:7d:83:24:b9:d3:3d:d9:35:4d: f7:17:aa:3a:2f:7c:86:e1:74:00:4a:19:53:3f:88:0c: d9:83:80:ca:c7:2c:1f:7a:5d:d6:e7:93:59:96:cd:3f: ec:e3:cd:bb:be:67:86:56:ca:17:bc:fc:0f:a9:d6:cf: 60:8f:3b:04:84:71:99:e5:ab:da:bd:c0:2f:9c:f2:b3: 91:b2:f3:dc:10:7b:1a:59:ac:f4:ea:d4:bb:64:a6:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:72:dd:6d:a4:51:69:7b:62:9e:9c:e2:82:b1:1d:ce: ab:d4:8b:34:92:78:76:79:69:60:84:c5:56:64:0c:ec: e6:a6:05:ee:4c:a1:45:db:90:31:af:0f:bc:12:08:f0: d7:6e:a5:7b:64:07:b8:40:fa:91:a9:f5:1a:f4:a1:f9: d4:9d:f7:6e:9e:1c:58:81:f2:a6:ea:5d:c6:33:19:ff: 14:2c:d0:9b:47:8d:74:9d:f7:ca:19:92:6d:4e:82:ec: af:f5:51:c7:e8:1f:eb:5d:ee:5b:e8:06:2d:68:af:ac: f0:03:0e:62:30:24:d6:b2:b6:71:f6:b1:c9:a3:66:3d: c5:8d:79:ec:fd:d5:5c:1e:06:78:a2:f2:14:dc:25:13: 68:1a:30:d4:22:5f:d5:c9:51:60:53:23:27:3b:33:dd: 9c:3c:ff:5d:19:4c:c6:10:65:de:1e:54:56:d5:f9:c9: a5:86:68:f8:f0:a1:b8:de:a5:99:32:50:da:d6:fa:e0: 16:1e:50:0b:69:63:f2:3e:99:02:16:0d:4e:d4:39:8d: 83:5b:a4:94:bd:26:33:b5:87:61:d2:55:89:fa:b8:b5: f4:c3:45:1b:97:8f:46:3e:de:c2:0c:18:d3:af:df:ef: b0:46:65:ba:5d:7e:84:ef:f6:2e:ec:21:09:b9:1a:df Fingerprint (SHA-256): 31:0E:83:36:27:67:E0:5D:2C:1C:54:01:70:C3:23:82:DA:DE:82:1E:DD:B7:CC:35:06:02:41:28:2B:32:D0:56 Fingerprint (SHA1): 94:40:C4:96:9F:DF:93:93:AA:73:BA:56:D4:F6:A4:DA:AB:0D:9F:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1200: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1201: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1202: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1203: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1204: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191228 (0x433ed4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:44 2025 Not After : Thu Nov 28 11:13:44 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:b1:5b:6d:eb:f4:47:e6:a2:c4:72:12:81:b1:3f:81: 8f:4e:5f:40:a7:f9:79:92:7a:71:94:e3:58:a2:39:90: d2:37:68:45:5b:ad:36:19:1c:a3:28:33:d7:a6:9a:5d: 52:7a:6e:b1:4d:1c:83:65:d1:9d:6d:58:e2:67:3a:c9: d1:e5:7e:f5:e4:2f:a3:c0:58:db:0f:97:d2:3b:8a:2e: 59:10:bf:5f:40:78:db:aa:1c:da:62:28:da:ba:fe:84: fa:9e:33:d8:ca:d9:88:f8:f3:f6:be:ac:61:81:55:13: e2:ba:db:7c:7b:eb:97:89:e7:39:7c:c2:47:20:e1:8f: e2:4f:67:15:94:c6:a2:f0:71:df:8e:f4:07:92:b0:8a: 74:23:5c:ad:46:20:25:62:2f:24:7a:79:0e:05:df:f3: 76:4e:1f:2b:20:b3:0f:45:ad:59:43:08:4d:15:2e:3b: 65:67:70:85:f1:8c:2b:09:d7:c0:8d:d6:90:21:ea:ea: 30:f7:8b:dc:35:b5:27:84:86:44:f6:64:c3:eb:5b:39: f0:36:23:24:af:06:e2:3b:6c:cd:b2:67:83:9c:77:c1: 91:c2:c4:eb:87:7f:84:1d:5e:9c:41:cf:d7:35:ff:69: 62:0d:31:4d:e0:d2:ad:db:4a:53:25:bf:21:66:98:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c3:9b:92:30:82:94:4a:69:db:d8:75:7d:6d:f4:60:c8: 58:5c:71:95:6b:3a:5f:ac:3a:d6:ac:0b:53:6d:eb:00: ad:60:a6:9d:27:7e:3b:c9:48:14:b4:a2:78:12:94:cb: ac:d2:03:64:bd:47:43:0b:fd:41:9e:36:1a:0c:bd:0e: c7:ac:d1:51:69:b1:6c:5d:61:e6:f6:bf:e0:b0:86:43: ae:22:80:ef:7d:2b:cd:46:ff:ba:5d:99:96:41:ba:87: d4:0e:94:5d:9a:01:f9:1e:c9:d9:9f:35:f2:c2:0d:cb: 28:39:01:2f:bb:aa:33:85:1b:a1:52:6b:78:f7:dd:40: 88:dd:c0:39:e4:4c:e1:b3:0c:d0:43:63:f1:ef:67:45: 66:3a:5e:70:1a:66:36:ff:9f:f3:3b:c6:e0:bb:f6:b8: 60:28:7f:98:7a:79:41:0d:db:a2:a7:2c:be:f5:51:16: e8:e3:66:65:a7:74:ae:3f:db:48:7f:6f:25:b7:08:e8: 90:41:f5:5b:7e:e9:da:d7:d1:a7:8b:a8:24:66:0d:fb: b3:b1:e5:a9:76:cd:74:fe:40:1f:01:dc:71:37:8d:d9: 4b:b8:27:06:ee:33:39:15:e0:01:71:6c:60:d2:73:b2: 4c:09:4e:6c:f8:05:ca:52:12:4b:ef:1a:86:7c:9c:5e Fingerprint (SHA-256): AC:6B:6B:CA:44:AD:29:09:0F:65:23:1A:B2:90:C1:D0:F6:03:B1:57:A5:AA:38:E2:23:10:13:87:42:E1:8F:9C Fingerprint (SHA1): B4:55:9A:29:BD:53:E6:D3:38:59:90:02:78:7E:A9:AA:9C:D0:9D:44 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191229 (0x433ed4fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:45 2025 Not After : Thu Nov 28 11:13:45 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b6:36:9e:21:ac:49:67:f8:84:9a:86:6d:98:5d:6f: 5a:05:89:9e:71:6f:22:f5:cc:73:ff:74:53:bb:04:11: 24:3f:ed:68:e1:2a:0f:06:92:08:ab:5d:87:ce:e4:a4: 84:41:7c:34:fd:3d:42:1c:aa:10:d8:91:e0:fc:65:c1: 04:9c:eb:7f:5b:0b:37:63:06:b3:ce:e7:46:ba:9f:1e: ff:f9:da:3a:f0:b8:d5:ff:df:33:25:03:1c:7d:fc:7b: 59:a8:c2:fb:c6:9d:49:e3:50:50:c3:78:25:0e:6f:aa: 89:d6:10:37:3c:c4:59:fb:70:00:dc:ac:14:cf:c5:2b: 47:54:ec:fd:bb:67:7e:d9:b7:1c:5f:8c:cd:91:07:20: e1:bb:37:78:40:2d:7d:45:16:1f:0f:6c:ab:93:b9:bf: 27:4f:db:c7:3a:64:d6:b8:04:22:9a:96:7e:c3:fc:e3: 5b:4d:43:14:d9:a8:0e:62:50:2c:9b:13:be:11:c9:0d: 8e:ab:f7:ad:df:8b:f5:25:b3:71:ae:14:0e:59:bc:96: 4c:a5:87:18:b6:fa:6f:11:89:6f:46:7c:ce:18:0e:9f: dc:3c:55:2b:af:18:9f:1d:37:a1:bd:15:d4:57:78:40: 21:08:3b:5e:75:71:8d:b1:8c:37:a7:eb:f0:dc:65:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:4f:cb:8f:0c:41:b3:88:9d:36:0d:6b:5a:e3:d7:33: f8:ed:d3:8e:79:78:e9:6e:6f:4c:c2:66:43:cf:40:00: 76:e9:fd:a9:fa:aa:0e:3c:32:c4:0f:79:68:8c:f3:e5: 81:9a:ac:39:29:af:59:d8:cb:82:8a:4a:e8:72:02:f6: 43:e4:53:8a:a5:4c:de:f2:a6:9e:74:d0:f5:8e:de:77: dd:7c:9f:c8:48:02:d0:f5:08:d4:e1:08:9b:b8:bd:38: d2:b1:c7:ab:53:b7:64:3c:30:cf:60:e5:a8:10:ab:cb: 8c:8a:1c:f0:9f:c9:7c:d8:8d:16:e9:60:e2:fc:25:e1: 50:d1:55:e5:fd:d6:f9:2e:17:b7:20:5b:99:49:c5:22: 4b:d6:df:e1:e9:e4:b0:6c:69:d2:f9:4e:0f:af:62:21: 55:c2:20:61:c8:e9:e6:33:de:a2:26:c4:32:f4:bf:29: 28:46:ab:bc:39:17:28:58:b4:64:21:1e:70:48:d9:23: bc:99:b1:d3:cd:3a:bf:62:f9:23:0f:4d:46:ef:01:89: 19:5b:8a:37:6a:b9:97:50:19:22:44:88:2c:e5:a0:5e: cb:56:58:26:6e:25:ae:a0:30:87:46:2c:43:ea:5b:71: f3:fd:33:05:a8:b8:24:eb:4f:ee:ef:57:ba:1c:26:f8 Fingerprint (SHA-256): 50:E2:B8:63:21:73:4C:F6:13:8C:D9:0E:F0:20:46:2B:64:24:64:12:F7:3D:59:52:98:A8:75:EF:33:C2:A8:71 Fingerprint (SHA1): 4C:D0:F2:13:62:CD:03:08:13:31:6A:2E:9A:41:C9:7E:BA:79:91:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191230 (0x433ed4fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:46 2025 Not After : Thu Nov 28 11:13:46 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:ca:0d:bf:ad:92:fd:24:d7:34:e8:fe:67:03:d8:34: 73:28:1d:d4:8a:c0:35:b3:83:5f:b4:4b:f3:4e:c7:4b: f3:9e:f2:67:57:ec:30:2c:5c:85:a8:f3:6c:65:36:f2: a7:06:bf:3b:6a:71:e0:be:85:a0:91:2b:f5:ab:7d:1e: 13:b6:d2:2e:55:3a:42:6c:8b:0d:e2:63:c9:07:65:23: f7:b9:5d:9e:d6:28:9c:18:b8:18:25:51:c8:33:55:dd: 6d:99:34:b2:91:4a:1a:58:65:bc:8a:fe:ba:ec:48:c0: fb:d6:49:55:65:3a:e6:36:f3:ad:64:98:cc:1e:92:54: 4e:ab:dc:98:eb:ef:4f:61:36:02:55:40:d7:87:f8:3b: 88:3e:0f:ed:03:43:ff:27:48:d0:53:7f:c3:71:bb:d4: b4:2a:0c:62:ef:20:ca:7d:83:24:b9:d3:3d:d9:35:4d: f7:17:aa:3a:2f:7c:86:e1:74:00:4a:19:53:3f:88:0c: d9:83:80:ca:c7:2c:1f:7a:5d:d6:e7:93:59:96:cd:3f: ec:e3:cd:bb:be:67:86:56:ca:17:bc:fc:0f:a9:d6:cf: 60:8f:3b:04:84:71:99:e5:ab:da:bd:c0:2f:9c:f2:b3: 91:b2:f3:dc:10:7b:1a:59:ac:f4:ea:d4:bb:64:a6:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:72:dd:6d:a4:51:69:7b:62:9e:9c:e2:82:b1:1d:ce: ab:d4:8b:34:92:78:76:79:69:60:84:c5:56:64:0c:ec: e6:a6:05:ee:4c:a1:45:db:90:31:af:0f:bc:12:08:f0: d7:6e:a5:7b:64:07:b8:40:fa:91:a9:f5:1a:f4:a1:f9: d4:9d:f7:6e:9e:1c:58:81:f2:a6:ea:5d:c6:33:19:ff: 14:2c:d0:9b:47:8d:74:9d:f7:ca:19:92:6d:4e:82:ec: af:f5:51:c7:e8:1f:eb:5d:ee:5b:e8:06:2d:68:af:ac: f0:03:0e:62:30:24:d6:b2:b6:71:f6:b1:c9:a3:66:3d: c5:8d:79:ec:fd:d5:5c:1e:06:78:a2:f2:14:dc:25:13: 68:1a:30:d4:22:5f:d5:c9:51:60:53:23:27:3b:33:dd: 9c:3c:ff:5d:19:4c:c6:10:65:de:1e:54:56:d5:f9:c9: a5:86:68:f8:f0:a1:b8:de:a5:99:32:50:da:d6:fa:e0: 16:1e:50:0b:69:63:f2:3e:99:02:16:0d:4e:d4:39:8d: 83:5b:a4:94:bd:26:33:b5:87:61:d2:55:89:fa:b8:b5: f4:c3:45:1b:97:8f:46:3e:de:c2:0c:18:d3:af:df:ef: b0:46:65:ba:5d:7e:84:ef:f6:2e:ec:21:09:b9:1a:df Fingerprint (SHA-256): 31:0E:83:36:27:67:E0:5D:2C:1C:54:01:70:C3:23:82:DA:DE:82:1E:DD:B7:CC:35:06:02:41:28:2B:32:D0:56 Fingerprint (SHA1): 94:40:C4:96:9F:DF:93:93:AA:73:BA:56:D4:F6:A4:DA:AB:0D:9F:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1209: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1210: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1211: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191232 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1212: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1213: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1214: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1215: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191233 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1216: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1217: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1218: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1219: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191234 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1220: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1221: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1222: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1223: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191235 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1224: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1225: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1226: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1227: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191236 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1228: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1229: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1230: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191232 (0x433ed500) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:48 2025 Not After : Thu Nov 28 11:13:48 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:6a:96:92:08:e6:aa:0f:c1:d0:62:29:44:57:08:e8: 71:b4:09:3e:ae:62:f6:c8:a8:01:32:9d:97:2f:b1:4e: 41:e1:c7:57:d0:1d:d0:cd:b7:93:b3:a2:40:1d:6c:c4: b6:ae:cf:b0:e6:94:43:1a:3a:bc:66:d2:f9:c1:3e:59: 8f:2e:1d:72:0f:c5:55:9f:be:da:2c:d6:b8:e5:6b:e2: e2:e7:01:62:30:46:65:36:53:80:0e:88:ef:53:66:f0: 85:ea:28:31:ba:ec:11:76:b2:f5:35:22:63:fb:4e:b6: 39:34:e2:67:e9:1b:ed:a7:2b:36:ca:1a:e2:d4:c3:6b: d9:e2:63:6f:35:50:9c:eb:0b:12:cb:ee:dd:6b:86:34: 0d:52:12:c5:24:1e:4f:10:5b:e2:c3:3a:ee:fd:34:bc: ab:00:46:92:69:fd:37:e2:f6:29:91:f0:b6:34:08:10: 44:82:58:a0:e7:b3:bf:09:ca:48:c9:85:c6:c5:d8:82: d7:e4:2f:87:fd:21:44:27:ad:16:0a:c1:86:cd:db:75: 8d:d9:cc:cf:3a:20:66:f9:35:71:c6:e5:54:ce:e6:8d: da:6d:87:4a:79:3b:5e:af:7e:a8:af:f0:58:69:14:51: 88:45:00:88:13:10:7a:62:8e:52:a8:e9:e0:ca:9a:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:52:71:cf:7d:4e:06:ae:2e:08:d8:1a:de:50:2d:aa: ef:74:54:f7:12:8d:49:e7:90:eb:3e:4c:de:2c:a6:57: c0:4b:16:54:65:2a:60:35:b6:2f:24:d3:3c:34:c6:5e: ae:0b:40:36:6f:7c:67:c2:e0:3e:53:b0:f8:d8:17:8a: c4:0e:9f:02:d0:1e:c5:ad:b7:cb:bd:4f:05:e9:29:bc: 70:51:4c:b0:10:d6:02:49:ff:73:1b:f6:fe:24:72:6d: 10:46:cf:79:e4:e3:48:11:ab:5b:55:1a:aa:17:30:db: f1:3f:33:12:15:2a:64:99:b7:b2:75:5d:37:a5:b9:b7: 7e:dd:9b:12:5d:b6:70:6d:32:b8:5b:ae:8b:23:a7:de: f9:5c:c0:5e:d1:15:0e:a4:e6:f2:92:6b:d5:14:41:e1: c0:a3:71:44:15:f9:e2:7b:5a:07:88:e4:d3:54:e1:03: 6d:6d:5e:5f:38:5f:87:60:bb:3b:18:38:69:b8:08:15: 43:f8:21:3c:1f:38:b9:68:b2:95:06:97:21:44:ca:d5: 9c:a8:b9:c3:07:03:a6:4a:94:8d:9e:de:47:17:ec:3e: e3:50:4d:19:18:96:83:ce:5b:26:89:37:53:9e:4c:73: 12:bc:42:87:e2:b1:42:6b:94:c4:8b:5a:71:c8:66:74 Fingerprint (SHA-256): B2:B6:E8:0F:A1:64:34:75:98:53:71:34:4B:4E:88:0B:A7:A0:46:24:B8:55:39:42:0D:12:2F:3F:3D:8D:D2:88 Fingerprint (SHA1): 12:12:94:BD:AC:A9:CD:77:C6:75:4F:A4:08:1A:1C:E1:50:E5:1E:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1231: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1232: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191233 (0x433ed501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:49 2025 Not After : Thu Nov 28 11:13:49 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:66:eb:04:c6:ea:e5:79:57:4a:36:d9:98:1d:da:5c: f0:6d:04:4b:5e:4f:27:0e:6d:85:b2:3b:a3:43:a0:f3: 4a:9e:be:15:e6:e1:80:72:6e:6a:28:19:b3:c7:61:65: 09:7f:67:4b:db:d8:67:27:13:92:7e:32:a1:97:06:14: 5c:bd:b0:5c:d5:ea:38:c5:8b:33:c0:18:e9:b9:8c:2a: 9e:ce:c3:5f:98:56:b0:3a:2b:87:e6:a1:7b:e7:98:02: e7:71:ab:39:62:54:81:87:d7:0b:8a:ca:59:97:00:48: 20:13:74:86:ff:88:73:3b:4b:be:c0:06:ed:b6:a1:27: 1c:fa:9b:86:56:74:30:a3:01:3f:3e:2c:a5:96:8c:76: 49:33:e9:05:1d:ba:a1:c1:b3:3a:6c:d4:32:d8:39:a2: f6:e6:42:5a:85:29:bc:1c:b9:8b:a2:d6:ae:a5:87:e7: 63:f4:4d:e3:e3:4b:b9:af:6f:83:a1:4b:87:b4:3f:1c: 31:34:fd:9c:4d:f3:2f:c7:e9:7e:4f:ce:ea:f8:4f:9d: fa:bc:fd:29:91:9f:3b:e5:a1:77:5a:6d:99:44:4b:df: 29:19:d9:61:42:87:95:ef:6a:a0:16:2e:1a:90:b0:33: 7f:01:2d:52:36:85:07:49:34:cc:ef:1c:4f:f2:e9:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:fa:b3:63:9d:3f:fd:b8:c3:aa:dd:33:5b:6e:5d:3b: 67:29:3d:66:fc:19:a6:7a:e7:08:de:00:72:80:b2:b2: e6:8e:38:35:3d:1d:b9:70:da:d8:12:07:1a:10:67:00: 6f:ad:ee:55:53:df:9b:01:c0:d7:40:e4:3b:40:e1:07: 5d:b5:f3:94:50:11:aa:9b:d0:a0:b5:e3:86:21:8e:49: 6b:35:85:54:7b:26:1e:2f:13:a5:ec:32:e1:ed:8c:9d: c2:bf:34:63:30:fb:3b:3f:7a:b3:14:40:a7:33:36:8c: f7:a5:30:2e:55:b1:bd:00:01:d5:21:90:e0:92:d4:9d: 8f:58:09:b0:f3:39:85:76:44:9e:1c:8d:80:ba:44:df: 95:8a:64:bc:f4:8c:fb:0a:f0:ca:a0:b1:cc:03:52:98: 10:04:49:71:97:d4:fe:99:bd:15:fc:72:e7:3e:6e:c5: 0b:14:ca:2d:f2:2b:f4:e0:5d:bf:d7:e6:2f:56:4a:06: e5:43:db:3a:1a:34:c2:22:46:f3:b6:8e:48:bd:1f:34: f4:23:da:fe:5a:df:79:a2:cb:e0:ee:1c:2d:81:63:31: 55:18:4f:dd:dc:28:8f:96:39:76:b5:62:e8:c5:db:c9: ce:9a:59:ec:df:0b:fb:98:1f:54:b8:df:6b:68:de:bd Fingerprint (SHA-256): F7:41:ED:D8:D6:F5:A3:E0:A4:5F:89:DA:A6:44:E8:50:0E:69:C8:55:CB:5B:98:9E:0A:78:F9:5D:31:05:7C:5E Fingerprint (SHA1): 7E:0B:F9:71:31:E7:E5:79:3F:4A:E2:A6:81:6E:D5:1A:F3:DC:AD:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1233: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1234: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191234 (0x433ed502) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:50 2025 Not After : Thu Nov 28 11:13:50 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:ef:75:83:85:06:4a:d2:d6:d1:a1:13:15:03:73:69: d9:58:46:18:1e:67:ca:64:ff:c2:f0:84:3a:85:8d:28: 14:aa:dc:b5:ce:7b:1e:8b:65:ba:ee:a2:8e:bb:ad:eb: 16:d0:75:29:6b:63:ed:05:01:b2:03:41:53:3e:10:2e: 6a:b8:21:a4:e4:9b:41:33:75:e2:fe:cf:ea:38:8c:8b: d1:11:b7:7e:71:3a:76:d5:3e:5e:43:7b:fe:9c:11:e5: 8e:6b:71:33:5d:47:56:4e:f3:af:10:87:a0:2f:6b:29: 4f:08:27:bc:12:56:4a:09:b1:bc:5b:6f:cd:03:d1:d1: 5a:6f:08:b4:9e:01:2b:ae:9a:bb:3e:d9:45:2f:99:15: ae:c7:e9:28:9c:eb:bf:d9:c9:89:54:bd:53:af:b9:da: c8:88:66:b7:6f:f1:fd:01:95:45:05:73:eb:bf:b8:11: c1:90:eb:e9:dc:7e:3f:5e:aa:30:25:81:c1:ee:5f:26: 9b:64:d8:c1:3f:33:89:c2:e3:6f:3a:7e:7d:af:37:16: f4:fe:af:43:d7:6f:0f:c2:de:5b:54:be:ab:09:5c:17: 02:ae:0a:f8:49:9f:9d:14:9f:7a:95:a2:b5:60:49:39: f0:52:19:03:2f:c7:b1:22:2d:1a:91:73:4b:4b:a8:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:4d:0d:de:f6:7f:63:e8:ed:32:df:63:6b:f5:41:29: d4:60:f8:92:1b:b5:e1:79:3e:c3:22:ea:e4:60:e9:73: c0:ad:01:df:2b:e8:34:ce:b0:55:9d:40:c5:ab:16:0f: e2:21:ad:3a:65:bf:c6:9d:ef:b1:ca:eb:e1:80:88:21: df:2f:ef:20:8c:02:36:b3:f7:bf:bf:c7:a1:32:75:09: 04:5b:4c:2e:a4:41:8a:71:11:89:7a:e6:0d:9f:61:a6: fa:80:d9:b3:76:75:9a:4d:c1:b3:85:93:36:7b:38:78: e4:7b:16:7a:47:a0:25:8c:ab:ca:4f:8f:6b:f4:cb:72: f8:45:bb:70:fc:15:23:27:47:30:69:ed:93:9d:74:1e: 01:fc:c8:1f:44:9d:44:5d:ce:e1:f7:aa:0c:2f:e0:19: fc:76:15:b9:ec:6c:dd:52:30:06:19:87:6b:1b:97:79: bf:13:ce:6c:e7:e9:6f:46:ad:51:77:c2:1a:3b:b3:e1: f9:66:d3:8e:8b:68:c4:80:af:db:11:8e:52:40:57:5d: 6b:e4:f9:36:35:ad:0a:a6:3d:a3:7b:81:38:5c:54:b2: 15:67:4b:ff:e7:d3:1d:83:fe:a7:df:57:bb:40:8e:8d: 14:89:66:4f:34:6b:28:d4:5b:ef:d2:45:6c:96:bd:41 Fingerprint (SHA-256): 69:48:08:A9:ED:61:7C:03:5E:FD:22:03:93:4E:EA:00:C3:E9:93:C0:3D:9C:8C:E9:3D:AE:17:5E:15:DD:0F:AE Fingerprint (SHA1): 92:CA:70:6A:1C:A1:2B:8B:9C:19:55:2C:FA:6C:47:D0:98:C9:16:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1235: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1236: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1237: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1238: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1239: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191232 (0x433ed500) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:48 2025 Not After : Thu Nov 28 11:13:48 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:6a:96:92:08:e6:aa:0f:c1:d0:62:29:44:57:08:e8: 71:b4:09:3e:ae:62:f6:c8:a8:01:32:9d:97:2f:b1:4e: 41:e1:c7:57:d0:1d:d0:cd:b7:93:b3:a2:40:1d:6c:c4: b6:ae:cf:b0:e6:94:43:1a:3a:bc:66:d2:f9:c1:3e:59: 8f:2e:1d:72:0f:c5:55:9f:be:da:2c:d6:b8:e5:6b:e2: e2:e7:01:62:30:46:65:36:53:80:0e:88:ef:53:66:f0: 85:ea:28:31:ba:ec:11:76:b2:f5:35:22:63:fb:4e:b6: 39:34:e2:67:e9:1b:ed:a7:2b:36:ca:1a:e2:d4:c3:6b: d9:e2:63:6f:35:50:9c:eb:0b:12:cb:ee:dd:6b:86:34: 0d:52:12:c5:24:1e:4f:10:5b:e2:c3:3a:ee:fd:34:bc: ab:00:46:92:69:fd:37:e2:f6:29:91:f0:b6:34:08:10: 44:82:58:a0:e7:b3:bf:09:ca:48:c9:85:c6:c5:d8:82: d7:e4:2f:87:fd:21:44:27:ad:16:0a:c1:86:cd:db:75: 8d:d9:cc:cf:3a:20:66:f9:35:71:c6:e5:54:ce:e6:8d: da:6d:87:4a:79:3b:5e:af:7e:a8:af:f0:58:69:14:51: 88:45:00:88:13:10:7a:62:8e:52:a8:e9:e0:ca:9a:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:52:71:cf:7d:4e:06:ae:2e:08:d8:1a:de:50:2d:aa: ef:74:54:f7:12:8d:49:e7:90:eb:3e:4c:de:2c:a6:57: c0:4b:16:54:65:2a:60:35:b6:2f:24:d3:3c:34:c6:5e: ae:0b:40:36:6f:7c:67:c2:e0:3e:53:b0:f8:d8:17:8a: c4:0e:9f:02:d0:1e:c5:ad:b7:cb:bd:4f:05:e9:29:bc: 70:51:4c:b0:10:d6:02:49:ff:73:1b:f6:fe:24:72:6d: 10:46:cf:79:e4:e3:48:11:ab:5b:55:1a:aa:17:30:db: f1:3f:33:12:15:2a:64:99:b7:b2:75:5d:37:a5:b9:b7: 7e:dd:9b:12:5d:b6:70:6d:32:b8:5b:ae:8b:23:a7:de: f9:5c:c0:5e:d1:15:0e:a4:e6:f2:92:6b:d5:14:41:e1: c0:a3:71:44:15:f9:e2:7b:5a:07:88:e4:d3:54:e1:03: 6d:6d:5e:5f:38:5f:87:60:bb:3b:18:38:69:b8:08:15: 43:f8:21:3c:1f:38:b9:68:b2:95:06:97:21:44:ca:d5: 9c:a8:b9:c3:07:03:a6:4a:94:8d:9e:de:47:17:ec:3e: e3:50:4d:19:18:96:83:ce:5b:26:89:37:53:9e:4c:73: 12:bc:42:87:e2:b1:42:6b:94:c4:8b:5a:71:c8:66:74 Fingerprint (SHA-256): B2:B6:E8:0F:A1:64:34:75:98:53:71:34:4B:4E:88:0B:A7:A0:46:24:B8:55:39:42:0D:12:2F:3F:3D:8D:D2:88 Fingerprint (SHA1): 12:12:94:BD:AC:A9:CD:77:C6:75:4F:A4:08:1A:1C:E1:50:E5:1E:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1240: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1241: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191233 (0x433ed501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:49 2025 Not After : Thu Nov 28 11:13:49 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:66:eb:04:c6:ea:e5:79:57:4a:36:d9:98:1d:da:5c: f0:6d:04:4b:5e:4f:27:0e:6d:85:b2:3b:a3:43:a0:f3: 4a:9e:be:15:e6:e1:80:72:6e:6a:28:19:b3:c7:61:65: 09:7f:67:4b:db:d8:67:27:13:92:7e:32:a1:97:06:14: 5c:bd:b0:5c:d5:ea:38:c5:8b:33:c0:18:e9:b9:8c:2a: 9e:ce:c3:5f:98:56:b0:3a:2b:87:e6:a1:7b:e7:98:02: e7:71:ab:39:62:54:81:87:d7:0b:8a:ca:59:97:00:48: 20:13:74:86:ff:88:73:3b:4b:be:c0:06:ed:b6:a1:27: 1c:fa:9b:86:56:74:30:a3:01:3f:3e:2c:a5:96:8c:76: 49:33:e9:05:1d:ba:a1:c1:b3:3a:6c:d4:32:d8:39:a2: f6:e6:42:5a:85:29:bc:1c:b9:8b:a2:d6:ae:a5:87:e7: 63:f4:4d:e3:e3:4b:b9:af:6f:83:a1:4b:87:b4:3f:1c: 31:34:fd:9c:4d:f3:2f:c7:e9:7e:4f:ce:ea:f8:4f:9d: fa:bc:fd:29:91:9f:3b:e5:a1:77:5a:6d:99:44:4b:df: 29:19:d9:61:42:87:95:ef:6a:a0:16:2e:1a:90:b0:33: 7f:01:2d:52:36:85:07:49:34:cc:ef:1c:4f:f2:e9:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:fa:b3:63:9d:3f:fd:b8:c3:aa:dd:33:5b:6e:5d:3b: 67:29:3d:66:fc:19:a6:7a:e7:08:de:00:72:80:b2:b2: e6:8e:38:35:3d:1d:b9:70:da:d8:12:07:1a:10:67:00: 6f:ad:ee:55:53:df:9b:01:c0:d7:40:e4:3b:40:e1:07: 5d:b5:f3:94:50:11:aa:9b:d0:a0:b5:e3:86:21:8e:49: 6b:35:85:54:7b:26:1e:2f:13:a5:ec:32:e1:ed:8c:9d: c2:bf:34:63:30:fb:3b:3f:7a:b3:14:40:a7:33:36:8c: f7:a5:30:2e:55:b1:bd:00:01:d5:21:90:e0:92:d4:9d: 8f:58:09:b0:f3:39:85:76:44:9e:1c:8d:80:ba:44:df: 95:8a:64:bc:f4:8c:fb:0a:f0:ca:a0:b1:cc:03:52:98: 10:04:49:71:97:d4:fe:99:bd:15:fc:72:e7:3e:6e:c5: 0b:14:ca:2d:f2:2b:f4:e0:5d:bf:d7:e6:2f:56:4a:06: e5:43:db:3a:1a:34:c2:22:46:f3:b6:8e:48:bd:1f:34: f4:23:da:fe:5a:df:79:a2:cb:e0:ee:1c:2d:81:63:31: 55:18:4f:dd:dc:28:8f:96:39:76:b5:62:e8:c5:db:c9: ce:9a:59:ec:df:0b:fb:98:1f:54:b8:df:6b:68:de:bd Fingerprint (SHA-256): F7:41:ED:D8:D6:F5:A3:E0:A4:5F:89:DA:A6:44:E8:50:0E:69:C8:55:CB:5B:98:9E:0A:78:F9:5D:31:05:7C:5E Fingerprint (SHA1): 7E:0B:F9:71:31:E7:E5:79:3F:4A:E2:A6:81:6E:D5:1A:F3:DC:AD:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1242: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1243: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191234 (0x433ed502) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:50 2025 Not After : Thu Nov 28 11:13:50 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:ef:75:83:85:06:4a:d2:d6:d1:a1:13:15:03:73:69: d9:58:46:18:1e:67:ca:64:ff:c2:f0:84:3a:85:8d:28: 14:aa:dc:b5:ce:7b:1e:8b:65:ba:ee:a2:8e:bb:ad:eb: 16:d0:75:29:6b:63:ed:05:01:b2:03:41:53:3e:10:2e: 6a:b8:21:a4:e4:9b:41:33:75:e2:fe:cf:ea:38:8c:8b: d1:11:b7:7e:71:3a:76:d5:3e:5e:43:7b:fe:9c:11:e5: 8e:6b:71:33:5d:47:56:4e:f3:af:10:87:a0:2f:6b:29: 4f:08:27:bc:12:56:4a:09:b1:bc:5b:6f:cd:03:d1:d1: 5a:6f:08:b4:9e:01:2b:ae:9a:bb:3e:d9:45:2f:99:15: ae:c7:e9:28:9c:eb:bf:d9:c9:89:54:bd:53:af:b9:da: c8:88:66:b7:6f:f1:fd:01:95:45:05:73:eb:bf:b8:11: c1:90:eb:e9:dc:7e:3f:5e:aa:30:25:81:c1:ee:5f:26: 9b:64:d8:c1:3f:33:89:c2:e3:6f:3a:7e:7d:af:37:16: f4:fe:af:43:d7:6f:0f:c2:de:5b:54:be:ab:09:5c:17: 02:ae:0a:f8:49:9f:9d:14:9f:7a:95:a2:b5:60:49:39: f0:52:19:03:2f:c7:b1:22:2d:1a:91:73:4b:4b:a8:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:4d:0d:de:f6:7f:63:e8:ed:32:df:63:6b:f5:41:29: d4:60:f8:92:1b:b5:e1:79:3e:c3:22:ea:e4:60:e9:73: c0:ad:01:df:2b:e8:34:ce:b0:55:9d:40:c5:ab:16:0f: e2:21:ad:3a:65:bf:c6:9d:ef:b1:ca:eb:e1:80:88:21: df:2f:ef:20:8c:02:36:b3:f7:bf:bf:c7:a1:32:75:09: 04:5b:4c:2e:a4:41:8a:71:11:89:7a:e6:0d:9f:61:a6: fa:80:d9:b3:76:75:9a:4d:c1:b3:85:93:36:7b:38:78: e4:7b:16:7a:47:a0:25:8c:ab:ca:4f:8f:6b:f4:cb:72: f8:45:bb:70:fc:15:23:27:47:30:69:ed:93:9d:74:1e: 01:fc:c8:1f:44:9d:44:5d:ce:e1:f7:aa:0c:2f:e0:19: fc:76:15:b9:ec:6c:dd:52:30:06:19:87:6b:1b:97:79: bf:13:ce:6c:e7:e9:6f:46:ad:51:77:c2:1a:3b:b3:e1: f9:66:d3:8e:8b:68:c4:80:af:db:11:8e:52:40:57:5d: 6b:e4:f9:36:35:ad:0a:a6:3d:a3:7b:81:38:5c:54:b2: 15:67:4b:ff:e7:d3:1d:83:fe:a7:df:57:bb:40:8e:8d: 14:89:66:4f:34:6b:28:d4:5b:ef:d2:45:6c:96:bd:41 Fingerprint (SHA-256): 69:48:08:A9:ED:61:7C:03:5E:FD:22:03:93:4E:EA:00:C3:E9:93:C0:3D:9C:8C:E9:3D:AE:17:5E:15:DD:0F:AE Fingerprint (SHA1): 92:CA:70:6A:1C:A1:2B:8B:9C:19:55:2C:FA:6C:47:D0:98:C9:16:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1244: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1245: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191232 (0x433ed500) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:48 2025 Not After : Thu Nov 28 11:13:48 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:6a:96:92:08:e6:aa:0f:c1:d0:62:29:44:57:08:e8: 71:b4:09:3e:ae:62:f6:c8:a8:01:32:9d:97:2f:b1:4e: 41:e1:c7:57:d0:1d:d0:cd:b7:93:b3:a2:40:1d:6c:c4: b6:ae:cf:b0:e6:94:43:1a:3a:bc:66:d2:f9:c1:3e:59: 8f:2e:1d:72:0f:c5:55:9f:be:da:2c:d6:b8:e5:6b:e2: e2:e7:01:62:30:46:65:36:53:80:0e:88:ef:53:66:f0: 85:ea:28:31:ba:ec:11:76:b2:f5:35:22:63:fb:4e:b6: 39:34:e2:67:e9:1b:ed:a7:2b:36:ca:1a:e2:d4:c3:6b: d9:e2:63:6f:35:50:9c:eb:0b:12:cb:ee:dd:6b:86:34: 0d:52:12:c5:24:1e:4f:10:5b:e2:c3:3a:ee:fd:34:bc: ab:00:46:92:69:fd:37:e2:f6:29:91:f0:b6:34:08:10: 44:82:58:a0:e7:b3:bf:09:ca:48:c9:85:c6:c5:d8:82: d7:e4:2f:87:fd:21:44:27:ad:16:0a:c1:86:cd:db:75: 8d:d9:cc:cf:3a:20:66:f9:35:71:c6:e5:54:ce:e6:8d: da:6d:87:4a:79:3b:5e:af:7e:a8:af:f0:58:69:14:51: 88:45:00:88:13:10:7a:62:8e:52:a8:e9:e0:ca:9a:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:52:71:cf:7d:4e:06:ae:2e:08:d8:1a:de:50:2d:aa: ef:74:54:f7:12:8d:49:e7:90:eb:3e:4c:de:2c:a6:57: c0:4b:16:54:65:2a:60:35:b6:2f:24:d3:3c:34:c6:5e: ae:0b:40:36:6f:7c:67:c2:e0:3e:53:b0:f8:d8:17:8a: c4:0e:9f:02:d0:1e:c5:ad:b7:cb:bd:4f:05:e9:29:bc: 70:51:4c:b0:10:d6:02:49:ff:73:1b:f6:fe:24:72:6d: 10:46:cf:79:e4:e3:48:11:ab:5b:55:1a:aa:17:30:db: f1:3f:33:12:15:2a:64:99:b7:b2:75:5d:37:a5:b9:b7: 7e:dd:9b:12:5d:b6:70:6d:32:b8:5b:ae:8b:23:a7:de: f9:5c:c0:5e:d1:15:0e:a4:e6:f2:92:6b:d5:14:41:e1: c0:a3:71:44:15:f9:e2:7b:5a:07:88:e4:d3:54:e1:03: 6d:6d:5e:5f:38:5f:87:60:bb:3b:18:38:69:b8:08:15: 43:f8:21:3c:1f:38:b9:68:b2:95:06:97:21:44:ca:d5: 9c:a8:b9:c3:07:03:a6:4a:94:8d:9e:de:47:17:ec:3e: e3:50:4d:19:18:96:83:ce:5b:26:89:37:53:9e:4c:73: 12:bc:42:87:e2:b1:42:6b:94:c4:8b:5a:71:c8:66:74 Fingerprint (SHA-256): B2:B6:E8:0F:A1:64:34:75:98:53:71:34:4B:4E:88:0B:A7:A0:46:24:B8:55:39:42:0D:12:2F:3F:3D:8D:D2:88 Fingerprint (SHA1): 12:12:94:BD:AC:A9:CD:77:C6:75:4F:A4:08:1A:1C:E1:50:E5:1E:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1246: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191232 (0x433ed500) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:48 2025 Not After : Thu Nov 28 11:13:48 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:6a:96:92:08:e6:aa:0f:c1:d0:62:29:44:57:08:e8: 71:b4:09:3e:ae:62:f6:c8:a8:01:32:9d:97:2f:b1:4e: 41:e1:c7:57:d0:1d:d0:cd:b7:93:b3:a2:40:1d:6c:c4: b6:ae:cf:b0:e6:94:43:1a:3a:bc:66:d2:f9:c1:3e:59: 8f:2e:1d:72:0f:c5:55:9f:be:da:2c:d6:b8:e5:6b:e2: e2:e7:01:62:30:46:65:36:53:80:0e:88:ef:53:66:f0: 85:ea:28:31:ba:ec:11:76:b2:f5:35:22:63:fb:4e:b6: 39:34:e2:67:e9:1b:ed:a7:2b:36:ca:1a:e2:d4:c3:6b: d9:e2:63:6f:35:50:9c:eb:0b:12:cb:ee:dd:6b:86:34: 0d:52:12:c5:24:1e:4f:10:5b:e2:c3:3a:ee:fd:34:bc: ab:00:46:92:69:fd:37:e2:f6:29:91:f0:b6:34:08:10: 44:82:58:a0:e7:b3:bf:09:ca:48:c9:85:c6:c5:d8:82: d7:e4:2f:87:fd:21:44:27:ad:16:0a:c1:86:cd:db:75: 8d:d9:cc:cf:3a:20:66:f9:35:71:c6:e5:54:ce:e6:8d: da:6d:87:4a:79:3b:5e:af:7e:a8:af:f0:58:69:14:51: 88:45:00:88:13:10:7a:62:8e:52:a8:e9:e0:ca:9a:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:52:71:cf:7d:4e:06:ae:2e:08:d8:1a:de:50:2d:aa: ef:74:54:f7:12:8d:49:e7:90:eb:3e:4c:de:2c:a6:57: c0:4b:16:54:65:2a:60:35:b6:2f:24:d3:3c:34:c6:5e: ae:0b:40:36:6f:7c:67:c2:e0:3e:53:b0:f8:d8:17:8a: c4:0e:9f:02:d0:1e:c5:ad:b7:cb:bd:4f:05:e9:29:bc: 70:51:4c:b0:10:d6:02:49:ff:73:1b:f6:fe:24:72:6d: 10:46:cf:79:e4:e3:48:11:ab:5b:55:1a:aa:17:30:db: f1:3f:33:12:15:2a:64:99:b7:b2:75:5d:37:a5:b9:b7: 7e:dd:9b:12:5d:b6:70:6d:32:b8:5b:ae:8b:23:a7:de: f9:5c:c0:5e:d1:15:0e:a4:e6:f2:92:6b:d5:14:41:e1: c0:a3:71:44:15:f9:e2:7b:5a:07:88:e4:d3:54:e1:03: 6d:6d:5e:5f:38:5f:87:60:bb:3b:18:38:69:b8:08:15: 43:f8:21:3c:1f:38:b9:68:b2:95:06:97:21:44:ca:d5: 9c:a8:b9:c3:07:03:a6:4a:94:8d:9e:de:47:17:ec:3e: e3:50:4d:19:18:96:83:ce:5b:26:89:37:53:9e:4c:73: 12:bc:42:87:e2:b1:42:6b:94:c4:8b:5a:71:c8:66:74 Fingerprint (SHA-256): B2:B6:E8:0F:A1:64:34:75:98:53:71:34:4B:4E:88:0B:A7:A0:46:24:B8:55:39:42:0D:12:2F:3F:3D:8D:D2:88 Fingerprint (SHA1): 12:12:94:BD:AC:A9:CD:77:C6:75:4F:A4:08:1A:1C:E1:50:E5:1E:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1247: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191233 (0x433ed501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:49 2025 Not After : Thu Nov 28 11:13:49 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:66:eb:04:c6:ea:e5:79:57:4a:36:d9:98:1d:da:5c: f0:6d:04:4b:5e:4f:27:0e:6d:85:b2:3b:a3:43:a0:f3: 4a:9e:be:15:e6:e1:80:72:6e:6a:28:19:b3:c7:61:65: 09:7f:67:4b:db:d8:67:27:13:92:7e:32:a1:97:06:14: 5c:bd:b0:5c:d5:ea:38:c5:8b:33:c0:18:e9:b9:8c:2a: 9e:ce:c3:5f:98:56:b0:3a:2b:87:e6:a1:7b:e7:98:02: e7:71:ab:39:62:54:81:87:d7:0b:8a:ca:59:97:00:48: 20:13:74:86:ff:88:73:3b:4b:be:c0:06:ed:b6:a1:27: 1c:fa:9b:86:56:74:30:a3:01:3f:3e:2c:a5:96:8c:76: 49:33:e9:05:1d:ba:a1:c1:b3:3a:6c:d4:32:d8:39:a2: f6:e6:42:5a:85:29:bc:1c:b9:8b:a2:d6:ae:a5:87:e7: 63:f4:4d:e3:e3:4b:b9:af:6f:83:a1:4b:87:b4:3f:1c: 31:34:fd:9c:4d:f3:2f:c7:e9:7e:4f:ce:ea:f8:4f:9d: fa:bc:fd:29:91:9f:3b:e5:a1:77:5a:6d:99:44:4b:df: 29:19:d9:61:42:87:95:ef:6a:a0:16:2e:1a:90:b0:33: 7f:01:2d:52:36:85:07:49:34:cc:ef:1c:4f:f2:e9:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:fa:b3:63:9d:3f:fd:b8:c3:aa:dd:33:5b:6e:5d:3b: 67:29:3d:66:fc:19:a6:7a:e7:08:de:00:72:80:b2:b2: e6:8e:38:35:3d:1d:b9:70:da:d8:12:07:1a:10:67:00: 6f:ad:ee:55:53:df:9b:01:c0:d7:40:e4:3b:40:e1:07: 5d:b5:f3:94:50:11:aa:9b:d0:a0:b5:e3:86:21:8e:49: 6b:35:85:54:7b:26:1e:2f:13:a5:ec:32:e1:ed:8c:9d: c2:bf:34:63:30:fb:3b:3f:7a:b3:14:40:a7:33:36:8c: f7:a5:30:2e:55:b1:bd:00:01:d5:21:90:e0:92:d4:9d: 8f:58:09:b0:f3:39:85:76:44:9e:1c:8d:80:ba:44:df: 95:8a:64:bc:f4:8c:fb:0a:f0:ca:a0:b1:cc:03:52:98: 10:04:49:71:97:d4:fe:99:bd:15:fc:72:e7:3e:6e:c5: 0b:14:ca:2d:f2:2b:f4:e0:5d:bf:d7:e6:2f:56:4a:06: e5:43:db:3a:1a:34:c2:22:46:f3:b6:8e:48:bd:1f:34: f4:23:da:fe:5a:df:79:a2:cb:e0:ee:1c:2d:81:63:31: 55:18:4f:dd:dc:28:8f:96:39:76:b5:62:e8:c5:db:c9: ce:9a:59:ec:df:0b:fb:98:1f:54:b8:df:6b:68:de:bd Fingerprint (SHA-256): F7:41:ED:D8:D6:F5:A3:E0:A4:5F:89:DA:A6:44:E8:50:0E:69:C8:55:CB:5B:98:9E:0A:78:F9:5D:31:05:7C:5E Fingerprint (SHA1): 7E:0B:F9:71:31:E7:E5:79:3F:4A:E2:A6:81:6E:D5:1A:F3:DC:AD:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1248: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191233 (0x433ed501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:13:49 2025 Not After : Thu Nov 28 11:13:49 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:66:eb:04:c6:ea:e5:79:57:4a:36:d9:98:1d:da:5c: f0:6d:04:4b:5e:4f:27:0e:6d:85:b2:3b:a3:43:a0:f3: 4a:9e:be:15:e6:e1:80:72:6e:6a:28:19:b3:c7:61:65: 09:7f:67:4b:db:d8:67:27:13:92:7e:32:a1:97:06:14: 5c:bd:b0:5c:d5:ea:38:c5:8b:33:c0:18:e9:b9:8c:2a: 9e:ce:c3:5f:98:56:b0:3a:2b:87:e6:a1:7b:e7:98:02: e7:71:ab:39:62:54:81:87:d7:0b:8a:ca:59:97:00:48: 20:13:74:86:ff:88:73:3b:4b:be:c0:06:ed:b6:a1:27: 1c:fa:9b:86:56:74:30:a3:01:3f:3e:2c:a5:96:8c:76: 49:33:e9:05:1d:ba:a1:c1:b3:3a:6c:d4:32:d8:39:a2: f6:e6:42:5a:85:29:bc:1c:b9:8b:a2:d6:ae:a5:87:e7: 63:f4:4d:e3:e3:4b:b9:af:6f:83:a1:4b:87:b4:3f:1c: 31:34:fd:9c:4d:f3:2f:c7:e9:7e:4f:ce:ea:f8:4f:9d: fa:bc:fd:29:91:9f:3b:e5:a1:77:5a:6d:99:44:4b:df: 29:19:d9:61:42:87:95:ef:6a:a0:16:2e:1a:90:b0:33: 7f:01:2d:52:36:85:07:49:34:cc:ef:1c:4f:f2:e9:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:fa:b3:63:9d:3f:fd:b8:c3:aa:dd:33:5b:6e:5d:3b: 67:29:3d:66:fc:19:a6:7a:e7:08:de:00:72:80:b2:b2: e6:8e:38:35:3d:1d:b9:70:da:d8:12:07:1a:10:67:00: 6f:ad:ee:55:53:df:9b:01:c0:d7:40:e4:3b:40:e1:07: 5d:b5:f3:94:50:11:aa:9b:d0:a0:b5:e3:86:21:8e:49: 6b:35:85:54:7b:26:1e:2f:13:a5:ec:32:e1:ed:8c:9d: c2:bf:34:63:30:fb:3b:3f:7a:b3:14:40:a7:33:36:8c: f7:a5:30:2e:55:b1:bd:00:01:d5:21:90:e0:92:d4:9d: 8f:58:09:b0:f3:39:85:76:44:9e:1c:8d:80:ba:44:df: 95:8a:64:bc:f4:8c:fb:0a:f0:ca:a0:b1:cc:03:52:98: 10:04:49:71:97:d4:fe:99:bd:15:fc:72:e7:3e:6e:c5: 0b:14:ca:2d:f2:2b:f4:e0:5d:bf:d7:e6:2f:56:4a:06: e5:43:db:3a:1a:34:c2:22:46:f3:b6:8e:48:bd:1f:34: f4:23:da:fe:5a:df:79:a2:cb:e0:ee:1c:2d:81:63:31: 55:18:4f:dd:dc:28:8f:96:39:76:b5:62:e8:c5:db:c9: ce:9a:59:ec:df:0b:fb:98:1f:54:b8:df:6b:68:de:bd Fingerprint (SHA-256): F7:41:ED:D8:D6:F5:A3:E0:A4:5F:89:DA:A6:44:E8:50:0E:69:C8:55:CB:5B:98:9E:0A:78:F9:5D:31:05:7C:5E Fingerprint (SHA1): 7E:0B:F9:71:31:E7:E5:79:3F:4A:E2:A6:81:6E:D5:1A:F3:DC:AD:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1249: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191234 (0x433ed502) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:50 2025 Not After : Thu Nov 28 11:13:50 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:ef:75:83:85:06:4a:d2:d6:d1:a1:13:15:03:73:69: d9:58:46:18:1e:67:ca:64:ff:c2:f0:84:3a:85:8d:28: 14:aa:dc:b5:ce:7b:1e:8b:65:ba:ee:a2:8e:bb:ad:eb: 16:d0:75:29:6b:63:ed:05:01:b2:03:41:53:3e:10:2e: 6a:b8:21:a4:e4:9b:41:33:75:e2:fe:cf:ea:38:8c:8b: d1:11:b7:7e:71:3a:76:d5:3e:5e:43:7b:fe:9c:11:e5: 8e:6b:71:33:5d:47:56:4e:f3:af:10:87:a0:2f:6b:29: 4f:08:27:bc:12:56:4a:09:b1:bc:5b:6f:cd:03:d1:d1: 5a:6f:08:b4:9e:01:2b:ae:9a:bb:3e:d9:45:2f:99:15: ae:c7:e9:28:9c:eb:bf:d9:c9:89:54:bd:53:af:b9:da: c8:88:66:b7:6f:f1:fd:01:95:45:05:73:eb:bf:b8:11: c1:90:eb:e9:dc:7e:3f:5e:aa:30:25:81:c1:ee:5f:26: 9b:64:d8:c1:3f:33:89:c2:e3:6f:3a:7e:7d:af:37:16: f4:fe:af:43:d7:6f:0f:c2:de:5b:54:be:ab:09:5c:17: 02:ae:0a:f8:49:9f:9d:14:9f:7a:95:a2:b5:60:49:39: f0:52:19:03:2f:c7:b1:22:2d:1a:91:73:4b:4b:a8:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:4d:0d:de:f6:7f:63:e8:ed:32:df:63:6b:f5:41:29: d4:60:f8:92:1b:b5:e1:79:3e:c3:22:ea:e4:60:e9:73: c0:ad:01:df:2b:e8:34:ce:b0:55:9d:40:c5:ab:16:0f: e2:21:ad:3a:65:bf:c6:9d:ef:b1:ca:eb:e1:80:88:21: df:2f:ef:20:8c:02:36:b3:f7:bf:bf:c7:a1:32:75:09: 04:5b:4c:2e:a4:41:8a:71:11:89:7a:e6:0d:9f:61:a6: fa:80:d9:b3:76:75:9a:4d:c1:b3:85:93:36:7b:38:78: e4:7b:16:7a:47:a0:25:8c:ab:ca:4f:8f:6b:f4:cb:72: f8:45:bb:70:fc:15:23:27:47:30:69:ed:93:9d:74:1e: 01:fc:c8:1f:44:9d:44:5d:ce:e1:f7:aa:0c:2f:e0:19: fc:76:15:b9:ec:6c:dd:52:30:06:19:87:6b:1b:97:79: bf:13:ce:6c:e7:e9:6f:46:ad:51:77:c2:1a:3b:b3:e1: f9:66:d3:8e:8b:68:c4:80:af:db:11:8e:52:40:57:5d: 6b:e4:f9:36:35:ad:0a:a6:3d:a3:7b:81:38:5c:54:b2: 15:67:4b:ff:e7:d3:1d:83:fe:a7:df:57:bb:40:8e:8d: 14:89:66:4f:34:6b:28:d4:5b:ef:d2:45:6c:96:bd:41 Fingerprint (SHA-256): 69:48:08:A9:ED:61:7C:03:5E:FD:22:03:93:4E:EA:00:C3:E9:93:C0:3D:9C:8C:E9:3D:AE:17:5E:15:DD:0F:AE Fingerprint (SHA1): 92:CA:70:6A:1C:A1:2B:8B:9C:19:55:2C:FA:6C:47:D0:98:C9:16:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1250: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191234 (0x433ed502) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:13:50 2025 Not After : Thu Nov 28 11:13:50 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:ef:75:83:85:06:4a:d2:d6:d1:a1:13:15:03:73:69: d9:58:46:18:1e:67:ca:64:ff:c2:f0:84:3a:85:8d:28: 14:aa:dc:b5:ce:7b:1e:8b:65:ba:ee:a2:8e:bb:ad:eb: 16:d0:75:29:6b:63:ed:05:01:b2:03:41:53:3e:10:2e: 6a:b8:21:a4:e4:9b:41:33:75:e2:fe:cf:ea:38:8c:8b: d1:11:b7:7e:71:3a:76:d5:3e:5e:43:7b:fe:9c:11:e5: 8e:6b:71:33:5d:47:56:4e:f3:af:10:87:a0:2f:6b:29: 4f:08:27:bc:12:56:4a:09:b1:bc:5b:6f:cd:03:d1:d1: 5a:6f:08:b4:9e:01:2b:ae:9a:bb:3e:d9:45:2f:99:15: ae:c7:e9:28:9c:eb:bf:d9:c9:89:54:bd:53:af:b9:da: c8:88:66:b7:6f:f1:fd:01:95:45:05:73:eb:bf:b8:11: c1:90:eb:e9:dc:7e:3f:5e:aa:30:25:81:c1:ee:5f:26: 9b:64:d8:c1:3f:33:89:c2:e3:6f:3a:7e:7d:af:37:16: f4:fe:af:43:d7:6f:0f:c2:de:5b:54:be:ab:09:5c:17: 02:ae:0a:f8:49:9f:9d:14:9f:7a:95:a2:b5:60:49:39: f0:52:19:03:2f:c7:b1:22:2d:1a:91:73:4b:4b:a8:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:4d:0d:de:f6:7f:63:e8:ed:32:df:63:6b:f5:41:29: d4:60:f8:92:1b:b5:e1:79:3e:c3:22:ea:e4:60:e9:73: c0:ad:01:df:2b:e8:34:ce:b0:55:9d:40:c5:ab:16:0f: e2:21:ad:3a:65:bf:c6:9d:ef:b1:ca:eb:e1:80:88:21: df:2f:ef:20:8c:02:36:b3:f7:bf:bf:c7:a1:32:75:09: 04:5b:4c:2e:a4:41:8a:71:11:89:7a:e6:0d:9f:61:a6: fa:80:d9:b3:76:75:9a:4d:c1:b3:85:93:36:7b:38:78: e4:7b:16:7a:47:a0:25:8c:ab:ca:4f:8f:6b:f4:cb:72: f8:45:bb:70:fc:15:23:27:47:30:69:ed:93:9d:74:1e: 01:fc:c8:1f:44:9d:44:5d:ce:e1:f7:aa:0c:2f:e0:19: fc:76:15:b9:ec:6c:dd:52:30:06:19:87:6b:1b:97:79: bf:13:ce:6c:e7:e9:6f:46:ad:51:77:c2:1a:3b:b3:e1: f9:66:d3:8e:8b:68:c4:80:af:db:11:8e:52:40:57:5d: 6b:e4:f9:36:35:ad:0a:a6:3d:a3:7b:81:38:5c:54:b2: 15:67:4b:ff:e7:d3:1d:83:fe:a7:df:57:bb:40:8e:8d: 14:89:66:4f:34:6b:28:d4:5b:ef:d2:45:6c:96:bd:41 Fingerprint (SHA-256): 69:48:08:A9:ED:61:7C:03:5E:FD:22:03:93:4E:EA:00:C3:E9:93:C0:3D:9C:8C:E9:3D:AE:17:5E:15:DD:0F:AE Fingerprint (SHA1): 92:CA:70:6A:1C:A1:2B:8B:9C:19:55:2C:FA:6C:47:D0:98:C9:16:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1251: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1252: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191237 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1253: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1254: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1255: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1256: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191238 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1257: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1258: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1259: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1260: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191239 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1261: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1262: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1263: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1264: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128191240 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1265: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1266: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1267: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1268: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191241 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1269: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1270: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1271: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1272: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191242 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1273: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1274: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1275: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1276: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128191243 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1277: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1278: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1279: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1280: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1281: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1282: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1283: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191237 (0x433ed505) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:54 2025 Not After : Thu Nov 28 11:13:54 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:0c:f9:78:fd:e5:46:e2:ed:a0:e6:63:d6:db:00:d4: 53:1c:79:b6:72:1c:fd:7d:ab:dd:61:52:d0:65:0c:5c: 63:36:d4:8a:de:b8:85:70:d7:d8:33:d7:92:53:ea:60: cd:8b:a3:94:4f:48:2d:5c:29:a3:26:84:c6:aa:0d:1c: dd:f1:fe:d8:3c:f8:32:c4:8a:06:d3:71:85:83:ca:a8: 34:6d:7d:85:bb:e0:e0:ed:21:f8:60:23:c6:d4:80:93: 36:9d:8b:14:34:c7:a9:80:7b:ca:23:81:dc:53:55:fc: 3e:be:89:de:64:f2:09:7c:da:bc:e9:f1:80:c7:49:42: 63:98:ef:bb:c9:d1:2b:34:12:fb:f5:89:61:b0:10:19: 17:50:54:68:fa:a2:a2:31:e5:c2:a2:a4:1b:fb:3d:12: 2e:d2:fc:db:20:8a:a2:e2:55:bc:5c:4c:6a:35:21:dc: da:f6:1e:1a:0d:ac:f7:1d:6f:8d:07:d5:95:93:0e:9b: 67:06:7a:93:7d:be:c7:52:da:64:1e:2d:5e:b3:c8:91: 54:45:8f:73:f5:10:cb:92:66:83:17:ed:4d:a5:49:40: fb:53:84:c8:25:45:4d:22:79:43:83:85:55:a8:de:4a: b9:a9:39:e6:51:99:d4:af:76:4d:e3:e9:5f:e2:b2:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:9e:16:2d:0c:4f:9c:ac:c8:1a:25:3c:2b:4e:08:8d: d5:ca:5d:f6:1d:bb:89:e2:1f:81:06:2c:ce:67:2e:dc: b4:c9:52:4a:3a:bf:a9:6c:9f:3e:b7:08:74:e2:49:67: aa:29:13:17:fc:77:1a:84:09:18:c7:21:d6:27:74:6c: ea:33:dc:06:0b:55:c3:e9:c6:39:55:6e:d0:6f:b6:b1: e1:71:92:7e:dc:0a:f3:db:d1:15:67:2f:ce:bd:b7:ca: 7b:96:bc:e9:8a:b9:f1:e2:c3:a9:49:8f:56:a3:45:0d: db:ea:05:6b:89:68:e0:44:84:5b:28:aa:4d:46:19:99: 82:3f:a9:77:16:8a:44:3b:ae:29:07:ca:08:56:ee:6e: 80:7e:25:ca:97:c6:48:3f:e5:e3:94:10:80:7d:ff:08: 6f:04:3a:41:8c:8c:01:64:79:75:e6:44:8d:6b:fb:b6: f0:f1:5a:60:10:d7:4e:3e:ba:26:3a:d8:52:13:27:88: 26:a0:74:9a:2c:1d:e1:c5:6b:61:4e:e9:d2:f0:73:0d: df:51:6c:ff:ea:11:79:ba:71:fe:a2:ea:1a:7a:0d:e1: 89:61:ac:1e:8a:bc:61:3e:e7:bb:40:55:64:73:48:62: 35:18:aa:22:eb:78:85:49:b6:62:d2:57:3b:05:d9:7d Fingerprint (SHA-256): 1B:09:32:69:3F:17:62:A2:8C:45:AE:60:19:39:D4:C5:71:82:3D:06:32:E1:F5:8A:04:64:55:3B:03:08:83:3E Fingerprint (SHA1): 1C:5E:4C:8E:D0:7E:F8:A8:CD:94:B3:F9:44:CC:C6:DC:EA:CE:29:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1284: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1285: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1286: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1287: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191237 (0x433ed505) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:13:54 2025 Not After : Thu Nov 28 11:13:54 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:0c:f9:78:fd:e5:46:e2:ed:a0:e6:63:d6:db:00:d4: 53:1c:79:b6:72:1c:fd:7d:ab:dd:61:52:d0:65:0c:5c: 63:36:d4:8a:de:b8:85:70:d7:d8:33:d7:92:53:ea:60: cd:8b:a3:94:4f:48:2d:5c:29:a3:26:84:c6:aa:0d:1c: dd:f1:fe:d8:3c:f8:32:c4:8a:06:d3:71:85:83:ca:a8: 34:6d:7d:85:bb:e0:e0:ed:21:f8:60:23:c6:d4:80:93: 36:9d:8b:14:34:c7:a9:80:7b:ca:23:81:dc:53:55:fc: 3e:be:89:de:64:f2:09:7c:da:bc:e9:f1:80:c7:49:42: 63:98:ef:bb:c9:d1:2b:34:12:fb:f5:89:61:b0:10:19: 17:50:54:68:fa:a2:a2:31:e5:c2:a2:a4:1b:fb:3d:12: 2e:d2:fc:db:20:8a:a2:e2:55:bc:5c:4c:6a:35:21:dc: da:f6:1e:1a:0d:ac:f7:1d:6f:8d:07:d5:95:93:0e:9b: 67:06:7a:93:7d:be:c7:52:da:64:1e:2d:5e:b3:c8:91: 54:45:8f:73:f5:10:cb:92:66:83:17:ed:4d:a5:49:40: fb:53:84:c8:25:45:4d:22:79:43:83:85:55:a8:de:4a: b9:a9:39:e6:51:99:d4:af:76:4d:e3:e9:5f:e2:b2:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:9e:16:2d:0c:4f:9c:ac:c8:1a:25:3c:2b:4e:08:8d: d5:ca:5d:f6:1d:bb:89:e2:1f:81:06:2c:ce:67:2e:dc: b4:c9:52:4a:3a:bf:a9:6c:9f:3e:b7:08:74:e2:49:67: aa:29:13:17:fc:77:1a:84:09:18:c7:21:d6:27:74:6c: ea:33:dc:06:0b:55:c3:e9:c6:39:55:6e:d0:6f:b6:b1: e1:71:92:7e:dc:0a:f3:db:d1:15:67:2f:ce:bd:b7:ca: 7b:96:bc:e9:8a:b9:f1:e2:c3:a9:49:8f:56:a3:45:0d: db:ea:05:6b:89:68:e0:44:84:5b:28:aa:4d:46:19:99: 82:3f:a9:77:16:8a:44:3b:ae:29:07:ca:08:56:ee:6e: 80:7e:25:ca:97:c6:48:3f:e5:e3:94:10:80:7d:ff:08: 6f:04:3a:41:8c:8c:01:64:79:75:e6:44:8d:6b:fb:b6: f0:f1:5a:60:10:d7:4e:3e:ba:26:3a:d8:52:13:27:88: 26:a0:74:9a:2c:1d:e1:c5:6b:61:4e:e9:d2:f0:73:0d: df:51:6c:ff:ea:11:79:ba:71:fe:a2:ea:1a:7a:0d:e1: 89:61:ac:1e:8a:bc:61:3e:e7:bb:40:55:64:73:48:62: 35:18:aa:22:eb:78:85:49:b6:62:d2:57:3b:05:d9:7d Fingerprint (SHA-256): 1B:09:32:69:3F:17:62:A2:8C:45:AE:60:19:39:D4:C5:71:82:3D:06:32:E1:F5:8A:04:64:55:3B:03:08:83:3E Fingerprint (SHA1): 1C:5E:4C:8E:D0:7E:F8:A8:CD:94:B3:F9:44:CC:C6:DC:EA:CE:29:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1288: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1289: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1290: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191244 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1292: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191245 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128191246 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128191247 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128191248 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128191249 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128191250 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128191251 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128191252 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128191253 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128191254 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128191255 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128191256 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128191257 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128191258 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128191259 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128191260 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128191261 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128191262 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128191263 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128191264 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128191265 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128191266 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1382: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128191267 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1383: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1384: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1385: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1386: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128191268 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1387: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1388: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1389: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1390: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128191269 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1391: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1392: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1393: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1394: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128191270 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1395: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1396: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1397: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1398: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128191271 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1399: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1400: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1401: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1402: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128191272 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1403: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1404: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1405: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1406: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128191273 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1407: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1408: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1409: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1410: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1411: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1412: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1413: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1414: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1415: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1416: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1417: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1418: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1419: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1420: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1421: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1422: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1423: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1424: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1425: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1426: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1427: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1428: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1429: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1430: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1431: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191244 (0x433ed50c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:14:00 2025 Not After : Thu Nov 28 11:14:00 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:a2:86:fc:6d:98:76:43:d4:21:12:96:c2:a5:e9:6b: b1:c0:89:6e:8a:80:75:a5:d8:2d:7b:c8:fb:5f:ff:f2: 76:6b:cd:34:1b:7c:d0:fe:ac:88:dd:88:7e:20:11:ad: 06:0b:0f:f3:0a:e2:b1:9d:de:67:81:05:43:79:07:08: 41:33:51:54:29:e8:57:27:ac:41:ef:bc:48:4a:48:1c: 35:46:51:69:af:29:14:00:89:7c:0a:4c:a6:b0:a9:13: 68:62:44:5c:03:5d:19:a2:87:1d:5c:45:0d:c8:8f:a8: c9:5c:09:23:03:bc:db:f8:5d:6d:e8:20:34:44:4a:66: 83:cd:33:db:f5:ca:d9:8c:e6:fe:9d:2f:a3:78:99:58: 51:75:cf:9e:e1:5f:43:e7:66:aa:ee:1c:a0:12:7f:26: 11:05:7e:6d:8a:db:13:90:a8:dd:1c:2b:fb:34:50:e5: 7a:a0:38:b1:bc:b3:60:51:33:6e:79:76:ec:83:50:86: 85:c0:15:f9:80:ce:50:7c:06:64:e6:4b:93:56:d0:73: 53:71:b5:57:65:07:43:ad:2f:4c:75:82:00:90:36:88: 7d:5c:c1:80:c3:5e:a0:a4:46:da:33:f4:0f:f7:b0:a0: 4e:b1:c6:0c:6f:ad:1d:b7:8c:91:7e:bf:de:4f:fa:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:fd:ec:67:7c:20:b6:82:3d:9b:05:28:46:00:af:fb: 0d:2f:3b:f1:11:67:df:a6:bc:6b:6c:b0:ef:62:f5:26: 97:5a:72:2a:b6:82:da:be:0f:cc:ad:30:38:46:06:79: 2c:cc:c8:3e:e8:93:5a:02:23:de:25:12:b7:8a:99:22: d3:b3:ad:44:fa:b3:8a:38:1f:ee:0b:cc:6f:64:35:d1: d9:a3:eb:c3:b4:85:11:3b:a5:f9:01:69:55:9b:84:1d: 56:53:5e:15:a4:43:03:72:99:3c:e9:35:e2:ea:3b:59: 98:ba:11:8b:8f:22:26:9d:d2:71:0b:19:25:ed:72:9e: c0:6a:99:39:70:03:f7:fe:fe:a4:69:00:56:d3:cd:99: 9f:ae:c3:4f:e8:d1:8f:22:56:02:00:d2:30:f1:a2:4d: 01:4e:94:99:b3:8e:8d:90:43:b8:2c:22:3f:73:94:24: 2b:b8:64:52:7b:2d:a2:8e:bf:08:18:96:22:29:8e:fb: 50:5b:cb:21:5e:c5:28:8a:a7:a3:e3:5f:db:81:6d:71: 88:ba:14:1d:18:f2:bd:27:c2:70:3d:98:33:01:05:3a: ac:22:3c:ab:2f:e3:6b:b2:39:b8:e2:be:e4:83:95:ad: 14:d5:5a:22:47:25:ca:66:4a:c8:89:ec:92:37:99:e9 Fingerprint (SHA-256): 91:4B:D5:6D:1E:62:E2:6C:4B:C2:AD:4C:6D:11:F1:B8:3D:43:C4:BB:7D:C8:00:C6:63:1E:BF:16:CF:DE:9C:AC Fingerprint (SHA1): C4:7D:DE:18:E8:D5:D2:8C:7C:8D:8B:BB:08:94:00:05:0F:83:D1:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1432: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1433: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1434: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191274 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1435: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1436: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1437: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1438: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128191275 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1439: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1440: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1441: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1442: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128191276 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1443: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1444: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1445: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1446: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128191277 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1447: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1448: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1449: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1450: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128191278 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1451: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1452: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1453: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1454: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128191279 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1455: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1456: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1457: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1458: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128191280 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1459: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1460: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1461: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191274 (0x433ed52a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:24 2025 Not After : Thu Nov 28 11:14:24 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:49:62:cb:59:68:98:8a:00:fb:6a:ad:93:7d:30:59: f3:e4:dd:e8:ff:33:57:f3:a6:ed:f7:13:46:21:28:9d: 17:b1:de:13:2d:af:59:e2:93:ca:af:e9:67:73:36:6e: da:76:51:4f:06:25:ee:6b:4a:5c:70:a5:6c:4e:a0:ad: 31:95:ed:99:fb:95:a7:91:91:bb:81:fa:75:90:5b:de: 3a:66:26:61:fd:89:08:21:67:d7:01:45:2c:1a:74:e7: b6:b1:11:d4:b0:40:24:94:da:0d:07:cc:34:a2:2c:51: ec:ea:8a:39:7e:85:16:d7:5f:a2:e6:49:ce:e2:39:f5: 3b:d8:aa:e1:6f:62:8c:fc:25:b6:c3:f5:a8:3c:64:6a: d3:9b:39:fc:fd:2a:16:c7:91:1c:a1:21:34:8d:91:ef: f2:6a:be:5f:2d:91:d8:02:59:44:d4:94:b6:ec:5c:a1: c5:52:5c:f9:29:ea:5d:8f:1a:51:5c:8d:88:1b:9b:c8: d6:5f:5e:24:09:a9:0b:e5:08:3d:e7:a9:77:4d:4e:af: df:ce:0d:13:6e:12:6f:43:b6:50:cf:d4:bd:f0:a6:6f: 20:3b:9c:d8:6c:79:3b:33:c1:25:36:31:68:6f:f0:62: 40:e7:d1:12:37:ea:c1:a6:cb:aa:e4:47:a3:e9:01:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:68:78:6a:f1:92:8a:86:45:ca:4b:0a:71:a4:dc:1c: ee:4a:62:60:0c:ca:6b:81:e0:96:bb:72:87:a8:aa:f1: a0:c8:2f:07:53:c2:9c:b0:5c:e8:d0:f8:5c:de:1e:8f: 3f:b1:ad:74:20:50:dc:e2:68:8c:89:75:3f:bb:36:c7: 68:d2:24:f7:d7:f4:51:f6:4b:5e:b2:c7:4c:c2:3f:25: c7:35:85:c9:d4:d6:40:7f:32:2a:50:16:6d:68:33:39: 31:8a:d3:46:a0:67:55:c2:33:78:17:cd:f1:82:2d:d8: e8:7d:0a:c2:e2:36:63:ee:57:3d:34:83:0a:8f:24:32: 97:3b:2c:a7:64:2d:50:f1:d3:99:a2:26:8d:74:85:4a: 03:e1:45:87:f0:6b:74:1f:4b:9b:fc:3a:53:05:19:7e: 5d:0d:8f:21:22:cc:d8:5a:f6:2d:0c:79:e9:1a:41:ae: e2:89:df:23:9c:f7:3a:20:c1:89:b2:e3:4a:f7:a2:00: f7:69:ec:88:87:93:48:e4:d3:6a:97:6a:f5:07:9f:ab: cd:85:d4:b2:a6:9a:d5:ad:2e:1c:6a:79:37:47:f1:1c: 3a:25:6f:89:3b:cf:83:c2:ae:b9:39:07:74:a3:d0:a8: 5e:f3:44:ed:13:8d:59:69:56:f3:ac:4b:6b:f8:db:09 Fingerprint (SHA-256): 73:09:20:5F:87:A1:FA:BC:CF:13:5D:0D:FF:91:BE:FA:1C:8B:3F:79:97:10:CA:0D:2A:16:D4:8C:7E:5A:F5:A2 Fingerprint (SHA1): 68:7C:C1:BC:74:EC:E7:FE:C1:4F:15:2A:B6:37:13:4F:D9:BE:9B:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1462: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1463: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1465: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191274 (0x433ed52a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:24 2025 Not After : Thu Nov 28 11:14:24 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:49:62:cb:59:68:98:8a:00:fb:6a:ad:93:7d:30:59: f3:e4:dd:e8:ff:33:57:f3:a6:ed:f7:13:46:21:28:9d: 17:b1:de:13:2d:af:59:e2:93:ca:af:e9:67:73:36:6e: da:76:51:4f:06:25:ee:6b:4a:5c:70:a5:6c:4e:a0:ad: 31:95:ed:99:fb:95:a7:91:91:bb:81:fa:75:90:5b:de: 3a:66:26:61:fd:89:08:21:67:d7:01:45:2c:1a:74:e7: b6:b1:11:d4:b0:40:24:94:da:0d:07:cc:34:a2:2c:51: ec:ea:8a:39:7e:85:16:d7:5f:a2:e6:49:ce:e2:39:f5: 3b:d8:aa:e1:6f:62:8c:fc:25:b6:c3:f5:a8:3c:64:6a: d3:9b:39:fc:fd:2a:16:c7:91:1c:a1:21:34:8d:91:ef: f2:6a:be:5f:2d:91:d8:02:59:44:d4:94:b6:ec:5c:a1: c5:52:5c:f9:29:ea:5d:8f:1a:51:5c:8d:88:1b:9b:c8: d6:5f:5e:24:09:a9:0b:e5:08:3d:e7:a9:77:4d:4e:af: df:ce:0d:13:6e:12:6f:43:b6:50:cf:d4:bd:f0:a6:6f: 20:3b:9c:d8:6c:79:3b:33:c1:25:36:31:68:6f:f0:62: 40:e7:d1:12:37:ea:c1:a6:cb:aa:e4:47:a3:e9:01:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:68:78:6a:f1:92:8a:86:45:ca:4b:0a:71:a4:dc:1c: ee:4a:62:60:0c:ca:6b:81:e0:96:bb:72:87:a8:aa:f1: a0:c8:2f:07:53:c2:9c:b0:5c:e8:d0:f8:5c:de:1e:8f: 3f:b1:ad:74:20:50:dc:e2:68:8c:89:75:3f:bb:36:c7: 68:d2:24:f7:d7:f4:51:f6:4b:5e:b2:c7:4c:c2:3f:25: c7:35:85:c9:d4:d6:40:7f:32:2a:50:16:6d:68:33:39: 31:8a:d3:46:a0:67:55:c2:33:78:17:cd:f1:82:2d:d8: e8:7d:0a:c2:e2:36:63:ee:57:3d:34:83:0a:8f:24:32: 97:3b:2c:a7:64:2d:50:f1:d3:99:a2:26:8d:74:85:4a: 03:e1:45:87:f0:6b:74:1f:4b:9b:fc:3a:53:05:19:7e: 5d:0d:8f:21:22:cc:d8:5a:f6:2d:0c:79:e9:1a:41:ae: e2:89:df:23:9c:f7:3a:20:c1:89:b2:e3:4a:f7:a2:00: f7:69:ec:88:87:93:48:e4:d3:6a:97:6a:f5:07:9f:ab: cd:85:d4:b2:a6:9a:d5:ad:2e:1c:6a:79:37:47:f1:1c: 3a:25:6f:89:3b:cf:83:c2:ae:b9:39:07:74:a3:d0:a8: 5e:f3:44:ed:13:8d:59:69:56:f3:ac:4b:6b:f8:db:09 Fingerprint (SHA-256): 73:09:20:5F:87:A1:FA:BC:CF:13:5D:0D:FF:91:BE:FA:1C:8B:3F:79:97:10:CA:0D:2A:16:D4:8C:7E:5A:F5:A2 Fingerprint (SHA1): 68:7C:C1:BC:74:EC:E7:FE:C1:4F:15:2A:B6:37:13:4F:D9:BE:9B:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1466: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1467: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1468: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1469: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191281 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1470: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1471: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1472: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1473: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191282 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1474: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1475: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1476: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1477: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191283 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1478: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1479: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1480: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1481: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191284 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1482: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1483: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1484: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1485: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1486: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1487: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191281 (0x433ed531) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:29 2025 Not After : Thu Nov 28 11:14:29 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:45:54:d0:49:7b:5b:ff:49:d4:64:a7:fe:eb:10:2d: 88:56:6c:cb:82:f6:25:b1:e2:58:d7:81:26:cc:1e:de: a7:10:99:c7:6a:69:a5:32:61:d3:96:94:45:64:40:8c: 3c:7f:92:e5:80:57:09:3a:73:a4:4a:42:11:4e:33:cc: b5:43:30:f1:b0:c9:22:26:83:5e:0c:29:b6:62:00:56: 2c:13:a5:17:50:46:98:89:9f:59:6a:ce:63:1e:2d:a2: ac:94:03:8f:c0:fb:34:ef:31:73:b9:3e:d4:a7:f1:a1: 03:68:16:cd:65:db:b5:9c:52:5e:e0:cd:a4:5c:3e:1f: 6b:80:2c:f5:8a:02:b4:b7:8e:e9:19:33:11:23:40:2a: 43:d3:46:0b:f5:cb:c2:dc:1f:01:cf:67:47:51:50:4e: dd:43:e6:67:c3:0f:bf:ff:06:6f:ab:b3:ad:8d:9a:6c: 91:ff:3a:11:84:46:18:1f:05:b7:b4:40:b5:d2:48:39: e8:34:e3:ae:bd:9c:b5:8d:96:30:bd:45:67:aa:d2:3f: d4:62:8b:bd:ae:46:43:fd:16:36:95:77:8e:8f:51:39: d5:7f:c3:21:19:51:62:c7:0b:48:65:e9:68:21:ea:11: bf:1c:1f:6c:f3:d3:19:56:e6:2c:f0:a0:db:43:12:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:c2:51:09:89:87:44:87:7b:9c:3f:57:db:ad:66:62: da:f7:cd:38:83:4b:f5:3d:f7:a6:bb:be:4b:44:fd:b8: 13:75:51:d1:13:10:fa:64:7e:aa:7a:e8:54:98:12:d1: 01:95:aa:0a:74:a7:cb:cc:46:a2:85:6a:eb:fc:ab:71: fc:b2:48:db:36:92:cf:03:72:f8:25:7c:8f:a1:c1:e2: c8:fe:2c:ee:49:35:55:c8:0f:cf:18:9e:02:fb:25:4c: 4a:3a:ce:fe:ea:ce:b6:2f:f3:b0:19:62:1e:23:ef:24: 8f:4c:73:8d:05:4e:0b:d1:84:3e:b7:63:32:2b:d9:dd: f4:b3:7e:3c:96:b8:3c:79:36:06:cd:d3:3c:45:14:7a: 9c:3e:1b:dd:84:d4:4a:cc:65:6b:ae:82:27:c2:24:8a: 16:99:0e:e8:81:1f:f3:b5:f1:57:8d:46:08:4f:f4:05: 95:fc:5e:7b:e9:41:56:f0:b4:b2:e9:86:41:41:13:e5: 28:28:63:43:d3:40:d2:b2:93:48:b7:4b:7c:9b:da:a3: 71:16:7b:19:1c:8a:23:52:f9:3c:fd:bf:aa:72:bc:0f: 0f:0f:8e:8f:3c:1a:e2:06:4b:a3:bc:9e:bd:ea:88:4c: 89:6f:db:31:e4:de:9d:f1:7d:1f:0e:6e:7d:8b:3a:ec Fingerprint (SHA-256): 89:CE:20:DB:EE:CF:5F:E3:4E:FF:FB:4F:E6:BF:29:47:4A:EA:BC:C8:4E:9A:A0:43:D5:2F:2F:A2:DB:5B:7D:4D Fingerprint (SHA1): 71:6B:CD:AE:09:3E:78:F8:81:9E:BE:8A:B3:08:CF:EB:02:1F:94:DB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1488: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1489: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1490: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191282 (0x433ed532) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:30 2025 Not After : Thu Nov 28 11:14:30 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:2b:45:08:bd:c3:d8:64:c8:d1:ec:a0:83:9c:28:9a: 1e:52:47:70:c8:a0:7e:4e:44:9e:c0:2e:90:eb:da:ae: 43:ed:ed:2a:c3:80:57:6a:f9:71:c0:25:c6:2a:37:b8: e4:f4:19:c8:15:75:da:0f:71:f4:5e:2a:d6:26:60:3a: bb:2e:6e:67:d6:09:60:d2:b8:d7:ab:f1:49:d2:3d:35: 5e:a5:53:87:08:c4:c8:01:92:09:83:00:fc:11:ca:a6: 63:56:48:3e:c4:4e:a0:cd:33:26:71:b6:c1:b6:76:61: dc:15:cd:e0:25:89:d5:48:53:11:d5:aa:98:db:d5:c0: 2d:6e:2d:89:78:84:9b:78:86:06:9b:8d:ae:26:fe:8c: 53:d3:82:5d:fa:87:39:ab:0b:ce:6b:1b:c1:df:f1:65: f4:9f:d7:43:58:c2:53:65:22:37:ce:6f:7f:93:52:6e: be:28:90:74:a1:be:08:3e:6a:01:94:58:c5:04:11:86: 4d:d4:28:06:df:87:84:a2:d0:95:97:ea:f9:45:7d:c4: 40:4d:2f:af:f7:cd:98:80:c8:3a:bd:12:eb:9f:62:ef: 10:f8:55:e6:20:ad:8f:72:98:30:35:b4:f1:3e:2c:9a: 66:09:10:dd:08:a2:d2:fa:07:c0:b2:9c:e3:e7:d1:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:0c:67:ab:f0:9e:8f:76:d8:7c:c5:55:54:16:f3:be: 20:61:b5:2d:d1:57:ec:9c:73:a4:97:32:80:ee:9b:c5: dd:3a:95:5e:0b:2b:85:76:4b:a7:a0:a7:44:06:65:e9: 33:d1:44:d1:df:b2:45:0d:a4:5f:99:c3:21:b0:d4:64: 34:c1:f0:a9:d5:5f:0f:36:37:47:3f:20:d5:46:77:6b: bf:9f:02:e6:f1:18:82:7a:fd:0c:ae:a1:b1:fb:c3:e5: 45:3a:1d:b8:5c:cb:b7:5b:72:f0:4a:4b:49:e8:42:1a: 26:df:54:b5:62:79:1c:59:68:5f:33:16:56:f9:3d:21: 26:c8:cc:2a:dd:05:50:19:84:2c:cb:59:52:27:d5:ac: 5a:57:fe:3c:7f:74:68:33:16:d2:a7:aa:70:1f:04:9c: 4a:29:07:10:31:4c:12:ca:8e:5b:1c:91:72:e0:07:cc: 85:ae:9d:f7:a5:32:d0:1f:bd:18:87:03:b2:a0:a4:f9: 46:24:9e:c9:0b:b5:bb:89:61:00:d0:6a:1c:ad:dc:26: 13:d2:e2:5d:cf:d8:ff:54:aa:2e:b8:26:9f:e0:9b:0f: 2b:0b:b5:f9:4a:05:5d:4e:81:6a:8b:a3:d4:6a:36:57: c0:fd:7f:6a:0a:d6:e7:ae:f5:b4:cf:71:7f:83:b3:c7 Fingerprint (SHA-256): 8C:52:3F:72:07:67:E2:4A:80:A2:F7:A9:FD:D6:C4:36:3C:CD:3E:43:38:EF:5C:AD:4B:68:55:5A:31:F9:67:24 Fingerprint (SHA1): 91:8C:4D:B0:25:52:27:24:ED:51:BC:15:F5:2D:48:E4:48:4C:67:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1491: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1492: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191283 (0x433ed533) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:14:30 2025 Not After : Thu Nov 28 11:14:30 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ac:29:78:fb:15:22:73:41:1c:34:27:62:c3:61:df: 3c:fa:ad:0e:96:33:9b:18:1d:78:9a:72:97:ee:69:c7: d1:d3:e8:ca:cf:40:51:ae:b5:45:c1:ab:13:1f:f8:0d: 6d:dd:20:cf:42:5b:28:8f:82:e2:a1:d1:19:7c:5a:09: b5:20:d5:32:86:d0:f0:7e:a9:b0:95:0c:8a:73:b9:05: 9b:2f:12:63:12:e8:46:ba:09:ae:bf:52:4b:65:ce:bb: fb:55:99:40:9c:0e:a8:f1:8a:57:31:5b:6b:19:d1:96: 15:46:ec:4f:ec:8c:dd:32:fc:ea:0f:0e:77:3d:df:04: a5:e5:c2:4d:3d:32:cd:e6:1e:3b:a1:87:67:ac:b5:6f: 26:04:e3:65:1c:a7:bb:20:de:55:06:b9:25:6d:af:eb: 83:c6:fc:7a:e4:d0:49:44:b4:a3:73:70:4a:b8:aa:8f: 71:81:c0:9e:50:c3:e5:b4:98:77:e7:b4:7d:a4:ff:f9: e9:a3:ed:da:c4:87:95:9f:7d:4e:6e:bd:38:32:0a:2a: 9a:b2:67:c4:ba:48:92:22:f2:9e:e9:7e:70:79:39:26: d4:8e:4d:04:42:9b:ed:6e:c5:fa:7b:b9:11:b7:7f:a5: 78:a4:1e:05:91:64:14:66:fc:9d:58:6a:2e:0d:42:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:ab:03:b1:31:31:c7:ea:4f:26:9b:05:ef:63:d5:0f: b0:b5:93:a6:7c:f2:29:af:2e:37:78:b9:04:21:68:c7: 72:c9:52:38:ee:12:24:1a:de:79:b6:8a:74:d5:8c:65: 41:5a:f2:a8:e5:fb:22:92:0c:c7:44:31:b4:3f:09:0d: ea:28:2c:fb:e1:b3:22:5f:b4:b6:64:59:31:59:0d:e1: f4:13:1a:23:1c:28:d1:f7:62:d7:c8:39:11:33:b0:c6: 0b:0e:bd:e6:68:dd:c2:ce:97:6d:39:6d:5c:9a:13:2e: 6a:f2:94:3e:5a:0e:26:83:b8:6e:0c:e7:13:eb:a9:c9: a1:bc:ca:51:43:63:21:a1:2f:37:5d:b2:94:da:ca:22: 14:ff:6b:e9:47:33:48:ca:c3:b1:8b:87:28:3a:d1:bc: ef:d2:f4:56:13:54:6b:5a:2b:05:7d:d3:5e:b4:19:a6: d6:80:3f:50:ca:76:c9:cf:00:97:50:eb:22:bc:67:b4: 42:5d:34:12:8f:e8:94:5c:ef:36:58:6e:db:d4:f9:e8: df:8c:99:d9:63:6c:73:92:06:ce:cd:a3:51:f0:86:33: 50:13:12:9e:2e:66:af:2f:fb:10:40:be:01:a7:d5:52: cb:88:71:7b:5c:78:36:e9:b7:f5:4e:a0:e8:79:37:43 Fingerprint (SHA-256): FA:6A:64:35:A4:07:9E:EE:BD:C8:43:7D:A9:B6:F1:DF:0F:0D:65:24:E2:8F:0F:62:FF:58:9B:7C:F1:AE:5B:09 Fingerprint (SHA1): 3B:38:49:39:D0:EB:9A:69:29:37:68:7E:E8:71:06:8E:BA:4A:01:71 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1493: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1494: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191285 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1495: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1496: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1497: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1498: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191286 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1499: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1500: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1501: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1502: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191287 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1503: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1504: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1505: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1506: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128191288 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1507: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1508: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1509: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1510: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128191289 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1511: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1512: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1513: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1514: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1515: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1516: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1517: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191285 (0x433ed535) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:32 2025 Not After : Thu Nov 28 11:14:32 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:31:da:08:67:97:58:10:d6:e5:c2:77:0e:61:6f:37: 21:12:a9:89:be:8a:13:6f:6e:4d:b0:e5:bf:5f:02:9d: a8:df:ba:f5:fc:89:e8:ee:d8:3a:85:7d:c6:a7:b7:31: f2:9f:4f:a1:80:9d:30:de:57:ee:dd:25:42:8d:a8:b7: 1a:ea:be:57:64:75:11:25:d5:d5:fc:20:20:e3:82:93: 59:18:d7:62:94:16:85:4a:66:bb:96:a6:ea:22:88:62: 48:3d:33:ee:e5:3f:d4:c2:e3:a1:64:d8:7f:76:1a:79: 39:b3:c3:95:3e:a1:86:09:2a:86:19:ae:f0:25:e8:64: cd:bf:08:a8:e0:2d:22:8e:86:06:eb:76:52:1e:7d:a6: d6:50:7c:42:ee:9d:14:e5:09:a2:3d:d1:ca:62:40:09: 09:50:c3:33:12:e4:bb:db:4a:2c:63:7e:de:2b:d8:31: 58:83:fa:d7:55:91:b2:77:e9:ee:3e:4e:8a:32:4a:1f: d5:70:b4:0a:34:95:23:b5:d6:53:aa:22:b3:8a:a5:03: 24:e6:b6:f8:64:e8:1d:88:58:84:28:ad:ff:a1:6d:7d: 6d:22:f6:a1:e7:36:2d:92:a7:03:65:71:b2:bb:ef:b4: 53:58:5e:7f:73:08:a1:57:57:e4:0e:b9:13:95:bf:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:5a:2c:15:30:1e:4f:4b:2d:a1:4c:54:dc:ce:63:4f: cc:99:12:9b:6e:4b:19:5b:da:f6:ab:c5:ce:97:28:1c: 90:4b:08:7a:14:d4:27:22:43:40:5b:43:e6:34:a5:6b: b4:8b:9f:f1:cc:92:4d:34:1b:fa:49:36:a2:ce:a2:ad: d7:3f:b6:b2:bd:04:bb:72:e0:50:76:95:da:0a:ff:7d: 24:13:6e:03:22:2a:38:7f:61:a3:88:02:86:4d:76:d2: 4c:85:70:04:18:51:55:ab:ef:95:d0:f0:05:b0:c0:f0: 4f:50:7d:d0:b7:81:11:3b:71:76:04:eb:a8:dd:17:01: 57:48:58:af:b5:e7:e3:37:8b:88:d4:ca:31:cd:21:6a: f2:29:98:78:e2:4e:60:eb:9a:24:2f:b9:c0:8b:a2:a6: 87:2b:1d:b0:7f:8c:52:5a:41:5f:23:d0:33:07:eb:91: a3:b5:03:46:24:52:b1:ab:1f:c4:73:7d:4c:bd:c8:4d: 6c:31:71:7d:2f:62:b9:57:6f:8d:ac:7e:91:d1:cf:b4: 05:d3:ea:4d:c3:9a:d2:80:a7:41:95:42:a2:10:99:55: c0:06:bf:bc:53:99:d9:8a:fd:11:43:2c:c0:27:07:28: a4:b8:59:16:89:e4:13:0f:e9:48:2d:1d:7a:fd:66:48 Fingerprint (SHA-256): FF:71:BC:1A:53:E8:81:FB:4B:9A:56:DB:AC:F1:B1:EF:CA:30:9A:54:BF:01:3B:CF:F8:E8:04:29:F1:6D:89:D6 Fingerprint (SHA1): 73:B1:B7:A8:66:50:39:CC:AE:4E:20:F0:F5:BD:DF:5E:25:9C:55:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1518: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1519: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191286 (0x433ed536) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:33 2025 Not After : Thu Nov 28 11:14:33 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:ef:39:1f:f2:03:a7:13:b6:30:0b:4c:c2:da:b6:9a: 61:f4:1f:74:3d:07:51:21:7a:c8:81:66:58:2d:a2:c1: d9:be:c9:6f:06:b1:c3:cb:51:d4:3b:a0:8c:b8:b6:98: c1:d5:e7:c2:51:f2:bb:c0:e0:84:4f:f7:b2:a8:6d:bb: 3c:2f:6a:b9:77:22:9c:c1:ee:d6:53:02:ed:3c:45:d6: a7:3b:5e:8c:38:fe:74:56:8c:75:b7:3c:d8:5e:29:49: 5c:6e:d0:ac:ec:fd:7b:da:2d:0d:e2:b2:c3:b8:de:fb: a2:34:d3:f6:71:2e:77:87:1d:92:e6:a9:e1:6d:fe:4b: f2:f1:68:60:13:0b:02:6b:69:b8:0d:26:b3:ef:27:46: 3e:c1:a5:2b:82:bb:85:e3:bf:d4:07:3f:85:a8:ca:db: de:2b:3b:6c:a4:e0:e5:b3:f8:6a:53:b6:16:b4:46:38: dc:76:9d:eb:a6:d0:a1:32:d0:de:f4:98:e8:db:4d:10: 5c:2b:68:f6:62:64:90:0b:af:09:e1:18:8f:6f:cb:6e: 16:cf:0e:e9:3e:d1:fb:30:aa:90:4b:ac:c8:48:fd:fd: b2:7e:17:81:b2:89:25:96:eb:c4:e8:ca:db:8d:ec:17: 1e:e0:75:56:8e:93:b7:2a:b9:44:ee:cb:27:89:f4:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:fe:06:e6:7f:a3:3f:21:74:17:f7:40:2a:0e:35:cd: 09:49:99:c7:7a:3a:1d:de:31:39:e1:6b:20:65:e0:95: 29:1f:64:a5:a7:d5:48:9b:76:24:2a:61:d7:73:14:4a: bf:5e:b2:c7:b0:81:25:c1:1f:ed:2c:48:53:14:b5:2a: 7a:fd:3b:ea:b4:78:3a:06:f3:a7:c9:72:8e:05:5d:f2: 85:58:5a:75:a1:ca:3d:f5:ea:e2:1b:f0:15:36:29:bf: 4f:90:e9:3c:01:58:4f:cf:bc:5a:a5:15:21:23:aa:d0: 51:26:37:ca:18:e8:93:59:b0:33:bb:50:de:83:21:0b: e4:a5:88:78:b1:3d:29:52:3a:1c:6c:73:73:5c:fc:03: b0:e0:3f:02:f0:ab:76:70:4b:72:a5:dc:80:a9:97:be: 0a:4b:04:0d:8a:ec:de:8c:47:97:fb:0b:b2:0e:5e:e7: f0:9d:36:6e:1e:00:32:45:83:ee:00:89:ee:82:10:69: 73:78:2e:5d:d4:16:2a:94:83:45:d3:c0:17:b8:9c:13: b4:bc:90:5e:22:3c:1e:dd:c1:6e:45:fa:3a:cb:8a:a9: 47:28:08:7b:30:a0:7d:6f:b8:b9:d4:81:81:0c:40:bd: 98:9d:6e:e0:4e:3f:a1:65:ee:26:f6:c1:b6:f4:85:b7 Fingerprint (SHA-256): 31:67:D5:B1:E9:A8:B3:28:40:95:67:29:F3:16:14:B7:8C:66:89:7A:26:4B:06:34:2F:31:7E:E5:3A:8C:56:EC Fingerprint (SHA1): E3:9D:40:79:2A:72:CD:1C:2F:F0:40:E6:73:A1:25:E3:D9:4B:1D:D1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1520: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1521: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1522: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191287 (0x433ed537) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:14:33 2025 Not After : Thu Nov 28 11:14:33 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:e9:16:d3:06:7d:b2:86:85:2a:8d:82:92:46:8d:2b: 94:c6:77:b7:8a:68:48:e4:04:43:8d:3e:40:0c:b4:7c: 0d:0d:fe:30:d5:b1:55:d7:31:d2:82:99:0c:3b:d0:aa: 42:e0:fe:68:e0:12:6d:1c:42:d9:1c:43:e3:14:cf:d8: 56:15:99:27:40:2f:bc:0d:9b:b7:6b:bb:0c:30:f7:20: 7e:be:1a:7d:73:62:2e:25:79:14:04:99:05:12:c7:31: 5c:0e:8a:4c:96:66:f4:4e:b8:4e:a0:4c:00:e4:20:07: 86:d5:9e:01:eb:ad:51:82:ab:bf:e4:ea:c1:21:76:c8: 48:8a:8a:db:1e:2d:b7:44:ac:8d:df:1a:bd:14:b9:85: 32:5a:2f:6f:14:fa:20:6a:9f:fc:03:1d:da:cb:e2:14: 19:71:cd:77:93:6b:1b:30:93:77:5c:8e:5f:2a:56:0b: a6:44:e6:1f:d9:33:34:96:03:f6:4b:c1:a8:ca:f3:c6: 79:23:09:b0:47:1e:76:3b:41:7e:05:99:12:56:2a:d3: fb:cd:eb:38:98:f1:62:d7:bd:bb:aa:a0:a9:01:ab:8a: 7c:08:6a:f9:05:64:63:51:68:21:50:49:ce:aa:fa:1d: 74:ea:59:de:29:9c:a1:c6:05:07:20:6a:5e:8d:9e:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:67:fe:ff:7c:07:3d:31:f1:e6:89:d6:97:f0:c4:d7: 6e:e1:90:28:59:fb:e6:e9:1d:2d:ab:84:40:db:5f:8d: d3:fa:70:f9:ae:ae:8d:cc:3b:1e:2f:ce:98:c6:84:75: e6:5f:1a:3e:9b:b6:09:e1:3f:51:a1:d7:c1:b0:e2:f4: 2a:96:d2:53:f7:42:45:4a:97:53:f1:15:ef:42:a0:de: e1:07:90:b1:dd:43:68:27:72:4f:8c:d5:24:f4:0c:e0: 3a:ef:6d:f2:2d:e8:b7:65:32:90:19:2b:d4:a7:0f:db: b3:02:6b:1c:06:01:55:3a:eb:f5:f6:1a:26:b1:06:f4: 8a:3c:5b:76:9e:19:f4:de:ca:a4:e5:de:30:9e:d3:12: 7d:dd:0c:d8:03:4a:0d:18:02:7b:25:89:54:7d:2c:54: fe:8c:29:5a:91:7b:14:67:8c:37:7e:da:3b:c7:49:d4: 3f:ff:0e:92:1b:62:78:82:f0:60:c8:19:68:1d:e1:06: 05:83:c6:65:1f:23:37:d8:99:1d:22:2b:84:5d:86:3c: 87:4a:78:39:59:3f:aa:0e:de:b4:24:5d:24:9d:0c:ca: a2:64:e2:cf:61:65:7c:ca:ff:87:4e:e5:68:05:f2:8c: 4c:9d:d0:66:86:4b:85:a8:30:db:c6:3c:ab:fa:10:ae Fingerprint (SHA-256): 09:90:9A:E9:A8:AA:58:7F:6F:BA:FE:B6:2B:57:09:6F:F3:BF:06:09:1D:8E:58:79:57:78:01:16:33:A8:F3:4D Fingerprint (SHA1): AF:FE:11:BA:E8:8D:36:1F:D0:32:BF:7E:78:12:DC:C3:37:08:A6:FF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1523: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1524: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191290 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1525: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1526: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1527: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1528: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191291 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1529: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1530: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1531: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1532: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191292 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128191053.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1533: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1534: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1535: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1536: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191293 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1537: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1538: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1539: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191290 (0x433ed53a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:36 2025 Not After : Thu Nov 28 11:14:36 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:c7:81:24:08:70:3b:d7:fa:98:e3:1e:2e:47:27:69: 58:1a:e8:e5:c8:5d:32:af:09:27:91:9e:42:df:04:8e: 7a:50:e8:72:d9:f0:6e:08:18:2c:02:d1:34:cc:56:19: 6e:6b:90:33:d4:ef:f8:57:3b:bd:58:f9:f2:3f:a3:31: 73:5f:08:0b:f8:a0:8b:18:81:91:80:69:84:7c:4a:60: 24:11:ce:33:31:70:54:a1:59:99:65:ba:ed:48:9c:ed: 4e:a4:39:f2:85:aa:50:eb:6d:59:23:b8:a3:73:94:81: 51:d9:bb:20:8b:52:20:d8:d0:1f:95:1b:e3:fa:de:2f: b8:8a:78:38:29:5a:04:cc:b6:9e:8b:84:10:40:8d:51: 9a:7c:0e:8f:2d:7a:23:c9:31:a0:31:42:59:05:3b:1d: ba:f5:24:f8:8b:99:94:d2:98:51:09:65:20:20:01:3e: ff:7f:13:5f:b9:f1:9e:c5:5d:e6:d5:ab:d7:dd:7e:71: 2f:63:bc:45:cb:0e:d2:e5:ba:61:5f:53:aa:42:b0:68: 1b:26:ae:9e:82:b0:42:60:9e:9b:8c:f1:fc:70:ef:69: 79:49:ad:97:6b:ac:8b:5f:23:1d:dc:a8:a3:b4:e5:4c: 93:47:63:f4:ee:68:a4:b0:94:01:71:f3:0f:07:f7:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:d1:4c:46:32:ed:cf:d6:ee:d9:e0:42:c5:7f:14:a2: a6:90:8d:e8:67:cb:53:a8:b6:79:e2:0c:15:76:20:d0: 62:27:b3:fc:3a:d6:4a:8c:51:d1:4d:4e:d4:1f:d5:77: b1:37:6f:f8:71:9d:4c:8e:be:ec:8b:e5:3a:94:fd:50: f6:97:d4:c5:7e:50:8e:5c:4e:e2:b5:62:2c:e4:d9:7e: a9:74:e8:3d:48:8c:a3:7e:d6:da:75:9c:0e:81:1a:11: 57:46:da:71:21:92:13:79:3f:46:9a:a9:2e:1a:b7:77: 21:14:2d:9a:60:df:e6:b4:d8:61:1a:41:af:43:a7:70: fe:f8:47:35:1d:dd:16:02:47:72:99:83:2f:5d:05:4c: d6:06:50:69:f6:df:85:77:4a:e0:d4:c8:f0:1e:f7:78: 4e:c4:42:aa:fb:ef:42:bd:85:ee:1b:6e:8a:59:ae:fb: 6e:cb:30:3c:9a:f2:b5:2b:0c:27:26:cb:c7:66:a6:f0: 20:86:8b:94:28:6a:f3:96:2f:35:1d:af:d1:c7:81:49: 67:ea:28:70:a0:fa:28:98:7b:6e:32:55:b2:5d:51:f7: bc:d4:1b:56:c8:80:21:3c:27:1a:27:e1:ca:d7:41:25: bd:94:65:9e:60:b8:f9:ec:78:93:23:6f:a0:1b:33:24 Fingerprint (SHA-256): 2D:78:3A:1A:27:D8:5D:67:9A:13:C6:C4:47:F7:74:CA:75:04:60:30:9C:E7:BA:75:8E:9D:05:20:7C:37:E3:4F Fingerprint (SHA1): 3D:92:C6:03:6D:7D:F1:49:DD:5D:67:AF:41:98:6E:70:B8:C1:4A:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1540: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1541: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191294 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1543: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1544: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191295 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1546: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1547: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1548: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191296 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1549: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1550: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191297 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1551: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1552: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1553: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1554: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1555: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191298 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191054.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1557: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1558: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1559: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191299 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1560: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1561: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1562: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191294 (0x433ed53e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:14:39 2025 Not After : Thu Nov 28 11:14:39 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:d8:d3:77:ba:d9:73:68:5b:c8:6b:3d:8b:b5:90:c7: 18:c0:f6:da:57:a4:7e:b3:aa:2c:68:9f:31:08:8a:3b: 6c:36:7a:fc:58:d9:5a:4a:1a:75:c1:7e:c9:e4:f5:88: 04:30:6e:99:a8:76:fe:f6:b7:d2:b0:f3:92:22:3b:01: eb:33:9e:89:f6:65:69:59:0a:ee:dd:8e:1a:b3:32:ab: 06:0a:a8:31:ab:c9:01:a6:5b:f5:97:87:35:0c:c2:fc: 7c:b9:f0:40:0c:11:c6:73:77:87:47:ff:26:c0:ef:53: dc:33:3d:53:6f:a0:a9:36:c7:62:12:c2:6e:33:1c:70: 07:1b:86:f1:d6:85:b0:a1:45:6e:46:9d:18:7c:6d:a3: e8:10:7b:14:3e:50:2e:da:22:31:0c:60:f8:f0:a8:3b: 3d:ab:be:c0:23:e9:b9:76:97:3c:7e:c5:bd:e4:ea:7d: 23:76:5a:18:32:60:78:ba:b6:ef:6d:90:ea:f2:13:b7: af:46:4a:73:d5:73:a2:f0:81:06:d1:5b:47:01:e8:e9: ae:f4:e9:28:de:e6:87:25:4f:4c:d9:57:21:09:22:e5: 40:41:1d:59:ca:1e:59:69:bf:4a:c3:96:31:0b:64:70: f1:bd:e8:3c:7c:b4:b5:0a:15:ca:d2:86:8a:13:87:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:bd:b0:ee:8b:ff:ef:50:7f:be:a4:f0:21:78:28:f7: 35:37:c3:7e:91:60:fe:a7:c8:8f:e8:c7:79:b3:40:8a: 50:2b:2c:80:e8:64:e4:2d:7b:fa:4e:96:9d:53:95:b8: 34:82:d6:20:0b:2b:f7:2c:01:75:78:28:de:77:1f:30: af:61:04:4c:84:e4:fd:c3:b8:81:b6:3d:ee:5b:ec:78: 9e:95:62:91:05:1a:5c:5d:40:36:eb:ea:9d:fa:5d:6d: 83:b3:da:5d:56:90:87:3f:74:01:99:9e:ed:9f:01:b7: 1d:4b:b4:2a:f1:67:d3:3b:b8:7f:f4:37:72:f6:c3:9e: 83:be:90:9a:f8:8f:8d:ad:3a:a5:2d:7a:84:40:8b:b6: 86:31:77:16:68:1b:d3:ca:6e:69:3f:14:2b:cd:13:36: cc:81:72:d1:73:83:17:3b:d7:e1:15:ab:8e:36:e5:2f: 5b:e3:5f:01:ed:6c:95:56:61:6d:c3:17:cb:79:4f:ac: dd:db:23:65:db:7c:93:5b:88:d9:9a:67:1a:98:be:a8: 5c:99:71:81:35:fc:3b:df:9c:6c:0a:69:99:e0:88:0b: 46:1e:8a:76:ad:9e:bf:6a:25:37:bb:14:98:d4:b8:1c: 7f:ac:89:ad:03:aa:9b:33:70:c8:9a:4d:7a:2c:61:17 Fingerprint (SHA-256): 37:32:45:0F:76:BD:70:34:44:EF:D0:64:4A:6B:31:58:2D:B9:E0:E9:73:6E:A2:58:11:AF:AA:9B:FE:77:C2:14 Fingerprint (SHA1): A8:50:D7:7F:8A:4A:4A:BD:D7:67:21:79:BB:B9:E4:31:51:07:F2:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1563: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191295 (0x433ed53f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:39 2025 Not After : Thu Nov 28 11:14:39 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:95:88:59:34:27:57:e9:75:e1:52:07:ef:52:8e:61: 2c:84:a0:0c:21:43:9a:e8:e5:58:6c:46:fa:11:62:01: ee:7a:0e:6b:6c:50:51:21:3b:0c:17:24:ae:85:c6:6b: c9:d5:37:65:40:fb:90:6d:2c:b4:9a:d1:4e:44:c5:9c: 77:dc:6f:e5:a8:f8:55:2b:74:ce:4d:5e:8c:86:35:66: e4:0e:1a:1d:4e:fd:a5:23:da:1f:f3:c7:cc:9d:89:44: ee:da:62:58:51:22:1f:6b:7d:08:2a:f9:18:7d:80:8c: 6d:39:6c:a1:3f:18:86:0c:cc:97:ab:d5:b8:b3:8c:41: 20:57:33:f1:6a:5d:71:4b:2e:69:ee:28:43:df:45:32: a3:dc:c7:81:a2:13:02:8f:4e:b5:fb:38:9f:97:8a:d1: 4a:b5:c7:34:49:44:73:9e:59:4f:31:4a:2b:33:bd:39: 65:20:44:95:60:83:28:c2:e7:bd:33:07:51:6f:9f:68: ad:b5:05:66:37:78:b5:01:31:a5:ba:21:2f:11:fa:fc: 93:ee:b7:c9:ad:c9:20:d9:bb:9e:69:7d:81:9b:be:98: a2:98:2d:0f:21:f8:f4:80:2e:fe:b6:65:63:7a:fe:b6: c8:c9:86:04:61:3b:d4:11:2e:57:63:62:6b:73:77:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:f9:59:68:51:b1:c5:0a:d7:29:c0:16:48:8b:5f:d2: 73:53:e6:90:33:d4:cf:41:2a:e9:d9:b1:17:e8:a4:b4: 1e:1b:d0:53:f8:e8:72:fc:00:aa:cb:48:8e:9e:ff:cb: 0a:91:ec:e5:b8:a3:27:0a:67:fa:5b:18:a4:94:97:67: 4a:84:e3:7b:98:77:7c:ab:fc:c7:65:3d:8e:c0:12:c3: e0:1e:91:4e:9b:06:5d:41:df:ad:d0:56:53:cd:f8:e6: ac:0e:09:06:40:54:0d:ac:fe:76:35:35:8f:15:0c:95: 50:98:f1:50:2b:c7:a5:19:1a:18:b5:e3:e9:54:a1:14: c7:e2:75:2d:d6:4a:4d:9e:14:8a:0d:5f:3b:e8:69:25: 57:31:56:6d:95:11:ba:57:a6:e0:84:35:76:be:22:1d: 58:7f:9b:46:6a:0d:bf:1f:9f:1e:8a:cd:e0:6d:f3:54: 11:e5:3d:36:a1:ad:17:7e:d0:94:12:50:a8:04:a8:66: 68:3d:76:78:56:1b:80:96:6c:be:ea:9e:d4:3d:1c:28: 47:a2:7a:7e:17:bd:e8:1f:e4:01:be:be:3c:47:bd:a6: 4b:74:c8:a8:c2:7e:12:25:7f:56:19:23:9c:59:62:6b: a9:5f:a2:e6:05:11:10:8b:27:3f:5e:f0:2e:34:e0:63 Fingerprint (SHA-256): 22:A1:2C:65:6F:30:FA:EE:34:F7:57:AC:6A:6E:7C:CC:08:2D:32:48:C3:15:59:28:F5:2B:7E:F4:A3:33:A1:4D Fingerprint (SHA1): E7:2D:53:52:78:42:52:9A:37:46:88:8A:8C:A8:0D:17:56:F6:F4:1F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1564: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191295 (0x433ed53f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:39 2025 Not After : Thu Nov 28 11:14:39 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:95:88:59:34:27:57:e9:75:e1:52:07:ef:52:8e:61: 2c:84:a0:0c:21:43:9a:e8:e5:58:6c:46:fa:11:62:01: ee:7a:0e:6b:6c:50:51:21:3b:0c:17:24:ae:85:c6:6b: c9:d5:37:65:40:fb:90:6d:2c:b4:9a:d1:4e:44:c5:9c: 77:dc:6f:e5:a8:f8:55:2b:74:ce:4d:5e:8c:86:35:66: e4:0e:1a:1d:4e:fd:a5:23:da:1f:f3:c7:cc:9d:89:44: ee:da:62:58:51:22:1f:6b:7d:08:2a:f9:18:7d:80:8c: 6d:39:6c:a1:3f:18:86:0c:cc:97:ab:d5:b8:b3:8c:41: 20:57:33:f1:6a:5d:71:4b:2e:69:ee:28:43:df:45:32: a3:dc:c7:81:a2:13:02:8f:4e:b5:fb:38:9f:97:8a:d1: 4a:b5:c7:34:49:44:73:9e:59:4f:31:4a:2b:33:bd:39: 65:20:44:95:60:83:28:c2:e7:bd:33:07:51:6f:9f:68: ad:b5:05:66:37:78:b5:01:31:a5:ba:21:2f:11:fa:fc: 93:ee:b7:c9:ad:c9:20:d9:bb:9e:69:7d:81:9b:be:98: a2:98:2d:0f:21:f8:f4:80:2e:fe:b6:65:63:7a:fe:b6: c8:c9:86:04:61:3b:d4:11:2e:57:63:62:6b:73:77:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:f9:59:68:51:b1:c5:0a:d7:29:c0:16:48:8b:5f:d2: 73:53:e6:90:33:d4:cf:41:2a:e9:d9:b1:17:e8:a4:b4: 1e:1b:d0:53:f8:e8:72:fc:00:aa:cb:48:8e:9e:ff:cb: 0a:91:ec:e5:b8:a3:27:0a:67:fa:5b:18:a4:94:97:67: 4a:84:e3:7b:98:77:7c:ab:fc:c7:65:3d:8e:c0:12:c3: e0:1e:91:4e:9b:06:5d:41:df:ad:d0:56:53:cd:f8:e6: ac:0e:09:06:40:54:0d:ac:fe:76:35:35:8f:15:0c:95: 50:98:f1:50:2b:c7:a5:19:1a:18:b5:e3:e9:54:a1:14: c7:e2:75:2d:d6:4a:4d:9e:14:8a:0d:5f:3b:e8:69:25: 57:31:56:6d:95:11:ba:57:a6:e0:84:35:76:be:22:1d: 58:7f:9b:46:6a:0d:bf:1f:9f:1e:8a:cd:e0:6d:f3:54: 11:e5:3d:36:a1:ad:17:7e:d0:94:12:50:a8:04:a8:66: 68:3d:76:78:56:1b:80:96:6c:be:ea:9e:d4:3d:1c:28: 47:a2:7a:7e:17:bd:e8:1f:e4:01:be:be:3c:47:bd:a6: 4b:74:c8:a8:c2:7e:12:25:7f:56:19:23:9c:59:62:6b: a9:5f:a2:e6:05:11:10:8b:27:3f:5e:f0:2e:34:e0:63 Fingerprint (SHA-256): 22:A1:2C:65:6F:30:FA:EE:34:F7:57:AC:6A:6E:7C:CC:08:2D:32:48:C3:15:59:28:F5:2B:7E:F4:A3:33:A1:4D Fingerprint (SHA1): E7:2D:53:52:78:42:52:9A:37:46:88:8A:8C:A8:0D:17:56:F6:F4:1F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1565: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1566: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191300 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1567: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1568: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1569: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191301 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1570: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1571: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1572: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1573: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191302 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1574: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1575: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191303 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1576: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1577: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1578: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1579: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1580: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191304 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191055.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1581: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1582: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1583: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1584: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191305 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1585: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1586: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1587: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1588: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191306 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128191056.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1589: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1590: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1591: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1592: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191307 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1593: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1595: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191300 (0x433ed544) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:14:43 2025 Not After : Thu Nov 28 11:14:43 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:8c:42:d6:c9:82:8a:eb:c1:ef:eb:f5:6f:ea:42:c3: dc:03:a4:b1:4f:21:44:09:b5:1d:5e:9f:4a:58:94:04: f0:9b:39:f1:87:27:60:f9:3c:65:af:9b:99:2b:09:f4: ab:61:70:44:0b:5f:7c:5b:d4:cb:83:ee:69:b6:1d:78: 55:d5:e4:79:06:80:7a:09:53:81:ad:a9:b4:8a:bf:00: 11:d3:7b:25:72:1f:a2:6e:b7:bc:c6:3c:9a:4a:e4:7a: fa:5b:a4:43:34:ac:e5:0b:44:4a:db:ae:52:53:2a:52: 8d:58:5c:1b:ac:b1:fd:56:28:b7:55:58:64:9a:c2:65: 72:0c:8d:d2:f7:3f:c3:24:83:cd:be:2a:06:3c:ae:2a: c5:88:7c:2b:c4:b7:de:fd:aa:0d:33:3f:72:cd:e8:51: ad:62:7d:03:32:cd:bc:68:1b:5a:df:25:76:9c:27:8f: 0a:2a:35:75:d8:1d:29:4f:ff:66:7b:39:f7:95:02:98: 98:ef:67:78:d3:e0:91:4d:55:8e:20:b5:c9:4a:58:8f: 70:5d:c5:c2:2c:74:7b:a9:96:a8:1e:d7:85:48:3c:fb: c0:61:f4:6c:2b:a3:9c:45:ab:f8:3f:f6:c0:2a:63:31: e7:f6:2e:b1:91:d0:f9:4e:4c:76:f6:4c:97:02:3b:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:c3:47:d8:b4:0c:9d:90:9d:3e:b2:2d:a9:4b:00:ef: 0a:69:c3:b4:1a:b3:a3:f9:8c:d3:f9:21:8e:86:e6:ed: ba:6d:c7:d4:ec:b5:c2:79:91:60:88:b4:fe:c1:47:42: e1:85:37:e7:dd:c4:e3:f0:b2:bc:71:52:92:6b:fa:c9: 5a:a0:7a:8e:fc:5d:7d:e6:f5:1a:56:a2:17:23:12:94: 59:a9:67:10:68:79:f3:75:24:ea:fa:fe:ae:5f:62:fd: 10:e2:a3:d9:d5:d0:2e:87:53:fd:83:59:dc:ed:e2:46: e2:d9:25:8b:09:86:27:5e:11:3d:8a:5f:21:28:17:40: 26:63:a7:5f:3a:fa:e5:52:6a:31:7b:6b:a3:69:f6:e6: b1:52:5f:fe:eb:1f:aa:57:97:e7:4b:90:a7:10:d6:53: 57:da:e6:d4:89:eb:d2:67:1e:6f:b7:75:2f:6c:9e:f9: 7e:d3:da:77:d8:4f:31:06:fa:b3:c9:99:f2:41:4a:60: df:d0:1b:d6:ec:77:d9:d4:94:58:bc:e5:82:30:40:3e: 4c:b0:39:77:ef:49:52:95:1a:b0:c5:f8:0a:41:a3:29: d0:aa:65:77:ef:f5:f1:eb:6f:56:a6:43:b7:5f:c1:77: 3c:5e:c0:ac:79:f4:36:f8:c0:7e:6f:36:9d:59:13:56 Fingerprint (SHA-256): E5:67:DF:B5:88:D3:79:5D:E5:DE:EF:09:7E:9E:3B:73:5C:52:51:69:D9:D6:67:D6:F6:11:CF:69:81:33:DF:26 Fingerprint (SHA1): 01:DA:85:2C:40:CF:B7:D7:25:7C:88:EE:ED:4A:62:49:D1:94:18:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1596: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191301 (0x433ed545) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:44 2025 Not After : Thu Nov 28 11:14:44 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:13:ef:54:8c:f9:c1:af:bf:ba:f5:ef:19:83:bb:b1: 1d:d2:83:e9:8b:5f:03:82:73:49:f9:b7:d9:c9:8f:f1: 3c:72:d3:95:7a:28:fb:6f:73:20:b1:62:59:fe:ba:e6: d8:d5:f5:15:f1:77:90:05:b0:92:0d:26:22:a7:0e:75: 2b:e3:40:6f:82:d6:61:e1:9c:5c:02:b9:1c:d6:83:7b: 2d:1c:9e:8f:a9:c6:3b:f6:9e:f5:b0:00:ae:8d:ee:e1: e4:0d:06:c3:db:21:6f:22:37:c9:1e:33:73:af:2f:16: a7:da:94:d9:79:aa:70:cc:96:78:60:c2:1a:a4:f2:5f: 24:0f:5b:24:bd:5c:7b:cd:73:51:ab:58:eb:9f:9d:05: 63:5b:38:a4:27:f5:3c:b7:b3:19:53:ea:b4:5c:9b:88: ff:a0:3d:55:73:3f:ef:fe:f6:2a:b9:86:07:d9:2f:99: 11:45:67:a2:0f:bd:39:b5:08:94:7a:35:e5:8f:89:7a: 0b:ec:d2:13:9b:72:b5:75:d3:bf:55:53:b9:a9:16:39: e6:85:bf:a0:4a:16:51:18:8e:5f:a5:a3:81:de:bb:6e: 2b:aa:85:f6:46:db:4c:57:72:54:34:80:04:80:de:2d: b0:ba:0d:e5:7e:c3:a2:e4:78:19:70:04:b9:ad:1b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:a9:66:3d:e1:2b:52:ff:39:b0:da:b0:f0:38:3f:a4: dc:64:97:63:54:1f:1e:a3:d8:5b:b9:c0:79:36:3b:e6: 5f:e5:13:43:96:b5:f3:10:0e:7d:5b:65:5f:83:41:cd: 47:0d:ee:12:d0:05:7d:bb:d8:b9:e2:38:75:c3:cf:07: a5:09:55:5d:dc:a8:9b:20:4f:54:39:c4:dc:8c:41:0c: 2a:9b:58:87:9b:43:4b:be:fc:d0:f1:fb:0e:35:d7:13: 24:6f:38:1c:63:9e:09:bc:88:13:00:ab:5d:09:2e:db: 7d:27:82:cd:ab:79:93:60:83:19:89:5a:97:d9:2d:19: ce:18:a1:f9:f2:d7:41:71:d1:fe:fc:b5:bb:19:be:48: 9a:74:97:3d:8d:07:d1:82:14:33:ec:9b:b2:83:a2:3b: e5:82:34:7e:a9:ed:ef:9f:ba:d0:13:63:9e:c5:56:e3: 82:f7:c0:a1:9f:b3:a6:2e:8c:5d:96:1c:e9:98:77:9d: 4c:f0:e3:33:a6:aa:4c:aa:02:7c:67:98:9c:3c:7a:78: 20:c7:d9:3a:c5:e8:b2:d0:b4:bd:b8:02:cb:da:44:f9: f9:06:06:22:9d:42:7e:36:f4:6d:8d:a3:97:4d:97:0e: aa:98:a2:a4:c0:10:3a:92:c5:1c:78:c0:6f:49:c9:6b Fingerprint (SHA-256): DE:32:79:0B:EB:68:D1:6D:90:6F:3D:88:A1:B5:B8:1A:B9:6B:7F:FB:7F:F1:2B:21:59:43:E5:E7:BF:1E:87:91 Fingerprint (SHA1): CB:64:23:C1:40:E9:2D:06:5D:AF:7E:B4:F5:35:B0:1E:29:B4:FE:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1597: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191301 (0x433ed545) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:44 2025 Not After : Thu Nov 28 11:14:44 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:13:ef:54:8c:f9:c1:af:bf:ba:f5:ef:19:83:bb:b1: 1d:d2:83:e9:8b:5f:03:82:73:49:f9:b7:d9:c9:8f:f1: 3c:72:d3:95:7a:28:fb:6f:73:20:b1:62:59:fe:ba:e6: d8:d5:f5:15:f1:77:90:05:b0:92:0d:26:22:a7:0e:75: 2b:e3:40:6f:82:d6:61:e1:9c:5c:02:b9:1c:d6:83:7b: 2d:1c:9e:8f:a9:c6:3b:f6:9e:f5:b0:00:ae:8d:ee:e1: e4:0d:06:c3:db:21:6f:22:37:c9:1e:33:73:af:2f:16: a7:da:94:d9:79:aa:70:cc:96:78:60:c2:1a:a4:f2:5f: 24:0f:5b:24:bd:5c:7b:cd:73:51:ab:58:eb:9f:9d:05: 63:5b:38:a4:27:f5:3c:b7:b3:19:53:ea:b4:5c:9b:88: ff:a0:3d:55:73:3f:ef:fe:f6:2a:b9:86:07:d9:2f:99: 11:45:67:a2:0f:bd:39:b5:08:94:7a:35:e5:8f:89:7a: 0b:ec:d2:13:9b:72:b5:75:d3:bf:55:53:b9:a9:16:39: e6:85:bf:a0:4a:16:51:18:8e:5f:a5:a3:81:de:bb:6e: 2b:aa:85:f6:46:db:4c:57:72:54:34:80:04:80:de:2d: b0:ba:0d:e5:7e:c3:a2:e4:78:19:70:04:b9:ad:1b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:a9:66:3d:e1:2b:52:ff:39:b0:da:b0:f0:38:3f:a4: dc:64:97:63:54:1f:1e:a3:d8:5b:b9:c0:79:36:3b:e6: 5f:e5:13:43:96:b5:f3:10:0e:7d:5b:65:5f:83:41:cd: 47:0d:ee:12:d0:05:7d:bb:d8:b9:e2:38:75:c3:cf:07: a5:09:55:5d:dc:a8:9b:20:4f:54:39:c4:dc:8c:41:0c: 2a:9b:58:87:9b:43:4b:be:fc:d0:f1:fb:0e:35:d7:13: 24:6f:38:1c:63:9e:09:bc:88:13:00:ab:5d:09:2e:db: 7d:27:82:cd:ab:79:93:60:83:19:89:5a:97:d9:2d:19: ce:18:a1:f9:f2:d7:41:71:d1:fe:fc:b5:bb:19:be:48: 9a:74:97:3d:8d:07:d1:82:14:33:ec:9b:b2:83:a2:3b: e5:82:34:7e:a9:ed:ef:9f:ba:d0:13:63:9e:c5:56:e3: 82:f7:c0:a1:9f:b3:a6:2e:8c:5d:96:1c:e9:98:77:9d: 4c:f0:e3:33:a6:aa:4c:aa:02:7c:67:98:9c:3c:7a:78: 20:c7:d9:3a:c5:e8:b2:d0:b4:bd:b8:02:cb:da:44:f9: f9:06:06:22:9d:42:7e:36:f4:6d:8d:a3:97:4d:97:0e: aa:98:a2:a4:c0:10:3a:92:c5:1c:78:c0:6f:49:c9:6b Fingerprint (SHA-256): DE:32:79:0B:EB:68:D1:6D:90:6F:3D:88:A1:B5:B8:1A:B9:6B:7F:FB:7F:F1:2B:21:59:43:E5:E7:BF:1E:87:91 Fingerprint (SHA1): CB:64:23:C1:40:E9:2D:06:5D:AF:7E:B4:F5:35:B0:1E:29:B4:FE:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1598: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1599: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191300 (0x433ed544) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:14:43 2025 Not After : Thu Nov 28 11:14:43 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:8c:42:d6:c9:82:8a:eb:c1:ef:eb:f5:6f:ea:42:c3: dc:03:a4:b1:4f:21:44:09:b5:1d:5e:9f:4a:58:94:04: f0:9b:39:f1:87:27:60:f9:3c:65:af:9b:99:2b:09:f4: ab:61:70:44:0b:5f:7c:5b:d4:cb:83:ee:69:b6:1d:78: 55:d5:e4:79:06:80:7a:09:53:81:ad:a9:b4:8a:bf:00: 11:d3:7b:25:72:1f:a2:6e:b7:bc:c6:3c:9a:4a:e4:7a: fa:5b:a4:43:34:ac:e5:0b:44:4a:db:ae:52:53:2a:52: 8d:58:5c:1b:ac:b1:fd:56:28:b7:55:58:64:9a:c2:65: 72:0c:8d:d2:f7:3f:c3:24:83:cd:be:2a:06:3c:ae:2a: c5:88:7c:2b:c4:b7:de:fd:aa:0d:33:3f:72:cd:e8:51: ad:62:7d:03:32:cd:bc:68:1b:5a:df:25:76:9c:27:8f: 0a:2a:35:75:d8:1d:29:4f:ff:66:7b:39:f7:95:02:98: 98:ef:67:78:d3:e0:91:4d:55:8e:20:b5:c9:4a:58:8f: 70:5d:c5:c2:2c:74:7b:a9:96:a8:1e:d7:85:48:3c:fb: c0:61:f4:6c:2b:a3:9c:45:ab:f8:3f:f6:c0:2a:63:31: e7:f6:2e:b1:91:d0:f9:4e:4c:76:f6:4c:97:02:3b:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:c3:47:d8:b4:0c:9d:90:9d:3e:b2:2d:a9:4b:00:ef: 0a:69:c3:b4:1a:b3:a3:f9:8c:d3:f9:21:8e:86:e6:ed: ba:6d:c7:d4:ec:b5:c2:79:91:60:88:b4:fe:c1:47:42: e1:85:37:e7:dd:c4:e3:f0:b2:bc:71:52:92:6b:fa:c9: 5a:a0:7a:8e:fc:5d:7d:e6:f5:1a:56:a2:17:23:12:94: 59:a9:67:10:68:79:f3:75:24:ea:fa:fe:ae:5f:62:fd: 10:e2:a3:d9:d5:d0:2e:87:53:fd:83:59:dc:ed:e2:46: e2:d9:25:8b:09:86:27:5e:11:3d:8a:5f:21:28:17:40: 26:63:a7:5f:3a:fa:e5:52:6a:31:7b:6b:a3:69:f6:e6: b1:52:5f:fe:eb:1f:aa:57:97:e7:4b:90:a7:10:d6:53: 57:da:e6:d4:89:eb:d2:67:1e:6f:b7:75:2f:6c:9e:f9: 7e:d3:da:77:d8:4f:31:06:fa:b3:c9:99:f2:41:4a:60: df:d0:1b:d6:ec:77:d9:d4:94:58:bc:e5:82:30:40:3e: 4c:b0:39:77:ef:49:52:95:1a:b0:c5:f8:0a:41:a3:29: d0:aa:65:77:ef:f5:f1:eb:6f:56:a6:43:b7:5f:c1:77: 3c:5e:c0:ac:79:f4:36:f8:c0:7e:6f:36:9d:59:13:56 Fingerprint (SHA-256): E5:67:DF:B5:88:D3:79:5D:E5:DE:EF:09:7E:9E:3B:73:5C:52:51:69:D9:D6:67:D6:F6:11:CF:69:81:33:DF:26 Fingerprint (SHA1): 01:DA:85:2C:40:CF:B7:D7:25:7C:88:EE:ED:4A:62:49:D1:94:18:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1600: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191301 (0x433ed545) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:44 2025 Not After : Thu Nov 28 11:14:44 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:13:ef:54:8c:f9:c1:af:bf:ba:f5:ef:19:83:bb:b1: 1d:d2:83:e9:8b:5f:03:82:73:49:f9:b7:d9:c9:8f:f1: 3c:72:d3:95:7a:28:fb:6f:73:20:b1:62:59:fe:ba:e6: d8:d5:f5:15:f1:77:90:05:b0:92:0d:26:22:a7:0e:75: 2b:e3:40:6f:82:d6:61:e1:9c:5c:02:b9:1c:d6:83:7b: 2d:1c:9e:8f:a9:c6:3b:f6:9e:f5:b0:00:ae:8d:ee:e1: e4:0d:06:c3:db:21:6f:22:37:c9:1e:33:73:af:2f:16: a7:da:94:d9:79:aa:70:cc:96:78:60:c2:1a:a4:f2:5f: 24:0f:5b:24:bd:5c:7b:cd:73:51:ab:58:eb:9f:9d:05: 63:5b:38:a4:27:f5:3c:b7:b3:19:53:ea:b4:5c:9b:88: ff:a0:3d:55:73:3f:ef:fe:f6:2a:b9:86:07:d9:2f:99: 11:45:67:a2:0f:bd:39:b5:08:94:7a:35:e5:8f:89:7a: 0b:ec:d2:13:9b:72:b5:75:d3:bf:55:53:b9:a9:16:39: e6:85:bf:a0:4a:16:51:18:8e:5f:a5:a3:81:de:bb:6e: 2b:aa:85:f6:46:db:4c:57:72:54:34:80:04:80:de:2d: b0:ba:0d:e5:7e:c3:a2:e4:78:19:70:04:b9:ad:1b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:a9:66:3d:e1:2b:52:ff:39:b0:da:b0:f0:38:3f:a4: dc:64:97:63:54:1f:1e:a3:d8:5b:b9:c0:79:36:3b:e6: 5f:e5:13:43:96:b5:f3:10:0e:7d:5b:65:5f:83:41:cd: 47:0d:ee:12:d0:05:7d:bb:d8:b9:e2:38:75:c3:cf:07: a5:09:55:5d:dc:a8:9b:20:4f:54:39:c4:dc:8c:41:0c: 2a:9b:58:87:9b:43:4b:be:fc:d0:f1:fb:0e:35:d7:13: 24:6f:38:1c:63:9e:09:bc:88:13:00:ab:5d:09:2e:db: 7d:27:82:cd:ab:79:93:60:83:19:89:5a:97:d9:2d:19: ce:18:a1:f9:f2:d7:41:71:d1:fe:fc:b5:bb:19:be:48: 9a:74:97:3d:8d:07:d1:82:14:33:ec:9b:b2:83:a2:3b: e5:82:34:7e:a9:ed:ef:9f:ba:d0:13:63:9e:c5:56:e3: 82:f7:c0:a1:9f:b3:a6:2e:8c:5d:96:1c:e9:98:77:9d: 4c:f0:e3:33:a6:aa:4c:aa:02:7c:67:98:9c:3c:7a:78: 20:c7:d9:3a:c5:e8:b2:d0:b4:bd:b8:02:cb:da:44:f9: f9:06:06:22:9d:42:7e:36:f4:6d:8d:a3:97:4d:97:0e: aa:98:a2:a4:c0:10:3a:92:c5:1c:78:c0:6f:49:c9:6b Fingerprint (SHA-256): DE:32:79:0B:EB:68:D1:6D:90:6F:3D:88:A1:B5:B8:1A:B9:6B:7F:FB:7F:F1:2B:21:59:43:E5:E7:BF:1E:87:91 Fingerprint (SHA1): CB:64:23:C1:40:E9:2D:06:5D:AF:7E:B4:F5:35:B0:1E:29:B4:FE:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1601: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191301 (0x433ed545) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:44 2025 Not After : Thu Nov 28 11:14:44 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:13:ef:54:8c:f9:c1:af:bf:ba:f5:ef:19:83:bb:b1: 1d:d2:83:e9:8b:5f:03:82:73:49:f9:b7:d9:c9:8f:f1: 3c:72:d3:95:7a:28:fb:6f:73:20:b1:62:59:fe:ba:e6: d8:d5:f5:15:f1:77:90:05:b0:92:0d:26:22:a7:0e:75: 2b:e3:40:6f:82:d6:61:e1:9c:5c:02:b9:1c:d6:83:7b: 2d:1c:9e:8f:a9:c6:3b:f6:9e:f5:b0:00:ae:8d:ee:e1: e4:0d:06:c3:db:21:6f:22:37:c9:1e:33:73:af:2f:16: a7:da:94:d9:79:aa:70:cc:96:78:60:c2:1a:a4:f2:5f: 24:0f:5b:24:bd:5c:7b:cd:73:51:ab:58:eb:9f:9d:05: 63:5b:38:a4:27:f5:3c:b7:b3:19:53:ea:b4:5c:9b:88: ff:a0:3d:55:73:3f:ef:fe:f6:2a:b9:86:07:d9:2f:99: 11:45:67:a2:0f:bd:39:b5:08:94:7a:35:e5:8f:89:7a: 0b:ec:d2:13:9b:72:b5:75:d3:bf:55:53:b9:a9:16:39: e6:85:bf:a0:4a:16:51:18:8e:5f:a5:a3:81:de:bb:6e: 2b:aa:85:f6:46:db:4c:57:72:54:34:80:04:80:de:2d: b0:ba:0d:e5:7e:c3:a2:e4:78:19:70:04:b9:ad:1b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:a9:66:3d:e1:2b:52:ff:39:b0:da:b0:f0:38:3f:a4: dc:64:97:63:54:1f:1e:a3:d8:5b:b9:c0:79:36:3b:e6: 5f:e5:13:43:96:b5:f3:10:0e:7d:5b:65:5f:83:41:cd: 47:0d:ee:12:d0:05:7d:bb:d8:b9:e2:38:75:c3:cf:07: a5:09:55:5d:dc:a8:9b:20:4f:54:39:c4:dc:8c:41:0c: 2a:9b:58:87:9b:43:4b:be:fc:d0:f1:fb:0e:35:d7:13: 24:6f:38:1c:63:9e:09:bc:88:13:00:ab:5d:09:2e:db: 7d:27:82:cd:ab:79:93:60:83:19:89:5a:97:d9:2d:19: ce:18:a1:f9:f2:d7:41:71:d1:fe:fc:b5:bb:19:be:48: 9a:74:97:3d:8d:07:d1:82:14:33:ec:9b:b2:83:a2:3b: e5:82:34:7e:a9:ed:ef:9f:ba:d0:13:63:9e:c5:56:e3: 82:f7:c0:a1:9f:b3:a6:2e:8c:5d:96:1c:e9:98:77:9d: 4c:f0:e3:33:a6:aa:4c:aa:02:7c:67:98:9c:3c:7a:78: 20:c7:d9:3a:c5:e8:b2:d0:b4:bd:b8:02:cb:da:44:f9: f9:06:06:22:9d:42:7e:36:f4:6d:8d:a3:97:4d:97:0e: aa:98:a2:a4:c0:10:3a:92:c5:1c:78:c0:6f:49:c9:6b Fingerprint (SHA-256): DE:32:79:0B:EB:68:D1:6D:90:6F:3D:88:A1:B5:B8:1A:B9:6B:7F:FB:7F:F1:2B:21:59:43:E5:E7:BF:1E:87:91 Fingerprint (SHA1): CB:64:23:C1:40:E9:2D:06:5D:AF:7E:B4:F5:35:B0:1E:29:B4:FE:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1602: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191308 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191309 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128191310 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128191311 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128191312 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128191313 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191314 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1628: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1629: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191315 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1630: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1631: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1632: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1633: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191316 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1634: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1635: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1636: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1637: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191317 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1638: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1639: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191308 (0x433ed54c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:14:48 2025 Not After : Thu Nov 28 11:14:48 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:f4:f2:02:3d:c9:9e:35:df:70:03:09:f9:30:cd:4d: d0:63:b2:b3:12:89:d4:f5:ce:ef:f2:67:d9:6c:09:d5: 6e:e9:4c:0a:9e:17:f6:4f:01:18:60:a8:91:b5:42:12: 26:7e:e2:46:f2:99:5a:40:b2:39:d5:c4:a6:fa:d4:80: 7b:6a:c7:39:8d:05:bf:c4:66:79:e2:ea:b8:b5:e0:ff: 39:cb:cf:cd:d8:28:cf:a3:ea:cc:8b:31:87:4f:7b:3e: df:08:9c:24:cd:3d:7c:39:aa:01:a5:bc:ca:e1:29:38: 5c:8d:a5:f1:3c:95:71:20:ee:e5:87:f4:b1:e6:ee:8f: 10:ae:78:61:c1:79:fe:38:63:f3:8e:e6:82:9f:1e:b0: da:3e:6d:14:65:b4:57:67:e9:47:83:b2:15:01:37:91: 48:e3:63:b7:80:ca:7b:fb:e9:4e:88:ae:c9:3e:10:23: e8:54:6b:96:d9:9b:38:99:d6:f5:35:35:8f:dc:a0:07: 47:24:2b:eb:91:2c:e4:f1:5c:04:7a:91:2e:aa:d4:f1: 6c:12:a4:b5:a5:c2:c5:00:5c:63:af:ca:14:ae:4a:4e: c6:d8:ec:e3:bd:c0:2d:ef:33:da:b2:18:d1:ac:12:2f: 16:66:f5:d2:f6:aa:fd:d2:1f:8a:7b:43:86:ac:ad:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:b1:15:46:91:df:1f:11:be:21:5e:10:20:45:47:37: 54:ea:0b:10:ed:07:a1:1d:89:cc:d8:f4:70:0e:91:c3: d0:fb:e9:57:74:1f:54:e0:59:d5:1c:e1:56:52:71:80: c9:1f:da:06:fa:0c:0a:72:13:96:66:fb:a6:34:86:6f: c1:d7:68:f9:4f:d7:1a:a1:6d:17:7a:b4:13:45:3d:de: b5:2f:98:e3:c4:50:68:3a:2e:2e:6e:fd:c8:95:0c:f6: d2:bf:05:96:dd:cc:f2:6b:9e:b7:8d:d1:e4:67:9a:49: df:76:ab:e2:d1:41:ed:68:14:c2:cd:72:0b:10:03:b9: 31:82:a8:78:cb:3f:55:1a:3d:6c:e3:5a:b6:93:a3:dd: b4:90:c5:36:c2:b2:b2:5b:1f:4f:79:b5:a0:56:1d:81: c7:8a:73:b4:54:f4:70:39:d2:5b:02:27:dd:65:82:69: 97:92:f3:ae:2d:86:fb:13:25:59:35:3a:4d:6d:f9:8e: 1e:6d:64:48:da:d0:09:41:6e:e9:bf:ad:fc:09:21:d5: 50:7b:7c:e9:8e:8d:66:43:f8:d2:7b:12:29:15:c3:bd: 94:dc:a5:63:c8:29:3f:c4:37:d5:67:45:6c:bb:f4:32: 5a:4c:40:0e:24:6c:d9:0d:4e:67:64:18:a9:48:79:fd Fingerprint (SHA-256): 19:75:9C:33:DC:66:BE:E1:67:E4:ED:8B:62:4E:51:72:39:04:4F:05:BE:35:26:62:E1:F5:52:68:02:32:5E:B1 Fingerprint (SHA1): 0F:09:A5:36:81:FC:A5:5F:EE:87:A4:99:6A:1C:28:1D:41:DC:67:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1641: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1642: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1643: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1644: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1645: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1646: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1647: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1648: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1649: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191309 (0x433ed54d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:14:49 2025 Not After : Thu Nov 28 11:14:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:10:38:a2:e8:e1:e9:26:01:dd:a5:57:d3:7d:43:4b: 81:5b:57:32:d8:af:cd:bf:11:71:c1:c8:a0:22:b1:68: 28:12:a0:1e:87:f3:67:56:5b:55:9f:b2:2b:0d:67:f4: 17:3c:88:8c:10:ab:0e:52:65:f4:29:19:1d:1a:c4:7d: 7d:99:d7:e5:62:4f:98:bd:b9:33:06:46:ce:fb:f3:58: fa:0f:7e:a8:f1:5f:e9:79:78:0c:aa:85:47:2f:ea:cd: 1b:78:0f:53:51:9f:ae:12:a9:cc:0d:81:8f:f6:dd:de: 48:d6:58:3b:bd:b3:72:35:10:7d:c9:a1:c2:3b:fc:46: 07:94:e6:6e:22:6f:c1:38:b5:ad:e3:0d:06:35:6f:72: 03:a7:d8:87:29:ca:8d:bb:a1:39:c6:83:64:d8:72:10: fe:ec:09:06:07:61:8b:19:eb:e4:b8:8d:7a:61:24:9d: 04:dd:3c:b5:10:13:c3:fd:07:99:f9:31:60:03:f0:6b: cb:33:ee:0b:03:1d:17:0f:da:a0:96:b7:a2:be:db:79: bd:ab:5b:48:68:ef:42:28:6d:dc:91:de:de:55:18:c0: 12:b6:0b:be:44:b8:46:49:87:6f:a9:d4:7a:ed:3b:9a: 27:7e:63:00:24:a2:79:1d:85:97:40:38:1e:6f:a3:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:c1:6f:30:fb:6b:28:52:fb:0e:ba:22:8c:c9:a9:19: 11:8b:49:c3:c6:b3:f8:3f:48:9c:42:7d:19:a5:9c:c6: a2:7f:29:8c:7a:b7:3c:e2:34:da:6c:d1:64:e2:a8:72: fb:21:87:47:f1:f2:bf:e4:c9:ce:14:ce:1b:c9:d8:4d: c6:7e:ec:47:9d:d1:36:16:f6:95:30:c3:fe:c9:50:22: fa:c0:a9:24:e0:49:10:4c:73:ca:df:45:92:fd:97:ab: 82:53:61:5d:b8:50:4c:20:c7:dc:10:bd:76:44:07:02: c6:71:4b:7f:bd:44:51:37:32:8b:97:bd:91:6d:65:cd: 43:86:fb:3a:c9:20:42:45:44:26:43:60:3e:40:24:9d: 81:2d:b1:6b:32:c2:a0:0e:1c:cd:10:65:16:bd:e9:00: b6:6b:3e:95:07:08:f2:c3:22:a2:0d:2a:74:2c:9f:2f: 8d:a7:c1:56:5b:50:dd:11:35:0c:7b:a4:04:ae:10:31: 2d:bb:4a:48:2e:4e:78:35:1e:d7:b6:e8:69:73:c5:90: ef:1e:ff:a2:20:41:30:e8:00:8c:bf:2b:15:45:be:bd: 9e:e0:6e:90:1f:d7:6b:ce:95:ff:1b:2b:55:57:fd:6a: 34:92:c9:76:99:d2:2e:be:10:a4:69:cd:f6:18:28:36 Fingerprint (SHA-256): 7A:89:ED:BE:47:82:54:E6:FD:07:E5:60:97:10:17:8F:E9:6D:EB:50:E7:82:54:F1:A5:57:65:76:F6:4D:C1:9C Fingerprint (SHA1): 8D:97:F3:5B:52:AE:0C:F0:5E:07:B8:7C:A6:EB:D4:D1:A9:F0:88:54 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1650: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1651: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1652: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1653: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1654: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1655: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1656: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1657: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1658: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1659: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1660: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1661: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1662: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1663: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1664: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1665: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1666: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1667: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1668: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191318 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1669: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1670: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1671: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191319 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1675: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1676: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191320 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1677: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1678: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1679: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1680: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128191321 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1681: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1682: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1683: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191322 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1685: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1687: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128191323 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1689: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1691: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128191324 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1693: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1695: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128191325 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1697: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1699: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128191326 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1701: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1703: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191318 (0x433ed556) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:57 2025 Not After : Thu Nov 28 11:14:57 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:59:4e:1d:1c:cf:cc:48:99:33:3f:05:a9:25:b1:e9: c8:9f:d9:8b:27:42:b5:f3:1e:a3:2b:b4:91:f2:29:4c: 09:3e:fc:85:ab:30:eb:8d:b0:a6:ac:68:ec:e1:f9:98: c6:6b:7f:2f:bd:51:17:95:06:d0:78:4c:f8:de:2a:39: 60:b4:ed:be:0f:bd:f0:2a:1c:50:88:23:fc:0b:fa:11: 18:71:d7:8a:f1:70:7c:78:a5:db:ff:fe:54:92:4d:1a: 17:53:38:ca:79:60:93:9e:93:32:94:91:ef:73:d3:cc: 13:1a:9b:2e:1d:e7:32:3e:1d:22:85:4c:ac:46:96:d8: 34:8e:3a:f6:e0:b1:a3:62:4a:27:16:61:42:6a:f4:64: e3:37:36:82:f4:34:87:f8:cc:13:55:5c:c0:ec:f4:9b: f0:32:a5:69:e4:b2:32:9a:2f:32:39:e2:f5:e7:bc:e1: 79:0c:66:3e:51:b3:45:19:c6:64:a2:4b:d0:56:b0:4e: 4a:3a:21:34:96:bd:6b:a4:8b:6b:08:1c:2d:e7:87:66: f9:ac:a0:e3:13:c4:78:66:a5:5f:96:7c:d6:3f:d3:3d: 4f:0a:8f:14:8f:b2:8e:23:1c:81:cc:9d:c6:8c:b4:04: e7:d8:98:9d:62:80:10:55:25:83:8f:81:0c:60:15:10 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:78:cc:6a:13:fb:af:97:a9:9e:4b:9f:4f: 35:60:82:d9:0c:3f:3a:89:00:47:ca:45:41:f0:06:63: 02:1c:49:c9:a3:20:a3:95:b0:f7:6e:52:2b:37:e4:14: 5f:84:21:59:11:92:5f:e0:58:89:0d:64:dd:47 Fingerprint (SHA-256): D0:31:DA:E6:54:3D:91:16:D7:DD:AA:F9:3A:35:A7:D6:29:1E:61:CA:E9:BF:95:F1:91:DC:6B:95:1C:A1:5C:AC Fingerprint (SHA1): 4D:4F:FA:99:DE:96:2F:19:30:6D:AE:A3:5A:01:02:A9:21:65:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1704: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191318 (0x433ed556) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:57 2025 Not After : Thu Nov 28 11:14:57 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:59:4e:1d:1c:cf:cc:48:99:33:3f:05:a9:25:b1:e9: c8:9f:d9:8b:27:42:b5:f3:1e:a3:2b:b4:91:f2:29:4c: 09:3e:fc:85:ab:30:eb:8d:b0:a6:ac:68:ec:e1:f9:98: c6:6b:7f:2f:bd:51:17:95:06:d0:78:4c:f8:de:2a:39: 60:b4:ed:be:0f:bd:f0:2a:1c:50:88:23:fc:0b:fa:11: 18:71:d7:8a:f1:70:7c:78:a5:db:ff:fe:54:92:4d:1a: 17:53:38:ca:79:60:93:9e:93:32:94:91:ef:73:d3:cc: 13:1a:9b:2e:1d:e7:32:3e:1d:22:85:4c:ac:46:96:d8: 34:8e:3a:f6:e0:b1:a3:62:4a:27:16:61:42:6a:f4:64: e3:37:36:82:f4:34:87:f8:cc:13:55:5c:c0:ec:f4:9b: f0:32:a5:69:e4:b2:32:9a:2f:32:39:e2:f5:e7:bc:e1: 79:0c:66:3e:51:b3:45:19:c6:64:a2:4b:d0:56:b0:4e: 4a:3a:21:34:96:bd:6b:a4:8b:6b:08:1c:2d:e7:87:66: f9:ac:a0:e3:13:c4:78:66:a5:5f:96:7c:d6:3f:d3:3d: 4f:0a:8f:14:8f:b2:8e:23:1c:81:cc:9d:c6:8c:b4:04: e7:d8:98:9d:62:80:10:55:25:83:8f:81:0c:60:15:10 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:78:cc:6a:13:fb:af:97:a9:9e:4b:9f:4f: 35:60:82:d9:0c:3f:3a:89:00:47:ca:45:41:f0:06:63: 02:1c:49:c9:a3:20:a3:95:b0:f7:6e:52:2b:37:e4:14: 5f:84:21:59:11:92:5f:e0:58:89:0d:64:dd:47 Fingerprint (SHA-256): D0:31:DA:E6:54:3D:91:16:D7:DD:AA:F9:3A:35:A7:D6:29:1E:61:CA:E9:BF:95:F1:91:DC:6B:95:1C:A1:5C:AC Fingerprint (SHA1): 4D:4F:FA:99:DE:96:2F:19:30:6D:AE:A3:5A:01:02:A9:21:65:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1705: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191318 (0x433ed556) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:57 2025 Not After : Thu Nov 28 11:14:57 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:59:4e:1d:1c:cf:cc:48:99:33:3f:05:a9:25:b1:e9: c8:9f:d9:8b:27:42:b5:f3:1e:a3:2b:b4:91:f2:29:4c: 09:3e:fc:85:ab:30:eb:8d:b0:a6:ac:68:ec:e1:f9:98: c6:6b:7f:2f:bd:51:17:95:06:d0:78:4c:f8:de:2a:39: 60:b4:ed:be:0f:bd:f0:2a:1c:50:88:23:fc:0b:fa:11: 18:71:d7:8a:f1:70:7c:78:a5:db:ff:fe:54:92:4d:1a: 17:53:38:ca:79:60:93:9e:93:32:94:91:ef:73:d3:cc: 13:1a:9b:2e:1d:e7:32:3e:1d:22:85:4c:ac:46:96:d8: 34:8e:3a:f6:e0:b1:a3:62:4a:27:16:61:42:6a:f4:64: e3:37:36:82:f4:34:87:f8:cc:13:55:5c:c0:ec:f4:9b: f0:32:a5:69:e4:b2:32:9a:2f:32:39:e2:f5:e7:bc:e1: 79:0c:66:3e:51:b3:45:19:c6:64:a2:4b:d0:56:b0:4e: 4a:3a:21:34:96:bd:6b:a4:8b:6b:08:1c:2d:e7:87:66: f9:ac:a0:e3:13:c4:78:66:a5:5f:96:7c:d6:3f:d3:3d: 4f:0a:8f:14:8f:b2:8e:23:1c:81:cc:9d:c6:8c:b4:04: e7:d8:98:9d:62:80:10:55:25:83:8f:81:0c:60:15:10 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:78:cc:6a:13:fb:af:97:a9:9e:4b:9f:4f: 35:60:82:d9:0c:3f:3a:89:00:47:ca:45:41:f0:06:63: 02:1c:49:c9:a3:20:a3:95:b0:f7:6e:52:2b:37:e4:14: 5f:84:21:59:11:92:5f:e0:58:89:0d:64:dd:47 Fingerprint (SHA-256): D0:31:DA:E6:54:3D:91:16:D7:DD:AA:F9:3A:35:A7:D6:29:1E:61:CA:E9:BF:95:F1:91:DC:6B:95:1C:A1:5C:AC Fingerprint (SHA1): 4D:4F:FA:99:DE:96:2F:19:30:6D:AE:A3:5A:01:02:A9:21:65:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1706: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191318 (0x433ed556) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:14:57 2025 Not After : Thu Nov 28 11:14:57 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6d:59:4e:1d:1c:cf:cc:48:99:33:3f:05:a9:25:b1:e9: c8:9f:d9:8b:27:42:b5:f3:1e:a3:2b:b4:91:f2:29:4c: 09:3e:fc:85:ab:30:eb:8d:b0:a6:ac:68:ec:e1:f9:98: c6:6b:7f:2f:bd:51:17:95:06:d0:78:4c:f8:de:2a:39: 60:b4:ed:be:0f:bd:f0:2a:1c:50:88:23:fc:0b:fa:11: 18:71:d7:8a:f1:70:7c:78:a5:db:ff:fe:54:92:4d:1a: 17:53:38:ca:79:60:93:9e:93:32:94:91:ef:73:d3:cc: 13:1a:9b:2e:1d:e7:32:3e:1d:22:85:4c:ac:46:96:d8: 34:8e:3a:f6:e0:b1:a3:62:4a:27:16:61:42:6a:f4:64: e3:37:36:82:f4:34:87:f8:cc:13:55:5c:c0:ec:f4:9b: f0:32:a5:69:e4:b2:32:9a:2f:32:39:e2:f5:e7:bc:e1: 79:0c:66:3e:51:b3:45:19:c6:64:a2:4b:d0:56:b0:4e: 4a:3a:21:34:96:bd:6b:a4:8b:6b:08:1c:2d:e7:87:66: f9:ac:a0:e3:13:c4:78:66:a5:5f:96:7c:d6:3f:d3:3d: 4f:0a:8f:14:8f:b2:8e:23:1c:81:cc:9d:c6:8c:b4:04: e7:d8:98:9d:62:80:10:55:25:83:8f:81:0c:60:15:10 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:78:cc:6a:13:fb:af:97:a9:9e:4b:9f:4f: 35:60:82:d9:0c:3f:3a:89:00:47:ca:45:41:f0:06:63: 02:1c:49:c9:a3:20:a3:95:b0:f7:6e:52:2b:37:e4:14: 5f:84:21:59:11:92:5f:e0:58:89:0d:64:dd:47 Fingerprint (SHA-256): D0:31:DA:E6:54:3D:91:16:D7:DD:AA:F9:3A:35:A7:D6:29:1E:61:CA:E9:BF:95:F1:91:DC:6B:95:1C:A1:5C:AC Fingerprint (SHA1): 4D:4F:FA:99:DE:96:2F:19:30:6D:AE:A3:5A:01:02:A9:21:65:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1707: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1708: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1709: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1710: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1711: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1712: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1713: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1715: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1716: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1717: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1719: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1720: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1721: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1722: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1723: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1724: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1725: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1726: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1727: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1728: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1729: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1730: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1731: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1732: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1733: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1734: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111507Z nextupdate=20261128111507Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:15:07 2025 Next Update: Sat Nov 28 11:15:07 2026 CRL Extensions: chains.sh: #1735: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111507Z nextupdate=20261128111507Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:15:07 2025 Next Update: Sat Nov 28 11:15:07 2026 CRL Extensions: chains.sh: #1736: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111507Z nextupdate=20261128111507Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:15:07 2025 Next Update: Sat Nov 28 11:15:07 2026 CRL Extensions: chains.sh: #1737: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111507Z nextupdate=20261128111507Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:15:07 2025 Next Update: Sat Nov 28 11:15:07 2026 CRL Extensions: chains.sh: #1738: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111508Z addcert 14 20251128111508Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:15:08 2025 Next Update: Sat Nov 28 11:15:07 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:15:08 2025 CRL Extensions: chains.sh: #1739: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111509Z addcert 15 20251128111509Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:15:09 2025 Next Update: Sat Nov 28 11:15:07 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:15:09 2025 CRL Extensions: chains.sh: #1740: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1741: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1742: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1743: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1744: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1745: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1746: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1747: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1748: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1749: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:02 2025 Not After : Thu Nov 28 11:15:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:33:f1:a2:66:ea:f6:d6:82:91:3a:9c:bc:f1:89:3b: 23:5e:59:66:43:23:bd:73:7c:b0:ba:bd:27:a6:66:76: 9f:cb:c8:0f:96:54:bd:26:00:44:cb:0d:95:8f:df:ee: 60:0b:16:3f:c8:b1:a9:85:2d:e5:c0:5a:47:e5:0f:6b: 8d:5d:43:33:a4:54:eb:58:43:26:01:c5:96:d5:2e:cc: 26:8b:2a:e7:84:b3:16:20:47:a4:25:aa:3f:ec:bb:93: b5:11:a8:5f:38:5d:5b:6d:fa:aa:bd:c4:e3:26:8d:b8: 6e:92:fd:1d:47:a7:6c:ed:26:06:36:d7:5c:29:b0:d7: 4b:3a:37:a9:14:71:03:25:c2:79:24:21:54:89:f2:15: 53:08:46:06:92:a2:eb:c8:24:4d:24:03:c0:fc:2b:f1: c4:fe:40:7b:9b:ab:42:74:bc:50:e9:ff:3c:4f:6a:d0: c8:26:09:ef:e4:27:f6:22:6b:16:9b:8d:3b:f2:87:8a: ae:5b:f5:eb:41:c6:4b:a6:47:c3:f1:4f:ea:a4:7b:37: 85:4f:0c:53:62:b9:79:b2:84:d4:1a:e1:d0:54:7f:38: 03:83:f3:cb:06:3d:64:1c:be:4d:b3:78:c8:e4:bc:6b: 69:07:1c:7f:5b:23:ec:73:7e:4c:53:a5:b4:45:df:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:ab:4f:c2:0b:e0:de:7c:bd:15:7f:1e:0c:a2:ef:59: b3:a3:45:8a:4f:e7:e2:70:e9:39:91:c2:ac:d0:94:d2: 83:d2:a4:d7:be:23:4e:32:a4:df:ad:72:0a:06:16:72: dc:f7:91:38:55:00:4c:ff:eb:e5:ec:08:9b:6f:32:45: a9:b3:06:2e:1c:1f:1c:c9:b7:75:7c:09:bd:e0:87:6c: b3:c8:16:c4:16:d5:ed:20:18:c7:15:66:6a:67:07:12: ce:90:fb:09:79:ad:4b:71:d7:f3:2a:52:c4:58:b7:21: 76:50:72:a9:78:d5:26:34:a4:10:3c:42:b3:1a:0f:39: 58:75:a3:94:d7:53:3b:26:07:c7:31:3b:08:2c:ce:55: 7e:04:86:8b:44:f9:ca:67:8c:44:48:c6:e4:75:81:1c: 14:39:1f:76:b1:bd:fe:f5:38:fa:92:1f:32:ba:47:9f: ac:41:89:50:0a:c1:a9:aa:f7:a1:c8:89:90:ca:cf:d3: c3:12:fc:e4:aa:d4:4f:9f:08:56:44:3e:47:5c:2c:96: b5:40:71:dd:f5:6d:2f:13:44:a2:0b:15:2a:18:28:b6: 4c:46:11:38:2b:b2:d5:0c:57:a1:72:c8:5e:89:80:a0: b3:86:45:88:58:e2:a5:98:9b:2d:30:bd:ae:60:47:96 Fingerprint (SHA-256): 0F:F7:2F:CF:EF:03:E2:ED:B3:A6:9B:F7:97:E9:37:3E:95:43:A8:5B:C3:3F:49:1D:73:AF:32:9D:12:D2:E1:31 Fingerprint (SHA1): 8B:16:2E:0F:D6:09:74:D7:68:CB:44:B5:7F:7A:DB:6E:C0:DD:0D:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1750: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1751: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:02 2025 Not After : Thu Nov 28 11:15:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:33:f1:a2:66:ea:f6:d6:82:91:3a:9c:bc:f1:89:3b: 23:5e:59:66:43:23:bd:73:7c:b0:ba:bd:27:a6:66:76: 9f:cb:c8:0f:96:54:bd:26:00:44:cb:0d:95:8f:df:ee: 60:0b:16:3f:c8:b1:a9:85:2d:e5:c0:5a:47:e5:0f:6b: 8d:5d:43:33:a4:54:eb:58:43:26:01:c5:96:d5:2e:cc: 26:8b:2a:e7:84:b3:16:20:47:a4:25:aa:3f:ec:bb:93: b5:11:a8:5f:38:5d:5b:6d:fa:aa:bd:c4:e3:26:8d:b8: 6e:92:fd:1d:47:a7:6c:ed:26:06:36:d7:5c:29:b0:d7: 4b:3a:37:a9:14:71:03:25:c2:79:24:21:54:89:f2:15: 53:08:46:06:92:a2:eb:c8:24:4d:24:03:c0:fc:2b:f1: c4:fe:40:7b:9b:ab:42:74:bc:50:e9:ff:3c:4f:6a:d0: c8:26:09:ef:e4:27:f6:22:6b:16:9b:8d:3b:f2:87:8a: ae:5b:f5:eb:41:c6:4b:a6:47:c3:f1:4f:ea:a4:7b:37: 85:4f:0c:53:62:b9:79:b2:84:d4:1a:e1:d0:54:7f:38: 03:83:f3:cb:06:3d:64:1c:be:4d:b3:78:c8:e4:bc:6b: 69:07:1c:7f:5b:23:ec:73:7e:4c:53:a5:b4:45:df:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:ab:4f:c2:0b:e0:de:7c:bd:15:7f:1e:0c:a2:ef:59: b3:a3:45:8a:4f:e7:e2:70:e9:39:91:c2:ac:d0:94:d2: 83:d2:a4:d7:be:23:4e:32:a4:df:ad:72:0a:06:16:72: dc:f7:91:38:55:00:4c:ff:eb:e5:ec:08:9b:6f:32:45: a9:b3:06:2e:1c:1f:1c:c9:b7:75:7c:09:bd:e0:87:6c: b3:c8:16:c4:16:d5:ed:20:18:c7:15:66:6a:67:07:12: ce:90:fb:09:79:ad:4b:71:d7:f3:2a:52:c4:58:b7:21: 76:50:72:a9:78:d5:26:34:a4:10:3c:42:b3:1a:0f:39: 58:75:a3:94:d7:53:3b:26:07:c7:31:3b:08:2c:ce:55: 7e:04:86:8b:44:f9:ca:67:8c:44:48:c6:e4:75:81:1c: 14:39:1f:76:b1:bd:fe:f5:38:fa:92:1f:32:ba:47:9f: ac:41:89:50:0a:c1:a9:aa:f7:a1:c8:89:90:ca:cf:d3: c3:12:fc:e4:aa:d4:4f:9f:08:56:44:3e:47:5c:2c:96: b5:40:71:dd:f5:6d:2f:13:44:a2:0b:15:2a:18:28:b6: 4c:46:11:38:2b:b2:d5:0c:57:a1:72:c8:5e:89:80:a0: b3:86:45:88:58:e2:a5:98:9b:2d:30:bd:ae:60:47:96 Fingerprint (SHA-256): 0F:F7:2F:CF:EF:03:E2:ED:B3:A6:9B:F7:97:E9:37:3E:95:43:A8:5B:C3:3F:49:1D:73:AF:32:9D:12:D2:E1:31 Fingerprint (SHA1): 8B:16:2E:0F:D6:09:74:D7:68:CB:44:B5:7F:7A:DB:6E:C0:DD:0D:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1752: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1753: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #1754: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1755: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1756: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #1757: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #1758: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111510Z nextupdate=20261128111510Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:15:10 2025 Next Update: Sat Nov 28 11:15:10 2026 CRL Extensions: chains.sh: #1759: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111511Z addcert 3 20251128111511Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:15:11 2025 Next Update: Sat Nov 28 11:15:10 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:15:11 2025 CRL Extensions: chains.sh: #1760: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111512Z addcert 4 20251128111512Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:15:12 2025 Next Update: Sat Nov 28 11:15:10 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:15:12 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:15:11 2025 CRL Extensions: chains.sh: #1761: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1762: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1763: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1764: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1765: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #1766: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1768: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #1769: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1770: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1771: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1772: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #1773: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1774: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:46 2025 Not After : Thu Nov 28 11:10:46 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:de:1f:02:6e:9c:11:8d:14:99:cc:04:bf:ff:f4:4c: b8:8b:a4:d8:63:3b:35:c5:13:dd:d0:db:00:0a:70:2f: a8:37:44:d5:96:78:87:a3:89:26:6c:94:f9:3a:2c:0a: a2:5a:b2:dc:4a:5c:e5:ef:6b:de:17:e0:6b:be:f1:64: 28:2e:f3:13:23:4e:f0:6a:d0:f6:5d:03:a0:70:49:1d: b2:af:3d:66:e4:23:b7:00:01:45:62:90:9a:c0:b3:24: 69:70:66:df:ee:aa:4e:93:20:46:43:d1:ac:e3:2e:1b: 2e:fd:e5:0f:4d:80:fc:a9:e4:70:6d:76:1c:57:f9:6b: 5a:81:18:ab:d6:80:46:63:0e:42:0c:af:df:71:63:e2: 5b:fa:a1:00:24:3f:a2:f9:e7:6f:5e:c3:59:b9:2e:0a: 22:46:15:2d:b2:86:21:30:24:e9:3f:94:46:9a:8b:f4: 10:31:d0:c6:b6:12:45:4e:4f:5a:72:eb:35:57:d8:33: 9e:fe:23:b2:75:84:ad:e1:13:24:4c:9d:00:fa:3e:eb: 34:13:da:16:8b:dc:1c:ec:34:db:17:ed:80:9e:d2:36: 9c:27:12:f3:77:b2:72:48:36:e8:63:92:4e:e8:0a:12: f8:99:fc:83:f3:e1:72:57:d5:60:17:4d:50:e4:9e:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:a8:a7:03:e0:13:8e:f2:a4:d3:27:12:3d:9e:cb:3b: ec:2c:48:f7:05:a6:fd:07:24:a9:a9:d9:9e:ec:0b:df: 53:04:29:04:ad:0d:b6:8d:a3:03:8d:da:18:24:c4:1c: 2a:98:fc:b1:52:d1:0d:00:ad:7c:2e:30:5a:63:06:5c: 84:44:b4:a8:87:22:97:a1:55:dc:78:1d:28:ba:ad:17: 85:e6:21:f9:02:79:0e:33:2d:7e:6e:40:b7:15:9f:ad: 43:4e:52:7b:79:30:d7:ff:81:99:6d:23:ad:53:81:a0: 0b:bb:a5:9a:e1:95:50:d5:ec:16:4b:b6:4e:4d:d2:0a: a9:0f:f1:ff:29:6b:a0:e5:7d:28:33:f9:08:ef:90:0e: 34:83:34:a0:95:94:a8:88:74:94:ad:b3:aa:a6:01:89: 39:0f:3f:c0:c9:e8:a9:55:87:cc:e9:7c:67:1f:1c:6a: a9:9a:d1:22:9b:bb:4b:95:41:9b:c8:2c:da:39:6e:f6: 94:6c:3d:99:f0:ec:ef:6b:8a:cc:e8:42:12:3c:28:20: d9:10:f1:46:dc:36:ba:76:e0:f4:d4:8f:0f:c0:db:2e: 06:cd:75:62:7f:10:55:03:e7:a9:cf:62:a1:f3:a2:ab: 71:eb:39:9a:47:83:70:04:79:ff:0d:f0:83:0f:c4:eb Fingerprint (SHA-256): FA:9F:34:98:3E:45:9C:64:C3:1D:B0:D6:1F:FD:E7:E1:0A:FA:6E:FB:8D:38:E4:88:EA:D6:1E:1D:95:72:E9:16 Fingerprint (SHA1): 2B:9F:53:8F:89:96:19:33:10:A1:56:57:42:D6:AD:CC:A5:CE:1D:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #1775: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #1776: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1777: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1778: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #1779: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1780: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #1781: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1782: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191327 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1783: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1784: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1785: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1786: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128191328 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1787: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1788: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1789: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191086.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1790: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191057.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1791: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1792: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1793: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191086.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1794: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128191329 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1795: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1796: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1797: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191086.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1798: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191058.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1799: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1800: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1801: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1802: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128191330 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1803: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1804: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1805: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191086.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1806: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191059.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1807: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1808: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1809: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191086.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1810: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191060.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1811: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1812: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111519Z nextupdate=20261128111519Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:15:19 2025 Next Update: Sat Nov 28 11:15:19 2026 CRL Extensions: chains.sh: #1813: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111520Z nextupdate=20261128111520Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:15:20 2025 Next Update: Sat Nov 28 11:15:20 2026 CRL Extensions: chains.sh: #1814: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111520Z nextupdate=20261128111520Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:15:20 2025 Next Update: Sat Nov 28 11:15:20 2026 CRL Extensions: chains.sh: #1815: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111520Z nextupdate=20261128111520Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:15:20 2025 Next Update: Sat Nov 28 11:15:20 2026 CRL Extensions: chains.sh: #1816: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111521Z addcert 20 20251128111521Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:15:21 2025 Next Update: Sat Nov 28 11:15:20 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:15:21 2025 CRL Extensions: chains.sh: #1817: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111522Z addcert 40 20251128111522Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:15:22 2025 Next Update: Sat Nov 28 11:15:20 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:15:21 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:15:22 2025 CRL Extensions: chains.sh: #1818: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1819: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1820: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1821: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191327 (0x433ed55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:15 2025 Not After : Thu Nov 28 11:15:15 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:0f:f8:6b:7a:17:ff:36:ee:05:a4:45:5e:2f:a7:ad: 19:13:c8:82:b0:24:81:af:2a:d7:93:20:84:eb:58:ac: c7:a0:f5:96:a9:b6:18:aa:cf:55:25:3c:de:23:ed:2d: e8:56:ee:08:aa:7f:58:74:00:ce:2f:c5:88:9c:70:f6: 74:3c:15:d7:eb:cb:dd:38:cd:26:be:12:76:74:8f:9b: 08:a9:f7:b8:50:8c:26:73:bf:b9:d8:d1:f1:6a:f5:a9: d8:f7:a8:7d:bc:75:d3:4f:93:6d:2d:33:30:d8:08:9b: 7a:c9:53:ed:05:8a:bb:0e:ce:2b:d2:0e:88:cf:46:ba: b4:fb:ed:d7:3b:54:57:6a:4c:ca:39:d8:72:4f:41:18: 4f:e6:aa:da:71:a2:f4:b7:a0:09:55:02:64:f8:2d:de: 46:0e:84:69:57:26:88:51:f5:53:69:60:6f:15:83:e9: 7c:64:15:92:c5:5a:92:7c:27:a9:21:56:16:95:fd:60: 70:60:69:67:6a:68:40:d1:9c:d0:ab:20:69:bb:db:a4: 6c:9f:f8:59:c6:34:a4:7f:0a:93:5b:85:77:83:c4:7e: 94:c4:6c:85:62:9b:3b:d1:8b:88:6c:4b:bf:de:27:42: a9:a6:64:ad:91:3b:2b:63:39:04:c9:6d:13:4c:45:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:38:e7:1b:76:92:da:24:c1:d6:54:c6:35:a2:6e:c6: 35:d7:ca:3c:51:89:9b:65:27:a3:24:15:77:bb:da:0b: fd:1b:50:85:0b:ee:b3:5c:37:03:70:bc:e7:35:a4:b0: e3:6a:ee:a0:21:ae:46:be:de:dd:d0:a6:45:ec:6b:b2: 3f:fd:5b:4f:34:0f:9f:79:5f:01:8a:90:f5:97:92:d2: 3c:4d:12:75:17:a5:15:56:07:9f:0c:3a:c1:de:57:87: 51:d7:21:cd:67:49:cc:bb:0d:d7:94:7a:41:8c:e9:af: 24:6d:fa:95:2b:95:c8:cb:a4:fd:de:7d:7b:d7:4c:96: 53:7d:92:9a:e1:0b:06:53:81:ef:8d:7a:c3:8a:90:b3: 5d:6a:ec:26:4d:50:20:74:84:9c:9c:91:0a:c5:61:d7: 2c:db:37:07:6c:16:1c:e5:e9:16:d7:26:b0:05:49:43: 6c:d4:0e:d8:77:7e:dd:48:04:01:61:a1:f7:a6:e9:f3: a7:aa:df:c7:9f:91:3c:3a:a9:43:1a:dd:22:38:cd:87: ce:3b:76:9b:11:7a:f4:47:e6:4e:ff:70:5f:bb:9d:16: f0:89:1b:ff:eb:53:3a:c8:a0:3c:54:c5:35:89:38:1c: 11:cd:70:24:5a:d5:f1:15:f5:8e:25:08:bd:96:b2:7a Fingerprint (SHA-256): E2:23:A7:FE:DB:BE:BE:8E:48:57:D7:7A:9E:2B:D5:FB:FA:28:02:02:8D:D1:E3:A9:48:3F:9F:09:AB:A9:DC:AE Fingerprint (SHA1): 62:8A:3B:96:65:90:7F:40:C6:BE:2F:21:13:91:1D:27:31:43:FB:FB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1822: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1823: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191327 (0x433ed55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:15 2025 Not After : Thu Nov 28 11:15:15 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:0f:f8:6b:7a:17:ff:36:ee:05:a4:45:5e:2f:a7:ad: 19:13:c8:82:b0:24:81:af:2a:d7:93:20:84:eb:58:ac: c7:a0:f5:96:a9:b6:18:aa:cf:55:25:3c:de:23:ed:2d: e8:56:ee:08:aa:7f:58:74:00:ce:2f:c5:88:9c:70:f6: 74:3c:15:d7:eb:cb:dd:38:cd:26:be:12:76:74:8f:9b: 08:a9:f7:b8:50:8c:26:73:bf:b9:d8:d1:f1:6a:f5:a9: d8:f7:a8:7d:bc:75:d3:4f:93:6d:2d:33:30:d8:08:9b: 7a:c9:53:ed:05:8a:bb:0e:ce:2b:d2:0e:88:cf:46:ba: b4:fb:ed:d7:3b:54:57:6a:4c:ca:39:d8:72:4f:41:18: 4f:e6:aa:da:71:a2:f4:b7:a0:09:55:02:64:f8:2d:de: 46:0e:84:69:57:26:88:51:f5:53:69:60:6f:15:83:e9: 7c:64:15:92:c5:5a:92:7c:27:a9:21:56:16:95:fd:60: 70:60:69:67:6a:68:40:d1:9c:d0:ab:20:69:bb:db:a4: 6c:9f:f8:59:c6:34:a4:7f:0a:93:5b:85:77:83:c4:7e: 94:c4:6c:85:62:9b:3b:d1:8b:88:6c:4b:bf:de:27:42: a9:a6:64:ad:91:3b:2b:63:39:04:c9:6d:13:4c:45:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:38:e7:1b:76:92:da:24:c1:d6:54:c6:35:a2:6e:c6: 35:d7:ca:3c:51:89:9b:65:27:a3:24:15:77:bb:da:0b: fd:1b:50:85:0b:ee:b3:5c:37:03:70:bc:e7:35:a4:b0: e3:6a:ee:a0:21:ae:46:be:de:dd:d0:a6:45:ec:6b:b2: 3f:fd:5b:4f:34:0f:9f:79:5f:01:8a:90:f5:97:92:d2: 3c:4d:12:75:17:a5:15:56:07:9f:0c:3a:c1:de:57:87: 51:d7:21:cd:67:49:cc:bb:0d:d7:94:7a:41:8c:e9:af: 24:6d:fa:95:2b:95:c8:cb:a4:fd:de:7d:7b:d7:4c:96: 53:7d:92:9a:e1:0b:06:53:81:ef:8d:7a:c3:8a:90:b3: 5d:6a:ec:26:4d:50:20:74:84:9c:9c:91:0a:c5:61:d7: 2c:db:37:07:6c:16:1c:e5:e9:16:d7:26:b0:05:49:43: 6c:d4:0e:d8:77:7e:dd:48:04:01:61:a1:f7:a6:e9:f3: a7:aa:df:c7:9f:91:3c:3a:a9:43:1a:dd:22:38:cd:87: ce:3b:76:9b:11:7a:f4:47:e6:4e:ff:70:5f:bb:9d:16: f0:89:1b:ff:eb:53:3a:c8:a0:3c:54:c5:35:89:38:1c: 11:cd:70:24:5a:d5:f1:15:f5:8e:25:08:bd:96:b2:7a Fingerprint (SHA-256): E2:23:A7:FE:DB:BE:BE:8E:48:57:D7:7A:9E:2B:D5:FB:FA:28:02:02:8D:D1:E3:A9:48:3F:9F:09:AB:A9:DC:AE Fingerprint (SHA1): 62:8A:3B:96:65:90:7F:40:C6:BE:2F:21:13:91:1D:27:31:43:FB:FB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1824: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1825: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1826: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191331 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1827: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1828: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1829: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1830: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191332 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1831: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1832: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1833: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1834: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191333 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1835: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1836: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1837: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1838: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128191334 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1839: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1840: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1841: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191335 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1842: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1843: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1844: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1845: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128191336 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1846: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1847: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1848: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1849: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128191337 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1850: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1851: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1852: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1853: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1854: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191331 (0x433ed563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:23 2025 Not After : Thu Nov 28 11:15:23 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:53:f0:a9:39:be:54:fe:b4:60:89:3b:54:c7:ba:75: a9:8f:4f:90:3a:9a:84:15:d9:78:d1:fd:71:11:4d:52: a0:b4:d6:88:1b:41:52:69:2e:3e:d5:db:59:69:14:8c: 70:04:fa:ac:20:5e:8f:81:2e:bf:84:43:59:c5:1c:d8: 86:50:a7:62:16:aa:00:d6:7e:ae:c7:76:4a:fa:8b:b1: b2:a9:f3:1a:dd:64:26:e0:19:93:a1:d0:0a:a8:ea:dc: c5:6a:ef:97:56:e2:a3:8a:49:0d:a3:e1:74:29:68:0a: 96:ed:6a:5f:38:d9:c0:95:84:cf:dc:fe:2f:96:4b:45: 4e:5a:59:10:70:ba:9c:a6:4b:d2:05:fb:3b:e7:33:c4: 6d:7b:e0:21:b0:cd:4a:ae:65:0f:34:ef:84:77:71:e3: ee:51:5a:98:82:0c:1a:2c:73:c6:2e:4c:cb:ee:96:13: ac:66:d4:e2:38:46:71:92:c9:19:f8:3a:87:fa:d9:65: d5:e7:05:f1:b3:f9:d1:50:f1:49:d6:0c:d0:b8:d9:8d: f2:51:33:c6:59:cc:11:7d:41:94:af:fe:e9:b8:6e:e8: ad:e4:5f:e9:f0:55:ca:5c:03:ac:59:61:bf:a7:ac:b6: f6:37:4a:8a:ad:cb:95:9f:07:a3:14:95:ad:93:2d:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:71:63:d9:09:6d:78:7c:3f:7a:7f:1d:54:97:47:d3: 92:78:df:66:58:21:b3:d2:dc:0e:86:01:d1:1f:f7:42: 4d:e8:18:c3:44:89:cc:c8:1d:a9:10:64:f1:e7:ee:28: 5e:c3:5f:f8:0f:15:8e:0a:79:60:24:50:2a:11:7e:c1: d7:83:4f:41:9f:9c:be:0d:b1:4e:6b:12:23:d5:89:a5: 35:ac:27:ec:21:65:00:8e:58:5a:4a:d5:3f:e0:70:9f: ec:e3:22:1a:7b:2c:b9:6a:6e:c0:dd:98:1b:ad:d7:e1: d9:d2:5c:b6:46:82:62:9f:b8:1a:fe:72:bd:03:f4:4c: 01:9d:b2:d4:58:e4:69:96:e7:cf:83:f8:a8:e9:25:33: 29:fb:89:28:92:dc:6a:8d:b6:bd:e6:82:c3:9e:7b:bc: 1f:5a:12:4e:4d:b2:9d:bc:73:8c:d3:b2:97:3a:f0:d1: 1a:63:f2:8c:7c:8c:f1:91:a8:5a:b0:92:74:52:42:9b: 45:55:6c:85:31:af:6f:82:83:e0:a1:41:fc:d9:63:63: 03:67:17:c4:6b:b1:2e:1a:30:87:af:30:75:26:f4:f5: 82:79:a0:d3:8e:f0:b8:20:78:a7:88:95:65:9b:2b:66: 73:17:41:27:11:eb:3e:7f:3d:04:fd:79:c5:7b:bf:21 Fingerprint (SHA-256): 12:89:48:BF:A4:31:80:D0:4D:A2:60:AA:99:8C:2E:DC:58:8E:48:36:A5:B8:32:70:75:8D:FF:78:35:C7:D9:C6 Fingerprint (SHA1): CC:E3:B3:0E:3B:9B:35:65:8D:67:09:BE:ED:92:53:86:47:ED:FB:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1855: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191333 (0x433ed565) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:25 2025 Not After : Thu Nov 28 11:15:25 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:21:92:fd:f1:37:d2:c2:cc:e6:3f:ff:7d:fd:22:96: 81:89:f3:d6:71:73:1f:04:c3:e5:c6:02:e9:07:44:91: 4b:99:97:15:6f:04:1a:3b:92:4c:37:8f:93:f5:5d:44: 30:b6:9f:13:45:26:42:87:f4:47:a7:d7:9d:18:e4:0c: 5d:f4:09:e4:e2:99:97:29:2c:96:b2:bd:87:01:76:96: da:d7:3d:b7:bc:11:bc:71:4a:86:18:dc:91:bd:fd:b4: e5:2e:a4:ef:89:a4:86:8d:ea:ac:ea:67:94:0b:16:09: 26:6d:7c:3e:41:fe:d1:35:03:3f:ba:08:4d:d0:df:76: 69:f4:ae:01:72:a4:fa:d7:20:d9:c8:8e:f9:8b:4b:24: 62:82:41:61:a3:8a:cd:0d:5e:bb:2f:79:ee:81:e1:44: da:b6:f1:ad:5b:65:e1:e5:22:26:9e:fe:87:30:e8:79: f4:e0:03:54:a4:d6:89:b3:36:5c:9d:08:96:3d:ac:ee: b5:49:b9:52:ae:66:de:5a:fb:97:97:68:9d:f2:13:35: b7:54:e1:2a:dd:b8:c6:38:f8:80:72:fb:94:48:ff:c2: e7:1c:d9:d2:8e:23:c1:6a:fd:78:64:fc:46:3e:75:91: 0a:c8:bc:40:3f:5f:cc:9b:05:d7:d4:a9:5e:95:19:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:14:e3:f2:ef:5f:37:e2:99:d8:bf:85:07:60:59:00: dd:88:a5:78:49:9d:4a:67:2c:01:aa:d1:38:6f:b3:20: 5f:99:28:e4:67:05:c3:58:87:5d:5c:4b:50:d6:30:de: b2:30:6f:48:55:dc:d7:d4:39:42:e3:67:b0:2d:a0:b7: ed:ac:2f:8f:a4:9c:9a:bb:49:e3:7c:7a:a8:67:94:28: 88:f3:11:dc:53:36:7e:39:c2:e7:8b:50:a1:13:77:c3: 7f:c0:2e:20:16:76:e5:40:db:eb:24:7e:ba:13:51:08: 49:45:9a:21:b6:89:f2:bc:7e:f8:07:15:f6:9d:7a:46: fa:d3:56:73:d6:f9:a2:82:6a:2b:46:ff:c6:07:47:00: f5:e5:a0:ca:5a:e1:90:81:1c:7e:10:80:25:02:e5:8d: 2d:3d:57:8c:ae:8f:a3:7e:4b:8c:04:88:21:d4:65:d3: 93:5a:58:0c:0b:7d:51:a2:f4:ff:f3:34:6f:04:af:1b: 8e:48:e2:d3:86:54:fa:fa:82:99:78:db:9c:da:27:b8: 71:3a:d1:6d:e1:91:5c:ae:88:91:0b:1e:10:01:de:aa: e7:6c:87:a9:f0:7b:f1:6b:15:11:9c:a9:c0:5c:47:bf: 46:ce:49:a7:7d:31:16:48:8b:f0:00:8a:47:4f:16:4d Fingerprint (SHA-256): 95:5B:EF:EA:13:97:2F:F1:19:61:2B:5A:D7:9A:E5:99:8A:B6:09:A3:60:75:5A:AD:AB:D3:58:D8:5D:4F:41:61 Fingerprint (SHA1): 53:A4:0F:BC:36:15:1A:E6:5B:98:3D:A2:B9:84:50:18:15:A2:8B:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1856: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191331 (0x433ed563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:23 2025 Not After : Thu Nov 28 11:15:23 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:53:f0:a9:39:be:54:fe:b4:60:89:3b:54:c7:ba:75: a9:8f:4f:90:3a:9a:84:15:d9:78:d1:fd:71:11:4d:52: a0:b4:d6:88:1b:41:52:69:2e:3e:d5:db:59:69:14:8c: 70:04:fa:ac:20:5e:8f:81:2e:bf:84:43:59:c5:1c:d8: 86:50:a7:62:16:aa:00:d6:7e:ae:c7:76:4a:fa:8b:b1: b2:a9:f3:1a:dd:64:26:e0:19:93:a1:d0:0a:a8:ea:dc: c5:6a:ef:97:56:e2:a3:8a:49:0d:a3:e1:74:29:68:0a: 96:ed:6a:5f:38:d9:c0:95:84:cf:dc:fe:2f:96:4b:45: 4e:5a:59:10:70:ba:9c:a6:4b:d2:05:fb:3b:e7:33:c4: 6d:7b:e0:21:b0:cd:4a:ae:65:0f:34:ef:84:77:71:e3: ee:51:5a:98:82:0c:1a:2c:73:c6:2e:4c:cb:ee:96:13: ac:66:d4:e2:38:46:71:92:c9:19:f8:3a:87:fa:d9:65: d5:e7:05:f1:b3:f9:d1:50:f1:49:d6:0c:d0:b8:d9:8d: f2:51:33:c6:59:cc:11:7d:41:94:af:fe:e9:b8:6e:e8: ad:e4:5f:e9:f0:55:ca:5c:03:ac:59:61:bf:a7:ac:b6: f6:37:4a:8a:ad:cb:95:9f:07:a3:14:95:ad:93:2d:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:71:63:d9:09:6d:78:7c:3f:7a:7f:1d:54:97:47:d3: 92:78:df:66:58:21:b3:d2:dc:0e:86:01:d1:1f:f7:42: 4d:e8:18:c3:44:89:cc:c8:1d:a9:10:64:f1:e7:ee:28: 5e:c3:5f:f8:0f:15:8e:0a:79:60:24:50:2a:11:7e:c1: d7:83:4f:41:9f:9c:be:0d:b1:4e:6b:12:23:d5:89:a5: 35:ac:27:ec:21:65:00:8e:58:5a:4a:d5:3f:e0:70:9f: ec:e3:22:1a:7b:2c:b9:6a:6e:c0:dd:98:1b:ad:d7:e1: d9:d2:5c:b6:46:82:62:9f:b8:1a:fe:72:bd:03:f4:4c: 01:9d:b2:d4:58:e4:69:96:e7:cf:83:f8:a8:e9:25:33: 29:fb:89:28:92:dc:6a:8d:b6:bd:e6:82:c3:9e:7b:bc: 1f:5a:12:4e:4d:b2:9d:bc:73:8c:d3:b2:97:3a:f0:d1: 1a:63:f2:8c:7c:8c:f1:91:a8:5a:b0:92:74:52:42:9b: 45:55:6c:85:31:af:6f:82:83:e0:a1:41:fc:d9:63:63: 03:67:17:c4:6b:b1:2e:1a:30:87:af:30:75:26:f4:f5: 82:79:a0:d3:8e:f0:b8:20:78:a7:88:95:65:9b:2b:66: 73:17:41:27:11:eb:3e:7f:3d:04:fd:79:c5:7b:bf:21 Fingerprint (SHA-256): 12:89:48:BF:A4:31:80:D0:4D:A2:60:AA:99:8C:2E:DC:58:8E:48:36:A5:B8:32:70:75:8D:FF:78:35:C7:D9:C6 Fingerprint (SHA1): CC:E3:B3:0E:3B:9B:35:65:8D:67:09:BE:ED:92:53:86:47:ED:FB:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1857: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1858: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191331 (0x433ed563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:23 2025 Not After : Thu Nov 28 11:15:23 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:53:f0:a9:39:be:54:fe:b4:60:89:3b:54:c7:ba:75: a9:8f:4f:90:3a:9a:84:15:d9:78:d1:fd:71:11:4d:52: a0:b4:d6:88:1b:41:52:69:2e:3e:d5:db:59:69:14:8c: 70:04:fa:ac:20:5e:8f:81:2e:bf:84:43:59:c5:1c:d8: 86:50:a7:62:16:aa:00:d6:7e:ae:c7:76:4a:fa:8b:b1: b2:a9:f3:1a:dd:64:26:e0:19:93:a1:d0:0a:a8:ea:dc: c5:6a:ef:97:56:e2:a3:8a:49:0d:a3:e1:74:29:68:0a: 96:ed:6a:5f:38:d9:c0:95:84:cf:dc:fe:2f:96:4b:45: 4e:5a:59:10:70:ba:9c:a6:4b:d2:05:fb:3b:e7:33:c4: 6d:7b:e0:21:b0:cd:4a:ae:65:0f:34:ef:84:77:71:e3: ee:51:5a:98:82:0c:1a:2c:73:c6:2e:4c:cb:ee:96:13: ac:66:d4:e2:38:46:71:92:c9:19:f8:3a:87:fa:d9:65: d5:e7:05:f1:b3:f9:d1:50:f1:49:d6:0c:d0:b8:d9:8d: f2:51:33:c6:59:cc:11:7d:41:94:af:fe:e9:b8:6e:e8: ad:e4:5f:e9:f0:55:ca:5c:03:ac:59:61:bf:a7:ac:b6: f6:37:4a:8a:ad:cb:95:9f:07:a3:14:95:ad:93:2d:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:71:63:d9:09:6d:78:7c:3f:7a:7f:1d:54:97:47:d3: 92:78:df:66:58:21:b3:d2:dc:0e:86:01:d1:1f:f7:42: 4d:e8:18:c3:44:89:cc:c8:1d:a9:10:64:f1:e7:ee:28: 5e:c3:5f:f8:0f:15:8e:0a:79:60:24:50:2a:11:7e:c1: d7:83:4f:41:9f:9c:be:0d:b1:4e:6b:12:23:d5:89:a5: 35:ac:27:ec:21:65:00:8e:58:5a:4a:d5:3f:e0:70:9f: ec:e3:22:1a:7b:2c:b9:6a:6e:c0:dd:98:1b:ad:d7:e1: d9:d2:5c:b6:46:82:62:9f:b8:1a:fe:72:bd:03:f4:4c: 01:9d:b2:d4:58:e4:69:96:e7:cf:83:f8:a8:e9:25:33: 29:fb:89:28:92:dc:6a:8d:b6:bd:e6:82:c3:9e:7b:bc: 1f:5a:12:4e:4d:b2:9d:bc:73:8c:d3:b2:97:3a:f0:d1: 1a:63:f2:8c:7c:8c:f1:91:a8:5a:b0:92:74:52:42:9b: 45:55:6c:85:31:af:6f:82:83:e0:a1:41:fc:d9:63:63: 03:67:17:c4:6b:b1:2e:1a:30:87:af:30:75:26:f4:f5: 82:79:a0:d3:8e:f0:b8:20:78:a7:88:95:65:9b:2b:66: 73:17:41:27:11:eb:3e:7f:3d:04:fd:79:c5:7b:bf:21 Fingerprint (SHA-256): 12:89:48:BF:A4:31:80:D0:4D:A2:60:AA:99:8C:2E:DC:58:8E:48:36:A5:B8:32:70:75:8D:FF:78:35:C7:D9:C6 Fingerprint (SHA1): CC:E3:B3:0E:3B:9B:35:65:8D:67:09:BE:ED:92:53:86:47:ED:FB:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1859: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191333 (0x433ed565) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:25 2025 Not After : Thu Nov 28 11:15:25 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:21:92:fd:f1:37:d2:c2:cc:e6:3f:ff:7d:fd:22:96: 81:89:f3:d6:71:73:1f:04:c3:e5:c6:02:e9:07:44:91: 4b:99:97:15:6f:04:1a:3b:92:4c:37:8f:93:f5:5d:44: 30:b6:9f:13:45:26:42:87:f4:47:a7:d7:9d:18:e4:0c: 5d:f4:09:e4:e2:99:97:29:2c:96:b2:bd:87:01:76:96: da:d7:3d:b7:bc:11:bc:71:4a:86:18:dc:91:bd:fd:b4: e5:2e:a4:ef:89:a4:86:8d:ea:ac:ea:67:94:0b:16:09: 26:6d:7c:3e:41:fe:d1:35:03:3f:ba:08:4d:d0:df:76: 69:f4:ae:01:72:a4:fa:d7:20:d9:c8:8e:f9:8b:4b:24: 62:82:41:61:a3:8a:cd:0d:5e:bb:2f:79:ee:81:e1:44: da:b6:f1:ad:5b:65:e1:e5:22:26:9e:fe:87:30:e8:79: f4:e0:03:54:a4:d6:89:b3:36:5c:9d:08:96:3d:ac:ee: b5:49:b9:52:ae:66:de:5a:fb:97:97:68:9d:f2:13:35: b7:54:e1:2a:dd:b8:c6:38:f8:80:72:fb:94:48:ff:c2: e7:1c:d9:d2:8e:23:c1:6a:fd:78:64:fc:46:3e:75:91: 0a:c8:bc:40:3f:5f:cc:9b:05:d7:d4:a9:5e:95:19:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:14:e3:f2:ef:5f:37:e2:99:d8:bf:85:07:60:59:00: dd:88:a5:78:49:9d:4a:67:2c:01:aa:d1:38:6f:b3:20: 5f:99:28:e4:67:05:c3:58:87:5d:5c:4b:50:d6:30:de: b2:30:6f:48:55:dc:d7:d4:39:42:e3:67:b0:2d:a0:b7: ed:ac:2f:8f:a4:9c:9a:bb:49:e3:7c:7a:a8:67:94:28: 88:f3:11:dc:53:36:7e:39:c2:e7:8b:50:a1:13:77:c3: 7f:c0:2e:20:16:76:e5:40:db:eb:24:7e:ba:13:51:08: 49:45:9a:21:b6:89:f2:bc:7e:f8:07:15:f6:9d:7a:46: fa:d3:56:73:d6:f9:a2:82:6a:2b:46:ff:c6:07:47:00: f5:e5:a0:ca:5a:e1:90:81:1c:7e:10:80:25:02:e5:8d: 2d:3d:57:8c:ae:8f:a3:7e:4b:8c:04:88:21:d4:65:d3: 93:5a:58:0c:0b:7d:51:a2:f4:ff:f3:34:6f:04:af:1b: 8e:48:e2:d3:86:54:fa:fa:82:99:78:db:9c:da:27:b8: 71:3a:d1:6d:e1:91:5c:ae:88:91:0b:1e:10:01:de:aa: e7:6c:87:a9:f0:7b:f1:6b:15:11:9c:a9:c0:5c:47:bf: 46:ce:49:a7:7d:31:16:48:8b:f0:00:8a:47:4f:16:4d Fingerprint (SHA-256): 95:5B:EF:EA:13:97:2F:F1:19:61:2B:5A:D7:9A:E5:99:8A:B6:09:A3:60:75:5A:AD:AB:D3:58:D8:5D:4F:41:61 Fingerprint (SHA1): 53:A4:0F:BC:36:15:1A:E6:5B:98:3D:A2:B9:84:50:18:15:A2:8B:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1860: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1861: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1862: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1863: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191331 (0x433ed563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:23 2025 Not After : Thu Nov 28 11:15:23 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:53:f0:a9:39:be:54:fe:b4:60:89:3b:54:c7:ba:75: a9:8f:4f:90:3a:9a:84:15:d9:78:d1:fd:71:11:4d:52: a0:b4:d6:88:1b:41:52:69:2e:3e:d5:db:59:69:14:8c: 70:04:fa:ac:20:5e:8f:81:2e:bf:84:43:59:c5:1c:d8: 86:50:a7:62:16:aa:00:d6:7e:ae:c7:76:4a:fa:8b:b1: b2:a9:f3:1a:dd:64:26:e0:19:93:a1:d0:0a:a8:ea:dc: c5:6a:ef:97:56:e2:a3:8a:49:0d:a3:e1:74:29:68:0a: 96:ed:6a:5f:38:d9:c0:95:84:cf:dc:fe:2f:96:4b:45: 4e:5a:59:10:70:ba:9c:a6:4b:d2:05:fb:3b:e7:33:c4: 6d:7b:e0:21:b0:cd:4a:ae:65:0f:34:ef:84:77:71:e3: ee:51:5a:98:82:0c:1a:2c:73:c6:2e:4c:cb:ee:96:13: ac:66:d4:e2:38:46:71:92:c9:19:f8:3a:87:fa:d9:65: d5:e7:05:f1:b3:f9:d1:50:f1:49:d6:0c:d0:b8:d9:8d: f2:51:33:c6:59:cc:11:7d:41:94:af:fe:e9:b8:6e:e8: ad:e4:5f:e9:f0:55:ca:5c:03:ac:59:61:bf:a7:ac:b6: f6:37:4a:8a:ad:cb:95:9f:07:a3:14:95:ad:93:2d:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:71:63:d9:09:6d:78:7c:3f:7a:7f:1d:54:97:47:d3: 92:78:df:66:58:21:b3:d2:dc:0e:86:01:d1:1f:f7:42: 4d:e8:18:c3:44:89:cc:c8:1d:a9:10:64:f1:e7:ee:28: 5e:c3:5f:f8:0f:15:8e:0a:79:60:24:50:2a:11:7e:c1: d7:83:4f:41:9f:9c:be:0d:b1:4e:6b:12:23:d5:89:a5: 35:ac:27:ec:21:65:00:8e:58:5a:4a:d5:3f:e0:70:9f: ec:e3:22:1a:7b:2c:b9:6a:6e:c0:dd:98:1b:ad:d7:e1: d9:d2:5c:b6:46:82:62:9f:b8:1a:fe:72:bd:03:f4:4c: 01:9d:b2:d4:58:e4:69:96:e7:cf:83:f8:a8:e9:25:33: 29:fb:89:28:92:dc:6a:8d:b6:bd:e6:82:c3:9e:7b:bc: 1f:5a:12:4e:4d:b2:9d:bc:73:8c:d3:b2:97:3a:f0:d1: 1a:63:f2:8c:7c:8c:f1:91:a8:5a:b0:92:74:52:42:9b: 45:55:6c:85:31:af:6f:82:83:e0:a1:41:fc:d9:63:63: 03:67:17:c4:6b:b1:2e:1a:30:87:af:30:75:26:f4:f5: 82:79:a0:d3:8e:f0:b8:20:78:a7:88:95:65:9b:2b:66: 73:17:41:27:11:eb:3e:7f:3d:04:fd:79:c5:7b:bf:21 Fingerprint (SHA-256): 12:89:48:BF:A4:31:80:D0:4D:A2:60:AA:99:8C:2E:DC:58:8E:48:36:A5:B8:32:70:75:8D:FF:78:35:C7:D9:C6 Fingerprint (SHA1): CC:E3:B3:0E:3B:9B:35:65:8D:67:09:BE:ED:92:53:86:47:ED:FB:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1864: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191335 (0x433ed567) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:15:26 2025 Not After : Thu Nov 28 11:15:26 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:0e:62:ab:6f:cf:13:24:e3:68:9b:a9:53:bf:8b:fc: 7c:c0:fe:5a:ff:57:6b:ec:f2:56:c0:1f:84:3d:c5:a4: 01:e4:e7:18:97:72:53:7e:b6:c8:48:7a:bb:9c:b4:9f: 46:8d:dd:a9:85:2d:68:a4:bb:65:59:35:82:48:34:73: cd:8a:f6:51:41:40:d6:69:0e:a5:b3:23:33:ba:ce:f0: e4:58:a0:2e:35:08:4b:8c:39:93:38:8c:7b:49:8c:69: 16:40:f0:31:18:81:67:40:22:9e:dd:31:f3:bb:5a:36: 72:4b:38:04:35:0e:54:a4:8f:44:8a:23:f5:45:99:88: 31:25:96:75:ef:7a:09:8a:f9:a6:7d:2e:de:d3:3a:1b: fa:7e:12:a9:d0:3c:b7:da:c0:d7:40:e7:89:e4:cb:b2: 12:72:4e:d9:61:59:76:bc:2c:cd:a0:54:84:a6:8a:75: 14:9c:7e:3b:da:ea:9f:95:a0:e4:eb:55:8e:23:e1:9e: cb:24:ed:3e:bd:ca:b0:53:a0:07:5d:1f:4f:f7:16:15: af:e4:04:8e:b4:ee:bb:39:e1:70:fe:20:05:4a:fb:3a: aa:2e:b8:9a:35:5a:8d:fb:86:60:c5:07:ef:78:af:7e: 74:32:b5:f5:c4:2e:e1:a0:53:2b:18:bf:73:a1:58:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:4c:85:a6:fb:40:ff:32:f7:5a:21:12:dd:cf:af:a4: 64:42:db:00:99:f0:6f:80:1a:14:1e:d2:e7:53:4c:18: 66:90:7e:3c:ff:fd:0a:f9:fd:6e:cf:42:a2:e9:9c:b3: ea:55:8f:6e:6e:6c:2e:51:fd:e1:02:67:7c:75:cf:b9: a5:6f:44:bd:fe:d5:95:96:06:ca:f9:16:65:16:cc:2f: 97:a4:6e:8f:cc:c8:1e:a7:44:51:ec:f0:0e:a9:a8:b5: 06:e0:83:3f:3c:dc:0d:03:2c:be:eb:52:50:1b:44:cf: 80:d1:dd:5d:37:86:d3:f5:49:99:f5:f3:14:21:d3:15: d6:da:44:fb:08:c5:da:f2:6e:fe:58:8e:28:34:c1:fc: c2:af:cb:6f:ef:ba:57:4d:17:d4:7e:5e:9a:96:98:25: 56:25:c3:b9:e6:22:3b:2a:6e:26:b0:19:70:17:db:e2: b6:ab:71:1a:c2:c1:2a:1d:bf:9b:42:d1:ff:9d:31:a9: 8d:fa:cb:19:f3:9d:83:92:72:c5:c3:04:0c:dd:38:c1: 67:a2:d4:b1:21:bf:3b:6d:e0:d9:b2:ed:07:45:83:0f: 13:2d:55:74:42:28:dc:cc:97:24:d6:b8:6f:40:11:4e: ab:b2:58:3c:ab:77:e7:07:0a:22:1c:02:c4:15:cf:98 Fingerprint (SHA-256): FF:9C:0E:5E:7E:80:1D:EA:06:10:E0:4A:67:81:F8:D2:A2:DC:14:CA:13:DB:EA:38:94:A1:49:AA:8B:91:26:4F Fingerprint (SHA1): 4C:A1:63:25:B8:20:50:30:F8:7E:F6:A0:B9:78:45:92:D3:FC:1B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1865: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191331 (0x433ed563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:23 2025 Not After : Thu Nov 28 11:15:23 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:53:f0:a9:39:be:54:fe:b4:60:89:3b:54:c7:ba:75: a9:8f:4f:90:3a:9a:84:15:d9:78:d1:fd:71:11:4d:52: a0:b4:d6:88:1b:41:52:69:2e:3e:d5:db:59:69:14:8c: 70:04:fa:ac:20:5e:8f:81:2e:bf:84:43:59:c5:1c:d8: 86:50:a7:62:16:aa:00:d6:7e:ae:c7:76:4a:fa:8b:b1: b2:a9:f3:1a:dd:64:26:e0:19:93:a1:d0:0a:a8:ea:dc: c5:6a:ef:97:56:e2:a3:8a:49:0d:a3:e1:74:29:68:0a: 96:ed:6a:5f:38:d9:c0:95:84:cf:dc:fe:2f:96:4b:45: 4e:5a:59:10:70:ba:9c:a6:4b:d2:05:fb:3b:e7:33:c4: 6d:7b:e0:21:b0:cd:4a:ae:65:0f:34:ef:84:77:71:e3: ee:51:5a:98:82:0c:1a:2c:73:c6:2e:4c:cb:ee:96:13: ac:66:d4:e2:38:46:71:92:c9:19:f8:3a:87:fa:d9:65: d5:e7:05:f1:b3:f9:d1:50:f1:49:d6:0c:d0:b8:d9:8d: f2:51:33:c6:59:cc:11:7d:41:94:af:fe:e9:b8:6e:e8: ad:e4:5f:e9:f0:55:ca:5c:03:ac:59:61:bf:a7:ac:b6: f6:37:4a:8a:ad:cb:95:9f:07:a3:14:95:ad:93:2d:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:71:63:d9:09:6d:78:7c:3f:7a:7f:1d:54:97:47:d3: 92:78:df:66:58:21:b3:d2:dc:0e:86:01:d1:1f:f7:42: 4d:e8:18:c3:44:89:cc:c8:1d:a9:10:64:f1:e7:ee:28: 5e:c3:5f:f8:0f:15:8e:0a:79:60:24:50:2a:11:7e:c1: d7:83:4f:41:9f:9c:be:0d:b1:4e:6b:12:23:d5:89:a5: 35:ac:27:ec:21:65:00:8e:58:5a:4a:d5:3f:e0:70:9f: ec:e3:22:1a:7b:2c:b9:6a:6e:c0:dd:98:1b:ad:d7:e1: d9:d2:5c:b6:46:82:62:9f:b8:1a:fe:72:bd:03:f4:4c: 01:9d:b2:d4:58:e4:69:96:e7:cf:83:f8:a8:e9:25:33: 29:fb:89:28:92:dc:6a:8d:b6:bd:e6:82:c3:9e:7b:bc: 1f:5a:12:4e:4d:b2:9d:bc:73:8c:d3:b2:97:3a:f0:d1: 1a:63:f2:8c:7c:8c:f1:91:a8:5a:b0:92:74:52:42:9b: 45:55:6c:85:31:af:6f:82:83:e0:a1:41:fc:d9:63:63: 03:67:17:c4:6b:b1:2e:1a:30:87:af:30:75:26:f4:f5: 82:79:a0:d3:8e:f0:b8:20:78:a7:88:95:65:9b:2b:66: 73:17:41:27:11:eb:3e:7f:3d:04:fd:79:c5:7b:bf:21 Fingerprint (SHA-256): 12:89:48:BF:A4:31:80:D0:4D:A2:60:AA:99:8C:2E:DC:58:8E:48:36:A5:B8:32:70:75:8D:FF:78:35:C7:D9:C6 Fingerprint (SHA1): CC:E3:B3:0E:3B:9B:35:65:8D:67:09:BE:ED:92:53:86:47:ED:FB:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1866: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1867: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1868: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1869: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1870: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1871: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191336 (0x433ed568) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:15:26 2025 Not After : Thu Nov 28 11:15:26 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:45:9a:6b:14:8d:b6:0d:a9:24:4e:08:88:1c:d8:75: 90:44:07:1e:ae:f2:10:2a:20:c7:fa:3d:92:7d:cd:5c: 04:0a:b3:1e:44:a4:33:9a:62:3f:ef:39:a1:1b:84:45: 2e:cf:02:fc:f3:05:e4:08:af:34:8d:ec:ca:76:06:c0: e3:f7:13:a1:15:94:90:57:ad:7e:27:cd:7b:b0:11:13: 0e:32:d9:67:02:f2:07:00:05:ed:89:5e:83:49:e4:ae: be:64:b2:c8:ed:25:08:1a:8e:03:49:ce:1f:7c:ed:59: 8b:b5:64:56:8a:60:61:4d:f8:a6:8d:90:8c:fb:27:92: ff:14:70:b5:86:1b:e7:0a:ae:f0:5b:9a:8a:ba:33:4f: 98:66:9b:0b:29:f2:d2:98:7d:cc:89:43:33:1b:4d:bd: 25:2a:f6:ab:b4:51:25:e4:e4:85:44:c6:fc:c0:e6:22: 3c:20:41:3f:18:3f:38:40:cc:ed:45:8b:e6:95:d0:b0: a8:d6:a4:1e:ea:52:63:a8:b1:e9:a6:3b:26:a4:07:81: f7:46:01:8a:ea:10:6a:f1:e0:c7:b6:de:18:e6:fb:3d: bb:de:c7:bd:84:15:45:1a:32:60:34:66:4f:55:87:c4: b9:ba:25:1d:9d:9e:ae:e8:71:8c:d3:64:b1:2a:ce:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:8c:c9:02:ec:50:02:9a:f2:e2:49:a6:b8:aa:43:42: 1e:a5:fc:d0:7d:9b:92:47:42:b3:77:0b:dc:ff:8d:49: a3:fb:85:76:e7:b9:84:b6:01:be:9a:e4:52:2b:1c:c4: 01:4e:fc:5d:9a:5e:c4:c4:3c:26:5d:18:83:3a:df:a5: ff:04:5a:c2:e9:f3:6b:2a:6e:4e:9f:48:1e:c9:81:af: 65:96:ff:1b:ef:c5:c3:9c:36:76:f1:ca:3d:43:74:de: d8:2c:5b:b0:f0:aa:85:38:da:f7:bd:b1:f7:04:db:81: 75:11:45:5a:0a:cb:f3:7b:f2:ed:e7:ab:99:c8:03:6e: 1e:56:d3:ec:ca:dc:a7:88:eb:d7:99:92:de:b9:06:eb: dd:fc:3e:4a:6a:44:2d:eb:96:60:f9:a6:34:33:91:37: 7f:93:42:d8:67:c1:65:84:42:8f:a6:f0:16:5d:a2:3e: 48:e6:52:c1:ba:31:c1:51:1a:82:e8:53:a5:fc:30:1e: 0e:58:25:a4:61:bb:41:52:be:1e:7a:01:0d:8a:4b:a2: f7:05:cf:c6:67:20:c3:5f:58:5f:3c:7c:9a:57:7c:06: 36:db:c1:6e:fb:45:e8:85:96:3d:2c:c0:9d:9e:7b:9e: b5:1e:38:fe:9c:3d:07:5d:37:99:84:b8:aa:40:32:f2 Fingerprint (SHA-256): B4:CA:DE:C4:6E:0B:54:CE:90:58:06:10:6C:86:A9:43:D9:2F:00:5E:6C:32:8A:8C:74:46:86:CA:AE:C5:C4:74 Fingerprint (SHA1): D9:25:95:F4:B0:B9:47:94:88:37:D4:75:BD:FA:87:5D:35:9B:A0:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1872: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1873: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1874: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1875: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1876: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1877: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1878: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1879: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1880: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1881: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1882: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1883: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1884: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1885: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1886: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1887: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1888: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #1889: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1890: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1891: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1892: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1893: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1894: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1895: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1896: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1897: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2203389 at Fri Nov 28 19:15:31 CST 2025 kill -USR1 2203389 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2203389 killed at Fri Nov 28 19:15:31 CST 2025 httpserv starting at Fri Nov 28 19:15:31 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:15:31 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2215940 >/dev/null 2>/dev/null httpserv with PID 2215940 found at Fri Nov 28 19:15:31 CST 2025 httpserv with PID 2215940 started at Fri Nov 28 19:15:31 CST 2025 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1898: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1899: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191338 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1900: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1901: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1902: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191339 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1903: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1904: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1905: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1906: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191340 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1907: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1908: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191341 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1909: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1910: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1911: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1912: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1913: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128191342 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1914: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1915: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1916: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1917: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1918: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191339 (0x433ed56b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:15:32 2025 Not After : Thu Nov 28 11:15:32 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b7:ad:c9:ad:5e:b1:a2:9f:d8:14:1c:8b:f1:4b:43: 9f:2e:84:68:bd:7e:db:c4:1f:e5:3f:8a:3f:76:48:4d: 25:88:b7:c6:e5:d8:b0:41:20:36:8b:ef:c9:fa:eb:8a: 9d:3f:ef:01:38:98:40:99:fe:8e:2b:57:a7:a6:2f:ab: d7:22:85:aa:9a:89:bb:3d:ee:64:6e:d4:0b:c0:f0:1e: 00:75:49:59:98:4d:bd:24:45:d9:3c:f8:55:35:b7:66: 13:a4:ee:4d:77:b1:3b:06:8c:3c:d9:cd:5e:03:bc:d0: 1d:b5:37:fc:98:af:23:ca:d7:17:de:58:38:c8:fa:cc: ce:03:d6:53:5e:96:65:13:69:da:a2:83:d3:c9:79:0d: 92:08:e8:3c:8c:85:67:69:1e:1c:d1:e8:ad:d9:ab:8c: cb:36:97:ae:f7:89:4a:ff:d5:1b:39:61:2a:29:b0:95: a4:2f:47:b0:ce:84:35:0b:c8:53:7a:e1:63:e4:49:ab: 38:f4:7e:a6:a5:e4:50:30:57:fa:d7:0d:02:92:b7:e6: e0:9e:2b:2a:a4:71:e5:fc:1b:21:96:94:40:2f:8f:7e: 33:87:18:0d:b6:8f:a2:de:1e:33:90:16:a6:0b:ac:71: 5d:59:3f:3b:8e:74:25:b1:95:e2:ab:d4:ab:70:af:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:74:8f:3e:19:54:c7:fb:e3:cb:37:63:df:9f:05:b1: 53:38:e5:6b:0b:9e:10:29:b2:17:9b:b1:a3:dd:17:6f: 11:69:60:09:2a:bc:bc:3e:e1:43:55:64:98:ff:27:2f: 1e:63:a7:81:d1:9e:38:fe:0b:60:0a:46:9f:d4:11:32: 2b:a1:d6:ea:95:b3:cb:8e:9e:11:2c:92:21:0c:6c:a4: 51:a7:b4:6c:80:ea:90:b6:e8:98:ac:fd:a5:d8:3b:e1: 45:b7:41:ee:db:26:19:9e:d8:da:e5:e9:b5:7a:f1:b4: 55:27:e0:d2:0a:0d:4b:d1:44:33:b4:8d:8b:8d:d4:68: 21:c8:fa:cd:74:7f:29:08:41:b2:c4:b0:a2:dd:12:31: e5:e4:26:85:6a:9b:ff:e9:fd:66:8d:6e:67:eb:15:3a: 9b:a0:cc:de:e0:c2:61:02:e5:4b:f4:0a:d0:2d:ba:0c: 58:78:41:b9:83:79:e8:ce:8f:d4:03:75:14:3b:74:7e: 60:9e:33:22:e9:1d:c5:27:f1:3e:e5:10:17:8c:c2:91: 82:af:de:76:1d:68:4e:f0:2e:c1:a0:45:35:03:bd:ab: fe:71:4f:ec:81:6b:ed:77:01:3e:e0:63:2d:77:8c:7d: 7d:54:58:94:02:16:33:c4:e9:08:e5:5e:5a:57:cd:72 Fingerprint (SHA-256): 8E:5C:89:35:C9:46:5E:29:BB:72:B1:58:27:CF:CF:EA:08:CE:D2:FC:2D:D1:F7:ED:99:C7:1E:C1:E3:CE:E6:96 Fingerprint (SHA1): 78:6A:13:30:68:DB:6F:39:C2:F2:01:E7:0B:A3:88:87:3C:62:A3:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1919: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191338 (0x433ed56a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:15:31 2025 Not After : Thu Nov 28 11:15:31 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:af:a9:67:7d:41:6a:b6:05:d0:fc:1b:aa:51:6e:b5: cc:9a:a5:45:f4:66:3c:fd:32:9c:9a:bc:13:30:11:b5: 50:ae:3f:08:7b:8d:80:d4:47:5c:5d:8f:1e:c8:6d:8f: 77:5c:c1:0f:8e:c1:41:2a:9c:6b:01:c7:98:ef:9a:9c: f9:b8:37:13:62:3b:eb:d3:fb:a8:bb:05:b2:7c:89:11: ad:64:bf:e6:4b:37:c4:14:59:f5:fd:7e:ad:fc:a4:05: e7:e9:81:b4:b3:a1:10:17:bc:2a:29:b4:d0:cd:cf:de: c5:67:17:0b:83:70:ec:4b:99:c7:d2:7a:6b:90:ae:4e: 42:5c:14:1a:ed:10:29:45:7d:28:af:87:27:25:b6:c9: c0:7a:4c:85:b2:4e:e6:37:44:c7:97:90:46:03:31:e4: 20:d0:d8:54:bd:21:04:ee:e5:3a:e1:4a:72:ea:c6:cb: 65:5f:49:9e:f1:6a:b1:aa:c1:b5:79:43:6e:67:9c:fc: 16:53:17:97:8b:06:a3:8e:01:e7:3c:c6:25:ba:5c:6e: 16:4a:b4:a6:5f:2d:e5:cc:a6:58:c3:7e:29:c7:1a:da: 97:4f:62:be:c2:d5:a5:de:c0:07:36:3f:5c:7c:c0:b8: 0e:5d:21:56:60:d7:f9:b8:ba:9f:97:93:0a:6a:2a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:49:a7:30:1b:b3:03:fb:ba:4c:04:48:94:c2:74:39: bb:c6:2d:b2:6d:18:c7:1f:3e:eb:db:59:18:3e:e1:6d: 07:b2:8b:b3:9b:18:1c:7a:ed:a6:2a:13:04:18:aa:9d: 9f:ed:c1:54:30:7a:6a:c2:38:76:29:f0:57:69:65:7e: 69:fc:f4:1a:d1:39:7d:34:86:d6:53:71:1f:0f:91:da: 2b:86:72:11:18:ca:98:4f:0a:5d:37:2d:2c:7b:6b:8e: e6:6d:b2:85:fc:b1:1d:91:d7:9b:52:a8:14:0d:a4:a5: 85:90:5b:79:40:11:5d:66:c6:84:59:1d:10:8c:94:53: 49:1f:c9:c9:78:ae:90:c9:51:f8:6e:d6:45:38:91:6e: 0f:b7:1e:12:a4:1b:11:7c:e4:28:cf:29:da:2e:31:91: 02:9a:c2:ba:25:93:cb:0d:f5:4a:e4:68:d0:07:ed:50: 75:60:ca:18:b9:a1:90:19:64:86:e9:58:6c:3a:11:1c: 2b:9c:f7:3c:ec:84:e4:f1:58:e0:00:63:78:41:77:75: 49:38:bb:10:3e:ac:85:07:0c:aa:38:92:f1:8e:ba:07: f3:3e:b7:6d:76:54:19:cf:ec:b9:0a:93:85:1b:82:95: ce:66:a5:ba:93:bc:c4:cb:59:d5:0e:eb:3c:fa:bd:f8 Fingerprint (SHA-256): DD:8E:CE:AA:1D:2D:69:2E:53:E4:FC:30:FB:BE:A5:1D:ED:26:9E:94:DF:A3:E9:C9:5B:B4:3A:7B:DF:4D:B3:16 Fingerprint (SHA1): 56:1E:70:9F:1E:EF:79:66:8A:53:B7:31:0F:D5:94:FC:BF:1C:8D:20 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1920: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1921: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1922: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1923: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191338 (0x433ed56a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:15:31 2025 Not After : Thu Nov 28 11:15:31 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:af:a9:67:7d:41:6a:b6:05:d0:fc:1b:aa:51:6e:b5: cc:9a:a5:45:f4:66:3c:fd:32:9c:9a:bc:13:30:11:b5: 50:ae:3f:08:7b:8d:80:d4:47:5c:5d:8f:1e:c8:6d:8f: 77:5c:c1:0f:8e:c1:41:2a:9c:6b:01:c7:98:ef:9a:9c: f9:b8:37:13:62:3b:eb:d3:fb:a8:bb:05:b2:7c:89:11: ad:64:bf:e6:4b:37:c4:14:59:f5:fd:7e:ad:fc:a4:05: e7:e9:81:b4:b3:a1:10:17:bc:2a:29:b4:d0:cd:cf:de: c5:67:17:0b:83:70:ec:4b:99:c7:d2:7a:6b:90:ae:4e: 42:5c:14:1a:ed:10:29:45:7d:28:af:87:27:25:b6:c9: c0:7a:4c:85:b2:4e:e6:37:44:c7:97:90:46:03:31:e4: 20:d0:d8:54:bd:21:04:ee:e5:3a:e1:4a:72:ea:c6:cb: 65:5f:49:9e:f1:6a:b1:aa:c1:b5:79:43:6e:67:9c:fc: 16:53:17:97:8b:06:a3:8e:01:e7:3c:c6:25:ba:5c:6e: 16:4a:b4:a6:5f:2d:e5:cc:a6:58:c3:7e:29:c7:1a:da: 97:4f:62:be:c2:d5:a5:de:c0:07:36:3f:5c:7c:c0:b8: 0e:5d:21:56:60:d7:f9:b8:ba:9f:97:93:0a:6a:2a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:49:a7:30:1b:b3:03:fb:ba:4c:04:48:94:c2:74:39: bb:c6:2d:b2:6d:18:c7:1f:3e:eb:db:59:18:3e:e1:6d: 07:b2:8b:b3:9b:18:1c:7a:ed:a6:2a:13:04:18:aa:9d: 9f:ed:c1:54:30:7a:6a:c2:38:76:29:f0:57:69:65:7e: 69:fc:f4:1a:d1:39:7d:34:86:d6:53:71:1f:0f:91:da: 2b:86:72:11:18:ca:98:4f:0a:5d:37:2d:2c:7b:6b:8e: e6:6d:b2:85:fc:b1:1d:91:d7:9b:52:a8:14:0d:a4:a5: 85:90:5b:79:40:11:5d:66:c6:84:59:1d:10:8c:94:53: 49:1f:c9:c9:78:ae:90:c9:51:f8:6e:d6:45:38:91:6e: 0f:b7:1e:12:a4:1b:11:7c:e4:28:cf:29:da:2e:31:91: 02:9a:c2:ba:25:93:cb:0d:f5:4a:e4:68:d0:07:ed:50: 75:60:ca:18:b9:a1:90:19:64:86:e9:58:6c:3a:11:1c: 2b:9c:f7:3c:ec:84:e4:f1:58:e0:00:63:78:41:77:75: 49:38:bb:10:3e:ac:85:07:0c:aa:38:92:f1:8e:ba:07: f3:3e:b7:6d:76:54:19:cf:ec:b9:0a:93:85:1b:82:95: ce:66:a5:ba:93:bc:c4:cb:59:d5:0e:eb:3c:fa:bd:f8 Fingerprint (SHA-256): DD:8E:CE:AA:1D:2D:69:2E:53:E4:FC:30:FB:BE:A5:1D:ED:26:9E:94:DF:A3:E9:C9:5B:B4:3A:7B:DF:4D:B3:16 Fingerprint (SHA1): 56:1E:70:9F:1E:EF:79:66:8A:53:B7:31:0F:D5:94:FC:BF:1C:8D:20 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1924: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191339 (0x433ed56b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:15:32 2025 Not After : Thu Nov 28 11:15:32 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b7:ad:c9:ad:5e:b1:a2:9f:d8:14:1c:8b:f1:4b:43: 9f:2e:84:68:bd:7e:db:c4:1f:e5:3f:8a:3f:76:48:4d: 25:88:b7:c6:e5:d8:b0:41:20:36:8b:ef:c9:fa:eb:8a: 9d:3f:ef:01:38:98:40:99:fe:8e:2b:57:a7:a6:2f:ab: d7:22:85:aa:9a:89:bb:3d:ee:64:6e:d4:0b:c0:f0:1e: 00:75:49:59:98:4d:bd:24:45:d9:3c:f8:55:35:b7:66: 13:a4:ee:4d:77:b1:3b:06:8c:3c:d9:cd:5e:03:bc:d0: 1d:b5:37:fc:98:af:23:ca:d7:17:de:58:38:c8:fa:cc: ce:03:d6:53:5e:96:65:13:69:da:a2:83:d3:c9:79:0d: 92:08:e8:3c:8c:85:67:69:1e:1c:d1:e8:ad:d9:ab:8c: cb:36:97:ae:f7:89:4a:ff:d5:1b:39:61:2a:29:b0:95: a4:2f:47:b0:ce:84:35:0b:c8:53:7a:e1:63:e4:49:ab: 38:f4:7e:a6:a5:e4:50:30:57:fa:d7:0d:02:92:b7:e6: e0:9e:2b:2a:a4:71:e5:fc:1b:21:96:94:40:2f:8f:7e: 33:87:18:0d:b6:8f:a2:de:1e:33:90:16:a6:0b:ac:71: 5d:59:3f:3b:8e:74:25:b1:95:e2:ab:d4:ab:70:af:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:74:8f:3e:19:54:c7:fb:e3:cb:37:63:df:9f:05:b1: 53:38:e5:6b:0b:9e:10:29:b2:17:9b:b1:a3:dd:17:6f: 11:69:60:09:2a:bc:bc:3e:e1:43:55:64:98:ff:27:2f: 1e:63:a7:81:d1:9e:38:fe:0b:60:0a:46:9f:d4:11:32: 2b:a1:d6:ea:95:b3:cb:8e:9e:11:2c:92:21:0c:6c:a4: 51:a7:b4:6c:80:ea:90:b6:e8:98:ac:fd:a5:d8:3b:e1: 45:b7:41:ee:db:26:19:9e:d8:da:e5:e9:b5:7a:f1:b4: 55:27:e0:d2:0a:0d:4b:d1:44:33:b4:8d:8b:8d:d4:68: 21:c8:fa:cd:74:7f:29:08:41:b2:c4:b0:a2:dd:12:31: e5:e4:26:85:6a:9b:ff:e9:fd:66:8d:6e:67:eb:15:3a: 9b:a0:cc:de:e0:c2:61:02:e5:4b:f4:0a:d0:2d:ba:0c: 58:78:41:b9:83:79:e8:ce:8f:d4:03:75:14:3b:74:7e: 60:9e:33:22:e9:1d:c5:27:f1:3e:e5:10:17:8c:c2:91: 82:af:de:76:1d:68:4e:f0:2e:c1:a0:45:35:03:bd:ab: fe:71:4f:ec:81:6b:ed:77:01:3e:e0:63:2d:77:8c:7d: 7d:54:58:94:02:16:33:c4:e9:08:e5:5e:5a:57:cd:72 Fingerprint (SHA-256): 8E:5C:89:35:C9:46:5E:29:BB:72:B1:58:27:CF:CF:EA:08:CE:D2:FC:2D:D1:F7:ED:99:C7:1E:C1:E3:CE:E6:96 Fingerprint (SHA1): 78:6A:13:30:68:DB:6F:39:C2:F2:01:E7:0B:A3:88:87:3C:62:A3:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1925: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1926: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1927: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1928: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1929: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1930: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191339 (0x433ed56b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:15:32 2025 Not After : Thu Nov 28 11:15:32 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b7:ad:c9:ad:5e:b1:a2:9f:d8:14:1c:8b:f1:4b:43: 9f:2e:84:68:bd:7e:db:c4:1f:e5:3f:8a:3f:76:48:4d: 25:88:b7:c6:e5:d8:b0:41:20:36:8b:ef:c9:fa:eb:8a: 9d:3f:ef:01:38:98:40:99:fe:8e:2b:57:a7:a6:2f:ab: d7:22:85:aa:9a:89:bb:3d:ee:64:6e:d4:0b:c0:f0:1e: 00:75:49:59:98:4d:bd:24:45:d9:3c:f8:55:35:b7:66: 13:a4:ee:4d:77:b1:3b:06:8c:3c:d9:cd:5e:03:bc:d0: 1d:b5:37:fc:98:af:23:ca:d7:17:de:58:38:c8:fa:cc: ce:03:d6:53:5e:96:65:13:69:da:a2:83:d3:c9:79:0d: 92:08:e8:3c:8c:85:67:69:1e:1c:d1:e8:ad:d9:ab:8c: cb:36:97:ae:f7:89:4a:ff:d5:1b:39:61:2a:29:b0:95: a4:2f:47:b0:ce:84:35:0b:c8:53:7a:e1:63:e4:49:ab: 38:f4:7e:a6:a5:e4:50:30:57:fa:d7:0d:02:92:b7:e6: e0:9e:2b:2a:a4:71:e5:fc:1b:21:96:94:40:2f:8f:7e: 33:87:18:0d:b6:8f:a2:de:1e:33:90:16:a6:0b:ac:71: 5d:59:3f:3b:8e:74:25:b1:95:e2:ab:d4:ab:70:af:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:74:8f:3e:19:54:c7:fb:e3:cb:37:63:df:9f:05:b1: 53:38:e5:6b:0b:9e:10:29:b2:17:9b:b1:a3:dd:17:6f: 11:69:60:09:2a:bc:bc:3e:e1:43:55:64:98:ff:27:2f: 1e:63:a7:81:d1:9e:38:fe:0b:60:0a:46:9f:d4:11:32: 2b:a1:d6:ea:95:b3:cb:8e:9e:11:2c:92:21:0c:6c:a4: 51:a7:b4:6c:80:ea:90:b6:e8:98:ac:fd:a5:d8:3b:e1: 45:b7:41:ee:db:26:19:9e:d8:da:e5:e9:b5:7a:f1:b4: 55:27:e0:d2:0a:0d:4b:d1:44:33:b4:8d:8b:8d:d4:68: 21:c8:fa:cd:74:7f:29:08:41:b2:c4:b0:a2:dd:12:31: e5:e4:26:85:6a:9b:ff:e9:fd:66:8d:6e:67:eb:15:3a: 9b:a0:cc:de:e0:c2:61:02:e5:4b:f4:0a:d0:2d:ba:0c: 58:78:41:b9:83:79:e8:ce:8f:d4:03:75:14:3b:74:7e: 60:9e:33:22:e9:1d:c5:27:f1:3e:e5:10:17:8c:c2:91: 82:af:de:76:1d:68:4e:f0:2e:c1:a0:45:35:03:bd:ab: fe:71:4f:ec:81:6b:ed:77:01:3e:e0:63:2d:77:8c:7d: 7d:54:58:94:02:16:33:c4:e9:08:e5:5e:5a:57:cd:72 Fingerprint (SHA-256): 8E:5C:89:35:C9:46:5E:29:BB:72:B1:58:27:CF:CF:EA:08:CE:D2:FC:2D:D1:F7:ED:99:C7:1E:C1:E3:CE:E6:96 Fingerprint (SHA1): 78:6A:13:30:68:DB:6F:39:C2:F2:01:E7:0B:A3:88:87:3C:62:A3:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1931: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191339 (0x433ed56b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:15:32 2025 Not After : Thu Nov 28 11:15:32 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b7:ad:c9:ad:5e:b1:a2:9f:d8:14:1c:8b:f1:4b:43: 9f:2e:84:68:bd:7e:db:c4:1f:e5:3f:8a:3f:76:48:4d: 25:88:b7:c6:e5:d8:b0:41:20:36:8b:ef:c9:fa:eb:8a: 9d:3f:ef:01:38:98:40:99:fe:8e:2b:57:a7:a6:2f:ab: d7:22:85:aa:9a:89:bb:3d:ee:64:6e:d4:0b:c0:f0:1e: 00:75:49:59:98:4d:bd:24:45:d9:3c:f8:55:35:b7:66: 13:a4:ee:4d:77:b1:3b:06:8c:3c:d9:cd:5e:03:bc:d0: 1d:b5:37:fc:98:af:23:ca:d7:17:de:58:38:c8:fa:cc: ce:03:d6:53:5e:96:65:13:69:da:a2:83:d3:c9:79:0d: 92:08:e8:3c:8c:85:67:69:1e:1c:d1:e8:ad:d9:ab:8c: cb:36:97:ae:f7:89:4a:ff:d5:1b:39:61:2a:29:b0:95: a4:2f:47:b0:ce:84:35:0b:c8:53:7a:e1:63:e4:49:ab: 38:f4:7e:a6:a5:e4:50:30:57:fa:d7:0d:02:92:b7:e6: e0:9e:2b:2a:a4:71:e5:fc:1b:21:96:94:40:2f:8f:7e: 33:87:18:0d:b6:8f:a2:de:1e:33:90:16:a6:0b:ac:71: 5d:59:3f:3b:8e:74:25:b1:95:e2:ab:d4:ab:70:af:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:74:8f:3e:19:54:c7:fb:e3:cb:37:63:df:9f:05:b1: 53:38:e5:6b:0b:9e:10:29:b2:17:9b:b1:a3:dd:17:6f: 11:69:60:09:2a:bc:bc:3e:e1:43:55:64:98:ff:27:2f: 1e:63:a7:81:d1:9e:38:fe:0b:60:0a:46:9f:d4:11:32: 2b:a1:d6:ea:95:b3:cb:8e:9e:11:2c:92:21:0c:6c:a4: 51:a7:b4:6c:80:ea:90:b6:e8:98:ac:fd:a5:d8:3b:e1: 45:b7:41:ee:db:26:19:9e:d8:da:e5:e9:b5:7a:f1:b4: 55:27:e0:d2:0a:0d:4b:d1:44:33:b4:8d:8b:8d:d4:68: 21:c8:fa:cd:74:7f:29:08:41:b2:c4:b0:a2:dd:12:31: e5:e4:26:85:6a:9b:ff:e9:fd:66:8d:6e:67:eb:15:3a: 9b:a0:cc:de:e0:c2:61:02:e5:4b:f4:0a:d0:2d:ba:0c: 58:78:41:b9:83:79:e8:ce:8f:d4:03:75:14:3b:74:7e: 60:9e:33:22:e9:1d:c5:27:f1:3e:e5:10:17:8c:c2:91: 82:af:de:76:1d:68:4e:f0:2e:c1:a0:45:35:03:bd:ab: fe:71:4f:ec:81:6b:ed:77:01:3e:e0:63:2d:77:8c:7d: 7d:54:58:94:02:16:33:c4:e9:08:e5:5e:5a:57:cd:72 Fingerprint (SHA-256): 8E:5C:89:35:C9:46:5E:29:BB:72:B1:58:27:CF:CF:EA:08:CE:D2:FC:2D:D1:F7:ED:99:C7:1E:C1:E3:CE:E6:96 Fingerprint (SHA1): 78:6A:13:30:68:DB:6F:39:C2:F2:01:E7:0B:A3:88:87:3C:62:A3:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1932: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1933: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1934: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1935: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1936: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1937: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191338 (0x433ed56a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:15:31 2025 Not After : Thu Nov 28 11:15:31 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:af:a9:67:7d:41:6a:b6:05:d0:fc:1b:aa:51:6e:b5: cc:9a:a5:45:f4:66:3c:fd:32:9c:9a:bc:13:30:11:b5: 50:ae:3f:08:7b:8d:80:d4:47:5c:5d:8f:1e:c8:6d:8f: 77:5c:c1:0f:8e:c1:41:2a:9c:6b:01:c7:98:ef:9a:9c: f9:b8:37:13:62:3b:eb:d3:fb:a8:bb:05:b2:7c:89:11: ad:64:bf:e6:4b:37:c4:14:59:f5:fd:7e:ad:fc:a4:05: e7:e9:81:b4:b3:a1:10:17:bc:2a:29:b4:d0:cd:cf:de: c5:67:17:0b:83:70:ec:4b:99:c7:d2:7a:6b:90:ae:4e: 42:5c:14:1a:ed:10:29:45:7d:28:af:87:27:25:b6:c9: c0:7a:4c:85:b2:4e:e6:37:44:c7:97:90:46:03:31:e4: 20:d0:d8:54:bd:21:04:ee:e5:3a:e1:4a:72:ea:c6:cb: 65:5f:49:9e:f1:6a:b1:aa:c1:b5:79:43:6e:67:9c:fc: 16:53:17:97:8b:06:a3:8e:01:e7:3c:c6:25:ba:5c:6e: 16:4a:b4:a6:5f:2d:e5:cc:a6:58:c3:7e:29:c7:1a:da: 97:4f:62:be:c2:d5:a5:de:c0:07:36:3f:5c:7c:c0:b8: 0e:5d:21:56:60:d7:f9:b8:ba:9f:97:93:0a:6a:2a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:49:a7:30:1b:b3:03:fb:ba:4c:04:48:94:c2:74:39: bb:c6:2d:b2:6d:18:c7:1f:3e:eb:db:59:18:3e:e1:6d: 07:b2:8b:b3:9b:18:1c:7a:ed:a6:2a:13:04:18:aa:9d: 9f:ed:c1:54:30:7a:6a:c2:38:76:29:f0:57:69:65:7e: 69:fc:f4:1a:d1:39:7d:34:86:d6:53:71:1f:0f:91:da: 2b:86:72:11:18:ca:98:4f:0a:5d:37:2d:2c:7b:6b:8e: e6:6d:b2:85:fc:b1:1d:91:d7:9b:52:a8:14:0d:a4:a5: 85:90:5b:79:40:11:5d:66:c6:84:59:1d:10:8c:94:53: 49:1f:c9:c9:78:ae:90:c9:51:f8:6e:d6:45:38:91:6e: 0f:b7:1e:12:a4:1b:11:7c:e4:28:cf:29:da:2e:31:91: 02:9a:c2:ba:25:93:cb:0d:f5:4a:e4:68:d0:07:ed:50: 75:60:ca:18:b9:a1:90:19:64:86:e9:58:6c:3a:11:1c: 2b:9c:f7:3c:ec:84:e4:f1:58:e0:00:63:78:41:77:75: 49:38:bb:10:3e:ac:85:07:0c:aa:38:92:f1:8e:ba:07: f3:3e:b7:6d:76:54:19:cf:ec:b9:0a:93:85:1b:82:95: ce:66:a5:ba:93:bc:c4:cb:59:d5:0e:eb:3c:fa:bd:f8 Fingerprint (SHA-256): DD:8E:CE:AA:1D:2D:69:2E:53:E4:FC:30:FB:BE:A5:1D:ED:26:9E:94:DF:A3:E9:C9:5B:B4:3A:7B:DF:4D:B3:16 Fingerprint (SHA1): 56:1E:70:9F:1E:EF:79:66:8A:53:B7:31:0F:D5:94:FC:BF:1C:8D:20 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1938: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191338 (0x433ed56a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:15:31 2025 Not After : Thu Nov 28 11:15:31 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:af:a9:67:7d:41:6a:b6:05:d0:fc:1b:aa:51:6e:b5: cc:9a:a5:45:f4:66:3c:fd:32:9c:9a:bc:13:30:11:b5: 50:ae:3f:08:7b:8d:80:d4:47:5c:5d:8f:1e:c8:6d:8f: 77:5c:c1:0f:8e:c1:41:2a:9c:6b:01:c7:98:ef:9a:9c: f9:b8:37:13:62:3b:eb:d3:fb:a8:bb:05:b2:7c:89:11: ad:64:bf:e6:4b:37:c4:14:59:f5:fd:7e:ad:fc:a4:05: e7:e9:81:b4:b3:a1:10:17:bc:2a:29:b4:d0:cd:cf:de: c5:67:17:0b:83:70:ec:4b:99:c7:d2:7a:6b:90:ae:4e: 42:5c:14:1a:ed:10:29:45:7d:28:af:87:27:25:b6:c9: c0:7a:4c:85:b2:4e:e6:37:44:c7:97:90:46:03:31:e4: 20:d0:d8:54:bd:21:04:ee:e5:3a:e1:4a:72:ea:c6:cb: 65:5f:49:9e:f1:6a:b1:aa:c1:b5:79:43:6e:67:9c:fc: 16:53:17:97:8b:06:a3:8e:01:e7:3c:c6:25:ba:5c:6e: 16:4a:b4:a6:5f:2d:e5:cc:a6:58:c3:7e:29:c7:1a:da: 97:4f:62:be:c2:d5:a5:de:c0:07:36:3f:5c:7c:c0:b8: 0e:5d:21:56:60:d7:f9:b8:ba:9f:97:93:0a:6a:2a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:49:a7:30:1b:b3:03:fb:ba:4c:04:48:94:c2:74:39: bb:c6:2d:b2:6d:18:c7:1f:3e:eb:db:59:18:3e:e1:6d: 07:b2:8b:b3:9b:18:1c:7a:ed:a6:2a:13:04:18:aa:9d: 9f:ed:c1:54:30:7a:6a:c2:38:76:29:f0:57:69:65:7e: 69:fc:f4:1a:d1:39:7d:34:86:d6:53:71:1f:0f:91:da: 2b:86:72:11:18:ca:98:4f:0a:5d:37:2d:2c:7b:6b:8e: e6:6d:b2:85:fc:b1:1d:91:d7:9b:52:a8:14:0d:a4:a5: 85:90:5b:79:40:11:5d:66:c6:84:59:1d:10:8c:94:53: 49:1f:c9:c9:78:ae:90:c9:51:f8:6e:d6:45:38:91:6e: 0f:b7:1e:12:a4:1b:11:7c:e4:28:cf:29:da:2e:31:91: 02:9a:c2:ba:25:93:cb:0d:f5:4a:e4:68:d0:07:ed:50: 75:60:ca:18:b9:a1:90:19:64:86:e9:58:6c:3a:11:1c: 2b:9c:f7:3c:ec:84:e4:f1:58:e0:00:63:78:41:77:75: 49:38:bb:10:3e:ac:85:07:0c:aa:38:92:f1:8e:ba:07: f3:3e:b7:6d:76:54:19:cf:ec:b9:0a:93:85:1b:82:95: ce:66:a5:ba:93:bc:c4:cb:59:d5:0e:eb:3c:fa:bd:f8 Fingerprint (SHA-256): DD:8E:CE:AA:1D:2D:69:2E:53:E4:FC:30:FB:BE:A5:1D:ED:26:9E:94:DF:A3:E9:C9:5B:B4:3A:7B:DF:4D:B3:16 Fingerprint (SHA1): 56:1E:70:9F:1E:EF:79:66:8A:53:B7:31:0F:D5:94:FC:BF:1C:8D:20 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1939: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1940: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191343 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1941: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1942: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1943: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191344 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1944: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1945: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1946: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191345 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1947: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1948: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1949: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191346 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1950: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1951: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1952: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191347 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1953: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1954: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1955: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191348 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1956: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1957: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1958: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191349 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1959: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1960: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1961: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191350 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1962: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1963: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1964: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191351 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1965: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1966: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1967: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1968: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128191352 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1969: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1970: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128191353 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1971: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1972: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128191354 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1973: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1974: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1975: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1976: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1977: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128191355 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1978: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1979: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128191356 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1980: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1981: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128191357 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1982: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1983: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1984: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1985: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1986: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128191358 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1987: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1988: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128191359 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1989: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1990: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128191360 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1991: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1992: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1993: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1994: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1995: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128191361 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1996: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1997: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128191362 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1998: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1999: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128191363 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2000: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2001: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2002: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2003: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2004: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128191364 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2005: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2006: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2007: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2008: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191365 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2009: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2010: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191343 (0x433ed56f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:15:36 2025 Not After : Thu Nov 28 11:15:36 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:56:6d:e9:e1:85:74:cb:4e:ae:57:bc:82:cb:83:d9: 3a:75:00:9d:ea:4a:52:d6:4a:87:7e:8f:fc:01:e3:d3: af:65:3e:9f:b0:3d:7b:60:29:b4:63:54:2a:9c:b0:98: 89:27:ec:76:c7:aa:07:36:c3:78:fc:46:fc:eb:ba:76: e0:8b:fd:fa:46:1f:9f:d8:75:87:d9:4f:6e:06:35:7f: f3:2d:80:74:03:31:11:f2:82:a7:4c:b2:ae:eb:09:d3: 1a:a8:c1:c3:e2:8e:f5:27:9e:ba:c2:a9:13:25:f2:45: 68:ba:b6:3b:7d:cb:a4:7f:3a:93:31:13:3d:4b:fd:3b: 15:1e:09:05:59:d2:34:28:97:6f:ed:04:ff:98:33:4e: 04:ca:5b:50:8e:62:16:ce:5f:36:9b:af:ff:17:26:50: a7:89:cd:85:37:74:f5:3d:54:c5:bf:01:ca:2d:fd:0b: 37:65:67:6d:90:37:fb:5e:a1:b9:dd:39:5c:ed:a6:3e: 51:a3:0c:7f:f9:b8:d1:0a:4d:8c:12:6a:8e:17:06:a9: 14:2b:2d:b5:8e:53:15:4a:2d:5f:1b:f9:7b:51:99:e2: e8:43:98:15:3a:1f:4f:95:b1:90:6a:9d:d2:13:e5:ae: 46:af:66:a0:9a:d5:7e:91:8d:f9:67:a1:4e:3d:a7:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:35:ea:5d:a8:b4:d6:6f:42:26:db:0f:dd:b1:fb:de: f1:9e:3d:3d:f2:09:db:d5:d4:3d:44:42:fe:38:d4:30: b1:3a:fd:43:24:00:7c:3d:fe:50:4c:5c:f2:52:15:47: 7c:37:39:cc:fc:85:4c:0c:9f:1b:7b:a3:75:e1:0f:80: cf:ca:b2:68:f3:b3:13:62:ac:c0:48:f5:55:6f:77:89: 96:f9:88:70:b4:ee:48:78:fb:65:16:14:6c:39:d1:5c: 76:61:06:f6:70:b3:1c:fa:12:fb:70:59:ea:7c:90:0f: 82:8e:3c:0b:c4:5f:15:84:40:55:93:e8:3f:98:1a:a1: 39:a7:a5:6a:6a:53:71:78:dc:30:61:4f:8a:30:13:ca: 97:c3:ea:b1:3b:8e:78:74:56:a1:78:09:9a:9d:d6:ed: e8:dd:df:a3:c0:23:b3:35:c7:14:5a:4d:82:12:bc:50: 03:89:24:f4:82:c1:3c:dd:0b:51:c3:28:3d:c3:8e:f1: 1e:b0:c6:49:39:38:0c:a8:65:fc:1d:51:4c:fe:62:c1: fd:cc:61:93:b3:73:a2:3b:a8:d0:c5:0d:1a:b9:b5:7a: cf:99:a9:2d:78:a7:cf:fc:2e:c4:35:2e:88:01:b7:db: ef:ff:86:10:74:fe:d3:d9:c2:7c:55:87:ca:29:cf:ef Fingerprint (SHA-256): D7:F5:6B:E7:6A:F5:83:E9:6D:04:F9:D1:F4:F5:CF:A6:FD:15:9C:CE:A3:9E:45:ED:8D:88:1B:00:47:D5:0B:64 Fingerprint (SHA1): 3E:89:9F:93:E4:41:CE:29:5D:B5:8B:3B:5C:46:1D:4E:2E:78:21:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2011: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191344 (0x433ed570) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:15:37 2025 Not After : Thu Nov 28 11:15:37 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:ad:5d:f4:89:57:4e:5b:49:52:55:0f:ea:08:6b:c4: c4:3a:e7:23:a5:47:e9:a0:ad:34:35:be:5d:79:a0:76: 07:9a:98:5d:3a:a7:4e:36:90:d8:b2:0f:fb:58:fd:8c: a8:a6:f7:80:18:67:37:79:f8:8b:86:04:e0:8b:da:18: d4:1c:df:95:2a:32:f5:a6:3e:1e:16:ca:bf:64:e7:ee: 13:2f:e6:48:34:a0:34:78:87:a0:d4:20:21:95:0f:6b: d8:2a:b7:bd:4d:ff:50:34:87:aa:36:85:be:14:05:47: ac:76:38:f2:03:5b:bc:9f:f1:ef:69:3f:e4:ef:a4:34: 79:08:72:97:c1:dd:c6:b5:9d:43:cb:90:84:3b:e5:91: 87:a9:0f:dd:67:cd:12:b4:61:6a:49:e1:26:82:1d:6b: f6:ff:e7:bd:0c:93:14:cf:6a:0f:4e:3e:df:3f:19:63: c4:0d:7a:06:fc:f6:ac:87:4e:e6:ec:9e:fd:45:58:97: a4:f8:a0:8d:4c:6b:52:66:4c:6f:b2:85:b9:64:97:ba: d0:c9:2d:94:3b:8d:ec:2c:1a:32:0b:cf:73:50:55:f6: b6:c8:43:7d:43:b7:3f:c9:89:86:fa:53:bd:c3:0e:cf: 3d:91:a7:23:dd:6d:95:38:d6:9b:fa:f1:36:9b:79:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:bc:e3:5d:19:86:59:a7:e7:6b:02:44:d7:86:86:17: 51:b0:9d:84:e4:78:96:48:b8:79:08:95:27:54:e1:d9: 6d:0e:65:c8:9a:32:08:dd:8a:49:b6:d3:e2:35:2f:ad: 38:26:f5:50:78:98:5a:df:69:c9:4a:38:04:20:e3:23: db:39:27:5b:35:2d:a0:34:e6:c6:01:17:83:f1:a4:8e: 4e:da:ce:b7:ee:68:13:49:4b:41:ea:83:e7:3e:80:b7: 46:7f:57:c2:8c:31:3f:6e:68:18:4d:c9:3d:b9:49:2e: d5:43:11:cb:4d:7a:db:59:cd:c4:f4:e7:6f:96:04:30: 93:f8:01:66:4e:36:c6:cf:a5:66:a5:16:36:55:8d:46: b7:29:eb:a7:42:5b:2a:90:73:3a:b4:76:d1:87:7a:00: 6d:9d:54:9e:f1:5b:04:91:96:58:76:e6:3e:1e:48:e0: 32:4c:b3:71:d7:c1:e0:11:78:4f:01:40:89:3d:0d:f4: 37:20:41:09:0d:15:7b:6d:07:56:e5:25:c6:f0:78:10: d1:95:b4:54:98:3e:ee:5c:71:84:09:ae:20:75:eb:c0: f1:40:96:c1:65:8f:5a:36:a8:bd:81:94:9b:4e:4a:7a: cf:e2:3d:a4:f4:70:f0:e3:7d:f6:f6:ae:57:3f:f8:64 Fingerprint (SHA-256): 2B:4C:25:C1:D4:97:40:E2:56:97:62:67:EB:03:4F:5E:1C:66:04:7D:C0:9A:72:DC:FE:D6:BA:5D:92:FB:33:97 Fingerprint (SHA1): 05:D5:65:A6:3E:98:7F:6B:EE:DD:38:5C:4A:20:AC:DE:11:53:CB:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2012: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191345 (0x433ed571) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:15:38 2025 Not After : Thu Nov 28 11:15:38 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:ec:a4:e9:a9:fe:34:52:58:a8:0c:f9:cd:3a:60:ed: bd:7b:6d:db:77:f6:8b:ca:7b:d9:8a:33:82:99:ee:49: 90:70:78:12:7f:c1:f2:0e:2e:62:49:d4:60:88:49:79: 8a:5f:49:51:79:00:db:eb:f4:57:5d:32:e2:7a:32:90: 92:65:fe:36:08:3c:c4:88:54:14:90:bf:9b:e9:4c:b1: 99:20:5a:d3:2c:8d:20:fa:e4:2a:2c:e1:62:cf:47:d0: a7:e6:b3:42:8c:f2:b8:df:a0:70:aa:9d:6f:30:c9:48: 95:bb:2b:20:f3:67:f0:cd:6b:7a:02:47:ca:cc:8b:ce: d9:86:e8:1c:0f:e4:4c:7a:c7:b8:d4:48:ee:f4:a7:f7: 15:f7:02:f4:dd:2d:f5:d5:a5:18:0b:fc:87:e7:e0:93: 3e:9a:42:23:4e:05:e1:44:68:06:7d:d6:5b:fe:fb:2f: 1a:20:f5:d9:80:93:33:35:a3:60:14:a3:88:d6:83:c0: 98:4b:a0:24:1c:25:5a:a7:11:3b:06:96:80:fa:fd:98: e7:21:e6:4f:01:17:84:c5:cf:ae:d6:7a:f7:7f:fa:08: c0:b1:03:0a:55:8c:56:fe:98:0d:17:c9:1f:fd:a9:3c: 67:63:f8:44:9a:68:2f:87:1e:28:b9:9d:b8:4f:e4:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:a4:59:92:6a:c0:17:c5:1d:11:a1:8f:bf:c8:0e:75: e6:9d:59:fe:21:f0:84:4d:ea:e7:36:5a:9a:a1:44:ec: 62:a4:8c:a6:69:76:15:4b:cf:ae:db:3a:17:02:9e:cc: 14:05:05:09:1d:8b:cf:29:7c:fc:7c:10:7f:6d:b4:0f: 35:77:31:70:22:46:cb:86:3c:80:30:2e:bb:8e:91:0d: 8a:e3:55:1f:e8:ab:2f:50:70:11:04:85:47:0b:2c:bb: 20:95:5a:07:6d:0c:9f:42:01:34:3e:8c:85:ce:f9:56: 39:ff:60:06:38:7d:41:c4:b1:e6:31:51:00:05:2b:85: 2b:de:72:84:42:41:81:b3:fe:e9:74:09:37:57:98:fd: 25:80:26:2a:e0:12:1a:51:0e:62:1c:6e:a5:26:d9:95: 00:c1:ae:92:c2:c0:9e:76:2c:88:ed:7f:93:8e:fc:1f: d3:ba:44:9b:7b:b8:ef:96:f7:d5:5d:51:09:32:28:f0: 33:3b:e3:c1:f1:7f:25:db:e6:70:d8:56:fa:65:e5:72: ca:e1:b9:37:ac:7b:22:76:d7:f6:6a:22:e1:41:e8:39: 90:91:7e:8b:fd:3e:4f:10:b5:45:f8:b4:74:66:2b:ea: 64:6a:76:64:e5:e1:b4:67:c4:c7:53:bd:4a:d0:55:39 Fingerprint (SHA-256): DB:C5:9C:13:2C:54:C6:76:6E:DD:75:E1:8A:A5:F1:92:26:2F:87:34:42:0E:B8:3A:47:34:09:98:AB:F3:DF:D6 Fingerprint (SHA1): 6B:20:10:2E:51:65:55:31:10:06:CD:18:C7:7A:7F:2C:DA:2F:28:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2013: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191346 (0x433ed572) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:15:38 2025 Not After : Thu Nov 28 11:15:38 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:ee:4d:85:16:69:1b:de:64:e9:78:47:96:84:13:79: b8:7e:be:80:4b:46:1b:a8:d4:92:b2:db:7c:f9:db:a2: 7e:7b:d2:a7:42:d6:c4:cd:75:d5:9b:bf:04:5c:ed:56: 01:a8:69:f0:26:a5:49:91:77:0f:df:fa:45:ee:b8:c5: 26:5f:e1:d4:45:15:04:a9:c2:c1:ce:be:1d:5a:59:09: 11:0d:28:a3:ff:01:33:f6:f5:cf:d7:00:64:22:83:d1: 25:94:75:f6:32:7b:2b:bc:f1:fe:7f:26:74:6d:8c:92: 31:5b:95:20:3e:4c:66:c3:2d:af:07:47:28:67:dd:bf: 06:87:6a:fc:6c:9c:8c:00:f9:ab:7d:c9:cc:21:ce:9c: 1b:1e:a6:d2:81:e2:4d:80:42:bd:8e:22:0d:5e:19:d2: 6b:27:c5:e0:dd:09:71:63:24:70:14:86:a2:ba:e3:9d: 3c:64:da:5a:94:11:a8:8c:a0:ed:35:0a:64:72:77:60: fe:57:ad:b3:0c:a1:eb:4c:19:45:7e:a7:7c:51:c4:ab: cd:43:b2:c2:f9:37:24:31:0e:0e:75:25:3d:e6:bf:04: d8:78:36:35:a2:55:9a:f8:5e:52:d6:72:8a:49:60:4c: 93:bc:62:f9:0b:1c:d2:b1:63:2e:1f:b2:70:40:3a:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:7f:51:17:10:bb:c8:a4:3f:ec:c8:53:6a:df:fe:d9: b4:1c:39:a1:28:ed:c9:31:c1:0f:0d:12:44:e9:ac:2d: ff:46:dc:dc:2d:08:a6:a9:c1:eb:71:c3:4e:5a:b9:df: 15:0c:7b:73:52:09:37:11:33:2c:92:df:ea:c8:60:32: 9c:c3:81:90:10:0b:c2:41:80:67:49:54:de:8a:c9:b9: af:38:d5:4d:7a:37:c2:e6:6f:4e:85:d0:16:1c:41:8d: 77:33:35:2c:cd:83:40:fd:af:b7:8c:c1:b3:a3:4d:7d: 75:9d:dd:a9:ad:28:3b:08:90:93:71:65:75:30:d7:f0: 99:c7:17:d5:9c:a5:2a:8f:d0:3b:fa:f9:59:61:eb:c3: 1b:59:5b:44:b1:35:8f:10:fd:bd:fc:8f:9c:62:27:c5: 2e:92:6b:d8:14:b0:d5:89:01:9e:a4:8b:c3:50:6e:eb: a1:07:30:f4:9f:3b:57:34:5a:7c:ac:51:bf:52:65:eb: f7:da:fb:3b:79:15:f1:f4:7f:81:f1:e8:78:f0:2f:9d: e8:d8:0d:75:a0:d7:62:1e:6c:50:5b:e4:ed:e9:18:1d: d0:28:ec:3b:83:16:3a:ee:1e:ab:3c:f0:6d:0e:35:54: d2:8d:85:3e:55:0b:c8:42:4a:e5:3d:19:85:39:95:30 Fingerprint (SHA-256): 8F:1B:82:6D:90:12:EB:30:A6:81:4D:7A:72:B5:4C:37:2B:0E:D4:F0:75:91:F4:A1:B6:07:85:0A:6D:CD:5B:BB Fingerprint (SHA1): E0:C4:48:29:9B:BA:9E:EC:C7:1D:05:5B:82:02:2C:D1:55:D7:E7:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2014: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191347 (0x433ed573) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:15:39 2025 Not After : Thu Nov 28 11:15:39 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:d4:7a:12:2e:8c:85:44:a4:14:4c:b8:ce:e7:83:9e: 10:38:06:66:01:bd:9f:0d:ab:c8:3f:19:ee:42:98:50: d5:dd:4e:a4:75:a4:98:da:55:31:d6:f9:33:43:39:8b: de:a6:53:4b:7f:92:41:dc:eb:79:e4:b0:74:e1:a9:a6: 8b:21:d7:1e:fe:60:64:b9:3f:94:91:25:d6:e1:f2:d6: 1c:d2:cc:49:d0:37:1a:ce:28:f3:93:25:23:8d:2d:f2: 93:48:d7:40:78:66:c2:29:29:c3:19:4a:0c:41:fd:03: 18:e5:bc:b3:7c:2f:64:2c:15:32:96:45:ab:83:73:3a: b4:e3:62:38:f8:ec:7a:8b:a3:a3:1b:ab:84:24:3e:6f: b5:6b:53:8b:c8:9a:72:89:e9:a5:7c:57:e0:73:7a:a8: 96:98:c7:a1:5c:3d:9e:2a:88:60:46:19:30:81:ff:2c: 1a:b9:ab:82:57:db:f6:aa:b9:ab:bf:99:75:40:aa:84: 96:f7:5c:1a:bf:6a:12:ba:8d:7c:5b:82:19:21:60:56: fc:41:f5:8a:72:c3:a7:18:b6:3c:2e:78:79:71:e1:92: 2a:17:84:69:74:1d:4d:3f:ef:bd:73:9f:2b:16:21:95: 6b:e7:29:11:10:a3:e3:93:bb:22:76:9a:60:0a:93:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:c2:c4:17:4a:f7:cc:f4:a7:1b:f4:17:22:5d:81:3c: 15:0f:90:02:22:60:dd:91:42:be:71:fa:47:a8:a8:0c: dd:54:ff:81:43:1a:6b:e7:76:5c:20:2c:a5:ac:0d:dd: 77:12:7d:5f:13:f0:85:1e:21:61:96:12:5a:7c:86:46: 63:7e:a5:27:83:06:23:4d:a8:a6:34:e5:e6:a5:6c:22: 49:7f:aa:ca:e1:50:a3:64:ce:cc:7f:d8:d9:98:27:e9: af:c3:54:e7:21:4c:b4:cf:67:5d:cd:16:af:7c:e9:ee: eb:c8:ff:fd:b5:93:69:bc:3a:87:ae:c4:7e:87:35:b3: 64:6f:3c:0b:c3:ff:3d:c9:09:34:13:55:61:1c:f3:2f: 52:ec:4e:74:30:3d:c3:c0:e4:bd:a9:5a:5b:fb:21:5c: 07:5b:7c:bf:54:98:7f:fe:86:3a:2f:0f:c1:62:e4:1d: d5:90:cb:7b:1b:77:ac:78:4c:fd:11:87:3c:34:44:21: 15:c2:e2:9f:8f:ed:d3:21:5b:05:16:2d:87:db:ca:f4: ef:09:17:18:f4:82:d8:5c:54:26:80:72:58:95:52:1a: 69:63:b6:f0:4c:46:d6:53:cd:bd:a3:ae:39:b5:c4:21: ba:77:d2:b4:d0:cd:53:e8:7a:e2:46:6a:be:47:41:40 Fingerprint (SHA-256): F0:E5:1E:69:49:5F:E2:CE:55:5E:43:F9:4D:0E:8F:8B:E9:B5:CF:D0:2B:3E:63:D7:62:CC:37:2E:F0:69:B6:2F Fingerprint (SHA1): C8:E0:CE:29:AA:B1:1A:64:9F:9E:2E:FD:4D:C5:F0:DB:1B:6B:D1:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2015: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191348 (0x433ed574) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:15:40 2025 Not After : Thu Nov 28 11:15:40 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:75:e2:68:c2:4b:f0:38:66:6a:d5:e2:1d:13:83:d0: be:98:b5:4e:42:2c:fc:c5:a0:9a:af:27:bb:a8:93:22: 2e:fc:c5:2b:1a:d7:b5:2d:5a:f2:e8:70:3a:d4:60:67: c7:53:b2:3f:51:b8:b1:c9:3b:52:47:2e:e5:b1:1c:27: 43:44:6b:a0:1d:76:b4:23:ae:b7:fd:b9:46:d0:d6:17: 5c:57:24:79:d7:01:b0:b8:ee:6d:04:57:81:6c:1f:56: 8e:40:31:3c:7c:72:50:b7:31:c5:eb:af:46:ec:fe:69: 83:17:a0:01:bd:a5:9f:32:6f:c9:7b:3a:7b:92:d9:48: 5a:6c:d3:dc:f0:1e:80:05:2d:c0:d8:a5:55:b9:4c:be: 1c:b2:e5:56:60:7e:fb:dc:ce:92:8f:4c:2c:2d:09:ef: 96:8a:a3:cd:53:8a:b9:2f:1e:7e:e1:13:d0:6b:09:0c: f1:91:ed:6d:23:91:98:93:59:72:d3:e8:e0:24:81:b0: 7f:93:81:aa:bc:1b:a4:98:1b:20:2b:c5:7b:1d:65:29: ad:c0:5f:9b:8c:0e:0d:2c:e0:8a:8a:ff:36:49:0b:91: 58:53:06:ea:86:aa:f0:44:e8:97:cb:4d:b8:4a:90:c9: fc:0d:1a:ed:fb:ee:67:f7:89:6d:be:26:87:36:e0:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:ec:e1:0f:02:38:c6:9e:c0:37:24:10:cd:dd:61:52: f2:fd:66:01:84:19:bb:2a:63:32:ae:44:20:e5:4f:0a: 4a:02:e6:89:a9:ff:b3:3d:a9:f8:62:ad:37:dc:ce:dc: f7:c1:97:8c:a0:1b:ef:b5:6d:88:0c:53:61:18:04:7a: 6b:e0:84:5c:7d:bc:d1:62:4b:a3:71:60:c7:65:66:84: 41:93:30:eb:c5:db:6d:7c:2e:fd:1c:27:ce:3b:a3:a0: ff:38:f3:50:0c:bd:e1:86:af:b8:49:0c:e7:c0:20:07: c2:d7:94:fc:8e:ec:21:79:73:b0:a5:c1:fd:2d:ff:48: 79:42:f1:52:9f:b4:46:0d:14:b5:d7:f4:3e:12:c6:02: 8e:8f:12:12:00:13:b7:d5:0c:b3:32:07:f3:04:8f:ee: 93:d3:77:c1:3f:74:43:b2:4e:0d:c0:a6:68:34:c9:f5: 8b:00:0a:ca:8b:1e:80:0e:0d:87:df:94:d7:3e:09:2f: b3:24:09:8f:8f:b4:71:32:3d:75:57:e3:1f:5d:f7:3f: e0:d5:82:47:d2:ca:46:1d:db:4f:19:e7:55:c9:fb:4b: 46:a9:05:f8:e9:d7:66:c5:98:1b:0d:54:fb:fe:89:62: 52:a5:bf:f5:2e:23:27:14:dd:bf:88:46:1f:f2:d8:f9 Fingerprint (SHA-256): 86:43:D5:9E:80:65:7B:48:D6:6F:42:5B:8F:98:B8:86:19:1A:71:39:FD:6D:24:E8:E6:C3:F7:42:F6:CB:B2:B1 Fingerprint (SHA1): 24:95:62:DA:9E:90:7D:76:90:F9:50:42:47:EC:FF:E6:0A:7E:A2:04 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2016: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191349 (0x433ed575) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:15:41 2025 Not After : Thu Nov 28 11:15:41 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:a4:84:8e:ce:97:bc:30:99:cb:cf:24:b7:de:03:86: 3d:cf:e3:a8:fb:8a:fb:3c:e6:7d:7b:c2:1f:14:b3:a1: 37:d3:b2:57:b7:af:93:51:da:ee:b5:f0:18:74:98:23: d3:9b:3d:e1:bb:a8:6d:81:3e:13:c9:25:4c:5f:7a:5b: cd:ec:ca:4d:62:2c:62:5e:3e:77:e0:47:83:9f:00:98: 27:e8:06:08:74:90:dd:09:e6:3a:6d:08:c2:87:5c:65: 55:6b:af:7f:d0:2f:6e:5a:33:11:42:1f:79:15:34:a0: 6b:68:5c:e6:7d:cf:e1:0a:36:bb:8e:38:6d:90:c3:f2: c6:39:a7:a4:b1:9a:48:4a:14:e0:e6:4c:ef:50:da:97: 52:2d:a6:b2:73:56:21:ef:04:46:c3:68:0f:43:6e:8f: 9a:ad:8b:8d:3e:88:9a:b4:a6:93:9c:2b:04:ca:1c:fe: 44:c8:ec:00:3d:ce:11:e1:35:2f:2c:ad:a7:f1:38:4a: 64:3c:95:91:e8:e1:9a:87:ad:5b:d6:e5:4b:47:9b:f5: 91:b1:a5:91:a7:f5:54:b2:7a:9d:17:d5:e1:c0:ab:f1: 79:b0:87:c9:b0:2c:b6:2d:f8:ad:eb:80:68:cc:91:ae: 80:fb:10:1f:47:a8:7f:04:bf:e1:68:fc:b5:0e:c1:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:00:fb:f7:c3:0c:fe:cd:39:af:71:e1:b6:1a:4f:fc: 92:c2:32:1b:79:36:74:f6:f7:16:92:9c:ea:12:8a:99: 7e:ef:b4:ac:fc:85:7b:77:8c:39:62:89:4f:69:83:c8: 45:7f:9e:f4:ba:19:69:3e:bb:6c:a9:69:20:17:53:5a: e1:ec:ac:cf:b1:bd:b1:af:fe:98:70:33:76:f3:45:3d: 57:fe:18:b6:c0:55:80:c5:34:c7:ba:22:c7:94:9c:c8: 8d:36:f1:1f:d2:1a:c6:31:4c:32:e9:1e:83:b2:a1:f3: f8:fd:63:bc:55:b7:06:e2:18:87:c6:ef:5e:40:29:ae: ca:1b:6e:e4:01:cb:da:87:e5:56:30:84:de:d7:6d:2c: 55:a3:f6:3e:86:de:c3:4e:11:a6:62:36:0b:14:e2:b7: 96:8a:4d:6a:65:ba:82:85:b4:d2:88:0e:57:65:df:b2: 5e:2b:f9:ca:de:a9:4e:6a:d8:f8:2f:c7:d3:da:de:59: 78:c1:40:39:54:58:d7:c7:a4:94:30:9e:25:30:37:ff: a7:ca:f3:4c:80:04:ba:6d:8a:3c:e0:d5:f4:84:ff:c0: 54:05:25:f3:dc:28:8a:06:04:04:98:97:fd:1d:73:a4: 3d:b0:6a:30:fa:51:13:50:76:ef:3b:0a:d8:63:02:86 Fingerprint (SHA-256): CF:4A:36:82:5F:5F:64:94:50:69:45:44:0E:33:EB:D9:28:55:05:AB:7F:25:E3:8E:0D:8D:3A:81:CD:AC:4E:58 Fingerprint (SHA1): 97:60:3C:6D:88:66:4C:82:4E:68:43:C6:E7:6C:31:11:43:C2:61:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2017: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191350 (0x433ed576) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:15:41 2025 Not After : Thu Nov 28 11:15:41 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a8:90:c8:35:27:fd:c3:9b:e0:92:9d:94:17:4d:0b: ac:c0:0a:9c:f2:a3:23:b6:7e:47:2a:59:87:29:af:90: d7:4a:62:20:64:60:79:5f:31:92:74:5e:45:77:8f:67: d5:29:80:cb:b9:65:4d:14:b6:9c:a0:71:2d:77:d3:c1: 71:34:43:b2:01:54:75:02:cb:fc:69:63:14:ff:9f:aa: 34:1c:63:e0:93:5f:2d:8f:5d:e8:32:fd:c3:68:0f:9b: 7d:54:c8:c8:e4:14:72:2a:4d:73:94:67:72:05:76:2f: 73:48:d1:19:56:5b:c4:3c:9c:f3:71:f6:d4:25:7b:e8: 5c:59:79:3a:7d:bc:4a:bc:e6:2d:d8:36:f5:3e:4f:f2: 7d:72:70:20:f3:d1:4b:0d:8e:b5:44:60:9b:76:8c:94: 0a:8e:13:87:6f:8c:8e:b3:93:a8:6b:25:7e:8c:94:b8: 6c:16:94:6a:7c:fc:5f:de:8d:21:ed:63:5e:30:e3:6d: 99:b5:2d:9b:88:49:b3:b2:93:9c:9c:87:65:af:c3:df: 56:52:57:a6:7e:01:63:f9:2e:d0:02:b7:e0:40:ad:d2: cf:76:67:4a:8d:8b:1e:b1:83:80:c6:31:62:20:fe:3a: e4:58:12:93:7f:c4:b8:b0:58:77:4b:c0:bb:7a:0e:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:54:7d:e6:14:59:68:32:1d:46:be:1f:0e:50:e3:ea: 10:ac:6b:c1:b0:4e:21:6b:d4:9f:92:62:5e:e8:68:c7: 0e:58:ec:52:aa:e4:a5:37:fe:a8:8b:20:be:88:31:d4: 66:a1:b6:7a:f1:57:b5:08:d8:c9:06:b8:64:78:2c:ca: 8f:d7:2c:c6:d8:ee:f5:8d:08:72:b9:9b:73:45:44:1c: 96:3b:bf:07:70:23:db:bf:bd:3b:04:d9:23:9a:82:bf: 59:a4:bb:f2:83:ca:cf:15:be:33:45:e3:61:9e:03:d2: 7b:87:6e:8d:fb:28:41:13:1a:13:1f:0f:4f:61:1e:66: fa:56:f5:b8:e9:c7:76:ec:be:14:a0:41:19:c7:bb:1c: d2:c1:79:40:bf:98:5e:08:68:93:ce:e6:a1:d7:63:2e: 45:0d:2a:2f:fa:70:99:15:6b:05:13:2f:81:15:62:64: 15:0e:2e:bd:bd:9a:2a:f6:7d:b9:a2:09:fc:56:87:51: 7d:d5:9d:86:1f:f5:11:59:a0:1a:69:22:06:b6:d7:af: 04:a1:d6:4d:70:bb:10:0e:5a:c3:a3:69:bd:d5:c6:b8: 28:05:e4:4f:24:5f:87:8f:56:a7:ae:f0:24:a2:1a:1c: b0:87:94:be:77:e0:8b:7e:32:3c:4f:76:61:98:7a:6d Fingerprint (SHA-256): 08:5D:BF:C4:50:C8:D7:4F:7D:38:71:AC:FE:A4:95:10:5F:4A:D3:EE:9F:6B:B8:EC:3A:39:13:5A:EB:8D:8A:E0 Fingerprint (SHA1): A0:AF:8F:A0:2A:92:2A:6D:60:11:9C:47:77:E4:C0:5B:AE:B1:C4:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2018: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191351 (0x433ed577) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:15:41 2025 Not After : Thu Nov 28 11:15:41 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:1f:4b:a2:ac:fd:93:8e:d4:9e:98:06:bb:1f:18:11: fc:0a:3f:49:f1:d5:d4:83:6f:71:8a:53:73:ce:19:6a: bf:9a:80:1a:fe:45:df:0c:83:f5:a2:af:b9:0e:59:7a: 5b:94:de:9d:36:9a:fe:72:2b:7c:a6:21:95:41:59:7d: ea:44:1e:cc:fa:a7:d7:72:a9:b2:91:da:2f:99:d8:0f: e8:4e:ba:f3:fc:ef:86:33:28:05:55:e9:a5:ff:70:45: 48:40:ed:c4:8f:36:db:ff:95:b6:29:d1:c2:e8:43:22: 19:68:62:52:25:98:9e:9d:df:3c:85:e1:64:e9:55:d6: 8c:fd:70:92:08:bd:db:5c:b4:0f:c3:f1:45:c5:df:8b: 11:93:76:47:9e:2c:33:05:56:b1:a9:5d:f1:47:fe:cb: 89:4e:44:fb:ca:0e:f0:0e:6f:c7:cf:68:d8:55:5f:2b: e0:a2:e0:7c:16:72:c7:17:91:23:15:43:78:75:11:6d: 35:1b:d3:fc:f1:10:76:f3:9e:49:ac:1f:7b:8f:00:06: d7:84:9e:86:b7:3b:0b:9f:d7:f9:c1:ed:f7:ce:18:e7: 38:b3:a6:6b:1b:13:98:e6:8b:00:29:27:48:b7:90:bf: b5:b3:ee:0f:99:da:9f:8e:70:ff:2d:2e:d5:b3:5c:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:6c:0c:cb:a7:11:c6:8c:6d:2c:50:e1:d2:6a:89:a0: 53:50:10:05:10:ab:59:d4:48:2b:85:df:55:ec:e6:8d: 07:59:cb:e8:1f:7f:c0:75:97:0d:99:4f:70:7e:43:e1: 11:23:67:63:f5:c6:66:36:0a:f3:1d:11:76:c4:92:e6: f4:ab:5c:32:2e:b0:ed:27:b6:9e:99:b2:72:57:74:dd: 91:3c:d8:7d:57:1d:f0:be:b6:d1:49:36:d6:ab:83:96: 54:36:5b:68:8d:aa:06:f9:21:9b:e9:50:06:dc:37:c8: c7:b2:b5:ea:d6:de:58:12:34:4d:1e:c2:05:82:9c:75: 50:2c:9c:60:94:00:68:ae:06:28:cb:d1:44:8d:95:4b: a3:e2:db:cb:26:4d:5c:7d:24:52:18:3e:33:5d:7d:de: 09:f5:56:cd:d3:40:77:2a:31:bc:c7:fe:8a:c5:57:a3: 5d:1b:fa:ce:d6:31:43:c3:57:e5:8a:8a:38:ac:22:f8: a7:6d:60:8c:9c:2b:84:e4:97:dc:a2:7c:ac:3b:97:d9: 3d:22:19:24:c1:f8:0d:4e:fb:12:bd:45:b0:3b:06:51: 68:47:35:07:5f:c9:ab:c8:1b:9d:56:25:ee:01:d1:c9: d5:86:fa:a1:32:ac:2f:a8:43:f5:79:4c:dd:05:4e:a7 Fingerprint (SHA-256): 79:DE:6E:2C:1A:45:DC:6E:E0:E2:3A:1A:E3:2C:E9:0B:FA:4B:CC:25:43:9F:F5:AB:83:59:79:32:DB:97:B4:01 Fingerprint (SHA1): 14:45:80:5C:65:A2:F3:88:39:04:99:A4:83:9D:B4:58:A1:AA:18:7B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2019: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2020: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191366 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2021: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2022: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2023: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2024: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191367 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2025: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2026: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2027: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2028: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191368 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2029: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2030: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2031: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2032: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191369 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2033: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2034: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2035: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191366 (0x433ed586) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:49 2025 Not After : Thu Nov 28 11:15:49 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d8:eb:33:9e:f6:b1:7d:5c:aa:62:30:ed:4e:9d:61: df:1f:ed:41:60:de:77:4c:89:4b:39:d9:27:5c:26:22: ab:52:5d:f7:89:1b:86:1e:5c:c6:0b:0e:3d:9a:3b:97: 24:3d:f7:bc:34:c8:35:fb:df:b8:b3:ca:5d:65:be:bf: 71:1b:0f:2e:98:d9:8b:24:71:67:a8:00:38:16:84:d7: e7:2d:c7:69:af:d3:60:31:88:83:87:90:5f:48:6d:6c: c3:dd:67:95:73:89:b9:9a:71:5c:95:9e:d4:76:f8:e0: 55:b7:6a:da:07:33:63:89:ab:b4:96:a8:9c:58:5e:ef: 0e:75:ac:47:ce:1c:bf:ea:9e:70:01:c4:a0:3e:23:8d: 74:47:1e:a4:d3:69:55:08:5a:bc:7d:34:c6:13:b6:74: e2:7e:5c:85:80:4c:c2:23:63:c4:d7:19:81:c7:d7:c0: b6:c3:b5:19:58:2f:92:5c:91:1c:c9:c0:2a:9e:60:b8: 84:0e:39:95:ba:47:48:1a:33:b4:85:7d:88:35:44:85: e6:e9:81:18:b4:f1:f7:bc:db:16:39:c6:56:e3:55:59: 78:20:b7:f5:1a:fb:73:80:aa:0c:7b:5a:93:81:b3:61: 85:39:c2:d9:72:45:00:94:5f:8d:f4:5c:47:3e:5c:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e6:66:4c:78:18:94:0b:4b:7d:f8:ad:c8:97:45:29: 34:ad:35:83:cd:bf:ea:11:b8:fa:f8:0d:b0:f5:1f:76: b7:1f:64:86:b7:3b:a9:eb:2d:94:15:5e:34:a9:c9:d7: 7a:82:42:13:f7:84:80:ae:4b:15:5a:41:c1:fc:8c:ab: c8:fe:3c:77:81:16:64:fe:4e:78:6c:a3:07:47:61:2c: 5e:f5:06:05:80:62:9e:57:ca:a9:ea:13:98:6c:35:f9: 7d:f2:e4:cb:96:c0:b7:25:ff:45:66:ab:97:cf:20:7b: 31:26:4b:05:3e:61:01:62:73:1c:eb:6d:ca:c0:30:06: 4e:87:db:50:f7:a2:ff:41:7d:bb:c4:17:ec:56:d2:80: bc:59:f4:39:24:f0:6a:f8:55:fa:0b:86:f6:29:80:59: c3:80:ee:39:47:bd:c2:59:06:26:9c:24:d3:6d:bd:31: 82:f3:0f:f2:50:f4:74:b1:cc:81:65:47:00:ee:6d:d0: 56:f5:b8:be:8e:0a:28:76:2c:00:5b:72:8d:14:b5:d2: f9:b0:a5:35:ff:fb:0f:af:25:59:e9:42:85:90:9a:6a: 23:88:e3:89:6d:b9:42:f0:3d:22:24:fd:78:5c:19:a9: 31:37:c7:91:93:22:f6:f8:66:01:98:29:b2:c6:73:51 Fingerprint (SHA-256): EC:AE:02:5B:75:DD:3C:26:2F:F3:6F:F7:B2:26:0C:40:17:A4:30:9A:54:02:D5:CA:3B:B9:53:78:4F:94:80:41 Fingerprint (SHA1): 68:44:1E:BC:ED:94:97:BA:46:72:09:1A:55:1C:52:A0:1D:35:3D:D4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2036: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2037: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191367 (0x433ed587) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:50 2025 Not After : Thu Nov 28 11:15:50 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:15:9e:d6:30:75:c3:f9:ec:16:fb:2d:08:53:05:8f: a2:85:89:c5:40:75:1c:97:6d:30:de:5c:ed:4f:e8:64: 2a:a2:ac:f2:1f:44:32:61:e1:4e:60:0b:d3:f8:33:52: c4:c5:32:fa:b9:7e:29:51:f5:7e:29:74:43:c7:4c:91: 72:be:ed:99:7c:6a:a8:9d:2b:9a:a0:aa:df:59:8a:c7: d9:f7:c4:98:d2:b1:34:fa:8e:a0:ba:2b:10:99:27:ee: ad:dd:7b:a0:09:35:f4:5b:82:9e:b0:ba:67:d3:16:90: 0e:0b:62:e2:07:29:d3:ce:1c:9d:6b:b0:97:73:df:15: f8:5b:b3:2a:d5:b8:83:c3:1d:ae:1e:d0:33:86:3e:41: ad:33:64:4a:6e:e3:c1:02:6f:6d:4b:e8:6c:c6:a2:5e: e4:f0:36:71:9f:09:21:76:80:1f:c7:68:80:fc:28:05: 0f:e3:6f:8f:9f:60:9b:60:ef:6d:94:15:1a:b4:af:3a: d9:83:f6:76:b5:80:68:71:23:d8:39:b4:cb:59:18:07: 98:7d:c8:d0:13:eb:e8:54:43:1f:2c:0b:f9:d8:af:eb: 4a:96:b2:94:f3:9d:9b:bf:22:07:8c:b3:e6:27:ae:c1: 78:ca:db:47:15:81:ff:8c:4b:37:19:51:a9:7c:bb:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:47:6a:37:59:a0:6f:ab:d9:76:32:d9:46:a5:6a: a8:86:46:ae:9e:d7:99:9d:5e:9f:26:2c:d2:37:b7:cd: ea:48:62:e0:d9:7c:fc:9b:58:09:66:ee:a2:6f:ef:cc: f5:e4:7d:71:8c:8a:8e:ad:ff:ef:0b:43:66:05:a2:0f: 2f:9a:cb:8a:c4:52:da:f2:17:62:57:34:7d:d7:42:66: 83:52:f1:ac:6f:cd:b4:d1:f9:c7:fb:ea:72:6a:41:67: 39:bc:76:b2:7b:4b:1c:88:2b:4e:0d:14:62:bf:5c:69: 2d:54:0b:b9:a6:f8:31:bf:c7:2b:dd:ce:c7:83:7e:7e: c2:44:bd:a9:a0:b1:2f:ea:98:7a:39:6d:6f:78:df:a4: a0:42:dd:89:a7:49:97:0c:5f:4c:c4:84:36:da:be:ae: 7d:c8:1b:a1:01:21:86:0f:10:06:ec:25:41:37:ab:3c: d2:dd:cc:03:fe:94:45:85:27:a0:17:f6:08:ec:44:f5: fa:58:c4:23:f2:dc:28:de:08:e3:be:fa:00:29:e3:72: 52:f3:ec:c8:c9:fe:97:b6:b0:8a:b1:93:6a:45:49:fd: bc:4c:79:4a:dd:b6:6f:c0:8c:dc:34:99:5f:17:75:14: 7f:25:82:5c:13:ea:a0:2a:48:0c:1a:51:ff:17:18:88 Fingerprint (SHA-256): 05:61:34:00:24:F6:92:FC:87:7E:C5:EC:BE:3B:76:2D:EF:E8:3E:0F:4F:49:62:B3:9C:29:CC:96:83:9F:31:6A Fingerprint (SHA1): 70:F6:F4:78:D1:6A:66:16:65:A8:E9:82:45:72:03:50:0B:3D:52:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2038: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2039: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191368 (0x433ed588) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:51 2025 Not After : Thu Nov 28 11:15:51 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:1c:3b:0b:e9:2f:be:1a:d7:51:32:af:16:ff:7a:2a: 52:e6:85:bc:c8:fa:5d:2f:bf:29:f4:02:5a:7a:bb:82: 69:25:97:28:6e:e3:9c:73:0d:3c:eb:78:32:ab:b1:4d: bc:9a:4e:11:1a:73:9d:ae:a8:e5:2c:3c:c8:fe:79:fe: d1:4d:d2:0e:31:be:5e:04:d3:83:d3:bf:ea:0d:94:ee: d7:54:ae:34:fa:fc:57:ac:f9:bc:19:c0:9e:0b:d4:b1: da:09:c7:18:f8:00:66:05:a9:f6:74:51:37:61:12:24: 62:15:a8:2f:2e:7c:41:d8:3c:eb:ca:a2:86:0c:4e:cd: 2f:d2:a5:15:6a:b3:ef:b2:b0:a6:32:b6:a7:2f:25:4a: 07:49:9f:6a:bd:6c:a7:0d:c4:95:30:57:2a:3e:99:ac: e7:0d:7e:b4:7c:9f:7d:5e:05:11:e3:7b:c8:30:66:0b: e3:bb:8b:39:32:b1:32:df:30:23:8c:b0:5f:dc:da:50: 85:af:68:32:85:db:2b:ac:94:90:07:80:18:33:5d:2c: 81:cb:ac:81:fd:1d:67:59:36:8f:63:3f:14:2a:c2:8e: a2:a9:c2:d5:60:d2:da:e3:59:5b:e3:3b:fe:0c:69:25: 99:be:c8:39:b1:3f:5b:9e:a4:ca:d6:93:85:fb:76:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:3f:e0:44:83:36:f8:a2:fb:da:4f:e0:58:e2:e8: 2d:a6:8d:ae:c2:2c:40:9f:61:8d:ed:56:5f:25:75:b8: dc:7b:ab:cb:90:e9:3b:82:91:43:ec:c7:d1:3b:2c:57: 2c:91:70:2d:44:c5:21:01:fb:e6:53:bb:c8:3f:4c:62: e3:51:36:bc:a4:69:37:0d:94:b1:56:32:c2:33:41:24: fe:ce:dd:b0:1e:f7:f2:f9:a6:97:aa:ae:29:fe:ad:ae: ca:12:0f:27:ee:4f:76:cb:0c:16:7b:bf:f9:1f:ee:d9: 59:6d:9b:06:fc:22:23:e0:d0:ef:63:c8:0b:21:7d:17: 7e:1e:f9:81:93:32:32:18:52:eb:49:6a:b7:fa:e4:4b: 91:8c:9d:6e:26:9c:a1:88:ac:de:49:d4:51:9a:24:d3: cf:a4:cd:72:3d:17:79:ff:e3:66:e8:1d:ed:ee:ab:40: 26:15:76:e3:64:f4:ef:be:14:a8:85:54:ed:64:ae:70: 76:22:db:74:5f:8a:8b:17:80:2a:92:c8:80:fc:09:1d: fc:18:2f:00:8c:8f:46:a3:4d:28:78:64:7a:e9:5e:37: aa:b5:ff:ae:c2:c8:a1:32:91:ae:86:77:4e:11:50:5b: 47:f9:57:f1:2c:ca:7e:f6:88:d0:c2:a1:81:5a:7b:3d Fingerprint (SHA-256): 31:73:F9:72:3F:73:74:87:D9:02:23:DC:1F:3E:F6:52:E3:7E:2F:6F:D5:A9:74:F0:F7:80:53:DA:19:2A:8C:72 Fingerprint (SHA1): CA:53:05:69:D6:51:86:3A:0C:9F:F3:23:85:0A:4F:A8:24:2A:37:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2040: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2041: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2042: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2043: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2044: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191366 (0x433ed586) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:49 2025 Not After : Thu Nov 28 11:15:49 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:d8:eb:33:9e:f6:b1:7d:5c:aa:62:30:ed:4e:9d:61: df:1f:ed:41:60:de:77:4c:89:4b:39:d9:27:5c:26:22: ab:52:5d:f7:89:1b:86:1e:5c:c6:0b:0e:3d:9a:3b:97: 24:3d:f7:bc:34:c8:35:fb:df:b8:b3:ca:5d:65:be:bf: 71:1b:0f:2e:98:d9:8b:24:71:67:a8:00:38:16:84:d7: e7:2d:c7:69:af:d3:60:31:88:83:87:90:5f:48:6d:6c: c3:dd:67:95:73:89:b9:9a:71:5c:95:9e:d4:76:f8:e0: 55:b7:6a:da:07:33:63:89:ab:b4:96:a8:9c:58:5e:ef: 0e:75:ac:47:ce:1c:bf:ea:9e:70:01:c4:a0:3e:23:8d: 74:47:1e:a4:d3:69:55:08:5a:bc:7d:34:c6:13:b6:74: e2:7e:5c:85:80:4c:c2:23:63:c4:d7:19:81:c7:d7:c0: b6:c3:b5:19:58:2f:92:5c:91:1c:c9:c0:2a:9e:60:b8: 84:0e:39:95:ba:47:48:1a:33:b4:85:7d:88:35:44:85: e6:e9:81:18:b4:f1:f7:bc:db:16:39:c6:56:e3:55:59: 78:20:b7:f5:1a:fb:73:80:aa:0c:7b:5a:93:81:b3:61: 85:39:c2:d9:72:45:00:94:5f:8d:f4:5c:47:3e:5c:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:e6:66:4c:78:18:94:0b:4b:7d:f8:ad:c8:97:45:29: 34:ad:35:83:cd:bf:ea:11:b8:fa:f8:0d:b0:f5:1f:76: b7:1f:64:86:b7:3b:a9:eb:2d:94:15:5e:34:a9:c9:d7: 7a:82:42:13:f7:84:80:ae:4b:15:5a:41:c1:fc:8c:ab: c8:fe:3c:77:81:16:64:fe:4e:78:6c:a3:07:47:61:2c: 5e:f5:06:05:80:62:9e:57:ca:a9:ea:13:98:6c:35:f9: 7d:f2:e4:cb:96:c0:b7:25:ff:45:66:ab:97:cf:20:7b: 31:26:4b:05:3e:61:01:62:73:1c:eb:6d:ca:c0:30:06: 4e:87:db:50:f7:a2:ff:41:7d:bb:c4:17:ec:56:d2:80: bc:59:f4:39:24:f0:6a:f8:55:fa:0b:86:f6:29:80:59: c3:80:ee:39:47:bd:c2:59:06:26:9c:24:d3:6d:bd:31: 82:f3:0f:f2:50:f4:74:b1:cc:81:65:47:00:ee:6d:d0: 56:f5:b8:be:8e:0a:28:76:2c:00:5b:72:8d:14:b5:d2: f9:b0:a5:35:ff:fb:0f:af:25:59:e9:42:85:90:9a:6a: 23:88:e3:89:6d:b9:42:f0:3d:22:24:fd:78:5c:19:a9: 31:37:c7:91:93:22:f6:f8:66:01:98:29:b2:c6:73:51 Fingerprint (SHA-256): EC:AE:02:5B:75:DD:3C:26:2F:F3:6F:F7:B2:26:0C:40:17:A4:30:9A:54:02:D5:CA:3B:B9:53:78:4F:94:80:41 Fingerprint (SHA1): 68:44:1E:BC:ED:94:97:BA:46:72:09:1A:55:1C:52:A0:1D:35:3D:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2045: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2046: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191367 (0x433ed587) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:50 2025 Not After : Thu Nov 28 11:15:50 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:15:9e:d6:30:75:c3:f9:ec:16:fb:2d:08:53:05:8f: a2:85:89:c5:40:75:1c:97:6d:30:de:5c:ed:4f:e8:64: 2a:a2:ac:f2:1f:44:32:61:e1:4e:60:0b:d3:f8:33:52: c4:c5:32:fa:b9:7e:29:51:f5:7e:29:74:43:c7:4c:91: 72:be:ed:99:7c:6a:a8:9d:2b:9a:a0:aa:df:59:8a:c7: d9:f7:c4:98:d2:b1:34:fa:8e:a0:ba:2b:10:99:27:ee: ad:dd:7b:a0:09:35:f4:5b:82:9e:b0:ba:67:d3:16:90: 0e:0b:62:e2:07:29:d3:ce:1c:9d:6b:b0:97:73:df:15: f8:5b:b3:2a:d5:b8:83:c3:1d:ae:1e:d0:33:86:3e:41: ad:33:64:4a:6e:e3:c1:02:6f:6d:4b:e8:6c:c6:a2:5e: e4:f0:36:71:9f:09:21:76:80:1f:c7:68:80:fc:28:05: 0f:e3:6f:8f:9f:60:9b:60:ef:6d:94:15:1a:b4:af:3a: d9:83:f6:76:b5:80:68:71:23:d8:39:b4:cb:59:18:07: 98:7d:c8:d0:13:eb:e8:54:43:1f:2c:0b:f9:d8:af:eb: 4a:96:b2:94:f3:9d:9b:bf:22:07:8c:b3:e6:27:ae:c1: 78:ca:db:47:15:81:ff:8c:4b:37:19:51:a9:7c:bb:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:41:47:6a:37:59:a0:6f:ab:d9:76:32:d9:46:a5:6a: a8:86:46:ae:9e:d7:99:9d:5e:9f:26:2c:d2:37:b7:cd: ea:48:62:e0:d9:7c:fc:9b:58:09:66:ee:a2:6f:ef:cc: f5:e4:7d:71:8c:8a:8e:ad:ff:ef:0b:43:66:05:a2:0f: 2f:9a:cb:8a:c4:52:da:f2:17:62:57:34:7d:d7:42:66: 83:52:f1:ac:6f:cd:b4:d1:f9:c7:fb:ea:72:6a:41:67: 39:bc:76:b2:7b:4b:1c:88:2b:4e:0d:14:62:bf:5c:69: 2d:54:0b:b9:a6:f8:31:bf:c7:2b:dd:ce:c7:83:7e:7e: c2:44:bd:a9:a0:b1:2f:ea:98:7a:39:6d:6f:78:df:a4: a0:42:dd:89:a7:49:97:0c:5f:4c:c4:84:36:da:be:ae: 7d:c8:1b:a1:01:21:86:0f:10:06:ec:25:41:37:ab:3c: d2:dd:cc:03:fe:94:45:85:27:a0:17:f6:08:ec:44:f5: fa:58:c4:23:f2:dc:28:de:08:e3:be:fa:00:29:e3:72: 52:f3:ec:c8:c9:fe:97:b6:b0:8a:b1:93:6a:45:49:fd: bc:4c:79:4a:dd:b6:6f:c0:8c:dc:34:99:5f:17:75:14: 7f:25:82:5c:13:ea:a0:2a:48:0c:1a:51:ff:17:18:88 Fingerprint (SHA-256): 05:61:34:00:24:F6:92:FC:87:7E:C5:EC:BE:3B:76:2D:EF:E8:3E:0F:4F:49:62:B3:9C:29:CC:96:83:9F:31:6A Fingerprint (SHA1): 70:F6:F4:78:D1:6A:66:16:65:A8:E9:82:45:72:03:50:0B:3D:52:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2047: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2048: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191368 (0x433ed588) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:51 2025 Not After : Thu Nov 28 11:15:51 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:1c:3b:0b:e9:2f:be:1a:d7:51:32:af:16:ff:7a:2a: 52:e6:85:bc:c8:fa:5d:2f:bf:29:f4:02:5a:7a:bb:82: 69:25:97:28:6e:e3:9c:73:0d:3c:eb:78:32:ab:b1:4d: bc:9a:4e:11:1a:73:9d:ae:a8:e5:2c:3c:c8:fe:79:fe: d1:4d:d2:0e:31:be:5e:04:d3:83:d3:bf:ea:0d:94:ee: d7:54:ae:34:fa:fc:57:ac:f9:bc:19:c0:9e:0b:d4:b1: da:09:c7:18:f8:00:66:05:a9:f6:74:51:37:61:12:24: 62:15:a8:2f:2e:7c:41:d8:3c:eb:ca:a2:86:0c:4e:cd: 2f:d2:a5:15:6a:b3:ef:b2:b0:a6:32:b6:a7:2f:25:4a: 07:49:9f:6a:bd:6c:a7:0d:c4:95:30:57:2a:3e:99:ac: e7:0d:7e:b4:7c:9f:7d:5e:05:11:e3:7b:c8:30:66:0b: e3:bb:8b:39:32:b1:32:df:30:23:8c:b0:5f:dc:da:50: 85:af:68:32:85:db:2b:ac:94:90:07:80:18:33:5d:2c: 81:cb:ac:81:fd:1d:67:59:36:8f:63:3f:14:2a:c2:8e: a2:a9:c2:d5:60:d2:da:e3:59:5b:e3:3b:fe:0c:69:25: 99:be:c8:39:b1:3f:5b:9e:a4:ca:d6:93:85:fb:76:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:fe:3f:e0:44:83:36:f8:a2:fb:da:4f:e0:58:e2:e8: 2d:a6:8d:ae:c2:2c:40:9f:61:8d:ed:56:5f:25:75:b8: dc:7b:ab:cb:90:e9:3b:82:91:43:ec:c7:d1:3b:2c:57: 2c:91:70:2d:44:c5:21:01:fb:e6:53:bb:c8:3f:4c:62: e3:51:36:bc:a4:69:37:0d:94:b1:56:32:c2:33:41:24: fe:ce:dd:b0:1e:f7:f2:f9:a6:97:aa:ae:29:fe:ad:ae: ca:12:0f:27:ee:4f:76:cb:0c:16:7b:bf:f9:1f:ee:d9: 59:6d:9b:06:fc:22:23:e0:d0:ef:63:c8:0b:21:7d:17: 7e:1e:f9:81:93:32:32:18:52:eb:49:6a:b7:fa:e4:4b: 91:8c:9d:6e:26:9c:a1:88:ac:de:49:d4:51:9a:24:d3: cf:a4:cd:72:3d:17:79:ff:e3:66:e8:1d:ed:ee:ab:40: 26:15:76:e3:64:f4:ef:be:14:a8:85:54:ed:64:ae:70: 76:22:db:74:5f:8a:8b:17:80:2a:92:c8:80:fc:09:1d: fc:18:2f:00:8c:8f:46:a3:4d:28:78:64:7a:e9:5e:37: aa:b5:ff:ae:c2:c8:a1:32:91:ae:86:77:4e:11:50:5b: 47:f9:57:f1:2c:ca:7e:f6:88:d0:c2:a1:81:5a:7b:3d Fingerprint (SHA-256): 31:73:F9:72:3F:73:74:87:D9:02:23:DC:1F:3E:F6:52:E3:7E:2F:6F:D5:A9:74:F0:F7:80:53:DA:19:2A:8C:72 Fingerprint (SHA1): CA:53:05:69:D6:51:86:3A:0C:9F:F3:23:85:0A:4F:A8:24:2A:37:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2049: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2050: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2051: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191370 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2052: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2053: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2054: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2055: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191371 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2056: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2057: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2058: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2059: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191372 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2060: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2061: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2062: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2063: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191373 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2064: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2065: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2066: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2067: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191374 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2068: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2069: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2070: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191370 (0x433ed58a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:53 2025 Not After : Thu Nov 28 11:15:53 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:e6:a7:55:67:2c:bc:34:9d:7c:c5:c7:db:ec:2e:e0: c0:3c:38:90:a7:b3:7d:37:d6:20:0f:5e:02:0f:2d:7c: 18:17:f2:bb:e6:b0:61:0c:44:b9:95:31:67:49:13:e1: 09:48:25:de:3c:d3:eb:84:ee:3e:22:3e:38:5f:b1:fc: 22:56:ec:9c:45:fe:b8:a1:b9:4d:7b:8f:09:33:ba:a7: 96:d2:32:07:29:c6:9f:2e:2a:94:bd:99:ae:26:ef:31: f6:d1:1a:84:62:f2:79:5b:90:1a:d6:62:ad:c1:4a:a0: e2:5c:2a:98:00:53:d2:78:41:90:f1:fd:a5:f7:97:85: 6b:4c:19:c2:7c:f0:d3:cf:0b:0c:2f:00:10:61:fd:b3: ad:1e:ec:6a:69:91:5b:b4:84:83:a5:e4:7b:07:b1:ea: b4:31:f2:b2:d3:f8:77:d7:3b:60:30:ff:5f:0c:85:94: 21:69:08:ac:5c:37:ee:69:85:b8:90:c0:bc:c4:f3:fb: b1:04:71:d4:dd:d6:22:25:36:49:68:5d:f8:24:78:80: bc:c6:1f:d4:42:89:1b:73:66:a6:4e:68:af:51:f3:e9: 01:2a:f7:75:9c:dd:0f:da:c1:63:34:df:fd:d8:b1:b7: 17:bf:f1:7f:9e:58:a1:45:1d:ef:68:81:a5:8d:da:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:db:47:5c:87:21:6e:a9:ce:59:6d:14:94:4f:8c:5e: 69:ad:4f:ac:54:f6:e4:b2:c2:1b:5a:6c:95:14:30:df: 71:54:1f:36:42:fc:2c:09:b2:7d:de:dd:92:f5:fe:84: b0:58:fe:82:0e:17:96:67:1d:9a:82:64:b1:60:ce:df: 4d:d4:5e:1d:78:79:9a:bd:8f:01:b9:14:8b:f4:08:df: 9b:0a:9a:09:b2:f9:79:2d:72:0d:f2:fe:e2:60:a3:74: fb:e4:5b:cc:00:e7:0f:9a:32:22:e6:09:85:7a:b3:03: 9d:88:cc:0d:ab:19:dd:70:db:c9:ad:f2:c8:c8:16:39: 41:87:b8:e6:02:11:c7:4a:43:23:38:5a:5b:a5:1f:4d: 0d:fe:98:0d:b5:f5:37:38:68:54:50:3d:5b:e0:78:49: 58:90:bc:e5:1b:2c:3e:c2:b4:1d:01:09:92:61:3a:2c: f9:d6:77:bf:96:9e:20:77:ba:9b:5d:4b:87:e6:9b:b8: 04:6b:72:64:5f:3d:bb:6e:db:54:e9:4f:39:7d:80:22: 13:04:fb:1a:85:29:7a:b4:58:4b:1c:98:f3:ce:42:36: 1f:48:20:3d:e6:bc:32:19:ac:49:f9:fb:54:0f:0a:7c: 09:c1:20:77:c7:fc:f3:41:c1:be:dd:a8:fa:d9:56:6b Fingerprint (SHA-256): AB:F3:AD:28:C1:BF:6D:D1:50:FB:92:79:3C:E7:03:62:9A:FE:1B:9D:17:F0:AE:ED:3D:25:AF:EE:EF:9D:F0:1D Fingerprint (SHA1): 06:27:57:62:A9:ED:BD:D2:19:97:D3:8F:07:F1:42:31:38:D5:E5:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2071: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2072: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191371 (0x433ed58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:54 2025 Not After : Thu Nov 28 11:15:54 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a1:88:41:a6:97:74:50:fe:30:c6:fd:40:56:de:38: 3e:cf:0d:65:32:bc:84:b9:7b:2e:51:f6:be:47:df:ce: 39:f6:c0:32:b5:cf:70:4d:78:9c:40:af:e0:40:dd:ab: 03:07:d2:5f:4c:f1:89:87:49:12:2c:b7:3b:8b:a8:58: f5:0e:76:7f:d1:5d:cc:16:f4:50:e5:03:2d:f1:3c:7b: 70:c0:40:6c:7b:18:3f:56:b0:30:80:60:8d:5d:74:d6: fe:0e:53:e7:fb:17:1f:e7:59:57:c0:59:20:fe:a0:01: 0d:25:70:4e:77:1b:6b:47:4d:bc:15:e8:f0:07:ef:c3: cc:34:45:60:90:f2:94:88:28:12:03:26:81:1e:d9:cd: 8a:37:b8:89:e0:40:8e:bb:7d:eb:f8:bf:04:64:77:24: d8:8e:db:62:4e:f1:e5:e3:c2:e4:41:29:93:20:99:95: 8c:eb:ab:1a:46:c5:61:1f:7e:45:78:d0:69:7e:39:b9: 9f:56:cf:bc:01:61:16:9c:b0:06:f2:b2:70:e2:c1:6b: 26:98:31:ba:c2:5e:ee:d9:c8:ae:2d:53:df:81:0d:21: 66:e0:54:e5:d0:cd:04:90:02:79:9e:47:ba:19:2f:44: 87:ab:b8:70:6a:68:0f:b8:42:cf:53:bd:2c:07:fb:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:cd:4a:86:f5:b2:f6:d5:66:a5:2e:35:de:c6:99:58: 35:46:ea:f2:10:65:06:b9:f1:a3:a1:a4:97:f2:a1:7e: 0d:d2:57:f3:81:3e:12:f8:ae:6e:0e:ac:83:3d:f0:7f: 78:fd:95:8f:88:6d:94:e0:23:1c:bb:42:a6:1d:91:a5: dc:d6:9c:46:f6:c9:cf:db:bc:4f:6b:6d:88:2d:60:ec: cf:07:36:85:ee:9c:a2:ad:91:48:6e:14:ca:60:59:89: 7f:51:04:52:58:87:21:23:cb:27:f5:28:2a:05:e4:0c: da:2a:88:65:db:e4:b7:cc:c7:5b:02:cb:18:60:a6:43: 4c:fe:eb:ce:96:09:69:22:4b:0d:83:d4:c5:07:9f:11: 28:2b:c2:a3:41:5c:50:e2:c0:c1:66:8c:e6:2f:4b:f1: f2:3b:80:65:bc:b2:da:a5:e9:c2:11:7b:a5:81:99:d4: 37:88:c9:b8:cf:a9:95:18:8a:d7:97:c5:9a:d2:2a:1f: 02:0d:65:31:ef:dc:39:ac:6c:d0:02:29:1c:68:40:81: 16:0d:b4:94:d8:8c:17:48:79:ee:1f:1f:6c:38:36:ca: bd:36:af:45:48:ba:dc:27:c2:d6:3c:9e:a5:e5:ee:11: 30:db:5a:aa:b6:18:8c:4d:47:4e:39:f5:f9:c9:69:af Fingerprint (SHA-256): 85:4E:98:63:8A:59:68:E3:68:54:72:F5:5B:13:E8:02:E8:C6:48:E6:27:EC:72:9D:8E:A4:7A:61:2D:C7:77:B7 Fingerprint (SHA1): 91:38:38:53:38:D1:3D:6A:48:05:57:30:51:06:E8:58:93:8C:4C:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2073: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2074: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191372 (0x433ed58c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:55 2025 Not After : Thu Nov 28 11:15:55 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:7b:9e:0d:aa:0f:eb:e8:1b:15:8e:d9:12:27:20:9a: 7d:29:4c:d2:54:94:28:8a:08:5b:da:45:52:68:88:32: f1:d6:e6:fb:b5:86:7b:4c:c1:db:2e:f1:96:52:1b:65: c9:48:0b:65:ac:d9:a2:6f:0a:55:da:53:2d:54:e2:84: fe:03:0a:07:49:b3:5d:b1:3b:e1:03:f6:c5:a6:d2:40: 85:f6:6f:27:d8:87:36:34:0c:9f:c3:e8:63:0a:95:f4: a3:70:19:5f:bd:a1:cd:70:d5:0a:63:76:43:46:54:44: 97:86:32:02:ae:87:3f:16:5d:4a:12:d3:20:d2:51:e2: ad:25:c7:c8:68:71:df:6c:b2:d4:ce:23:90:3e:4f:d7: 55:91:c4:b9:9b:cf:e4:7f:75:2b:ad:10:58:24:1a:51: 0c:f7:67:ec:4f:82:0a:b4:e0:1a:d2:27:db:06:70:26: 35:28:70:70:02:17:1b:fc:1c:19:af:fa:f4:c6:ce:87: 13:62:5a:b4:9b:b9:57:fc:b7:6b:6f:8c:8a:66:f6:8b: 52:02:c9:7b:e1:92:7f:ed:c2:3c:0b:0b:de:a4:0c:1b: a9:fb:1e:df:6b:e6:1a:c3:f3:70:a4:2d:39:19:6f:d1: 16:f6:1e:8d:21:6d:92:7e:aa:e8:f1:16:c5:89:d7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:59:26:2a:d4:54:df:02:f9:3f:8e:d3:45:dc:f9:e9: 4c:ea:de:39:9e:31:4b:60:54:be:43:b0:29:f9:ee:3c: 7c:38:52:c8:38:4e:9f:ce:c5:aa:42:9f:21:cd:43:c5: 17:61:11:79:d8:3f:2a:7d:3c:2e:59:b8:63:d7:01:d5: 71:55:78:bf:d6:51:84:e2:af:2b:ce:af:8e:58:57:f3: a2:2b:db:4e:03:69:31:ec:fc:64:bc:a5:b3:5c:46:29: 16:1b:3b:dd:00:67:92:79:04:a2:47:e3:e3:a5:57:e0: 04:4a:e5:3f:06:b2:fd:5e:59:23:eb:e2:c6:33:8b:54: 61:9f:27:58:b4:8e:44:56:91:f3:51:19:da:90:e3:69: 31:70:87:da:d2:d4:51:95:b0:be:f2:95:59:50:67:03: f5:f7:1b:da:e1:03:8a:34:ae:35:6e:b2:c4:e2:73:b5: 9f:ec:9a:eb:81:39:39:59:1a:c0:37:36:4a:47:19:82: 4f:95:f0:12:a7:72:82:80:d5:ee:58:c8:99:78:3f:bb: 82:43:8f:8b:d5:81:74:a5:64:df:a5:2c:67:00:55:4c: 19:68:d0:13:e4:06:df:b6:98:22:43:87:0a:49:46:61: 1a:b1:c1:8a:76:1c:07:d3:75:75:04:e0:da:c3:8b:07 Fingerprint (SHA-256): 44:68:56:E1:8E:11:7F:6D:EE:93:7E:22:64:01:5C:25:8A:8E:6E:F9:F0:DC:3C:92:35:9F:9C:E9:E1:32:FC:AD Fingerprint (SHA1): B4:CE:01:09:58:05:C3:FA:CF:1C:B3:A0:A5:6A:8B:CE:54:B5:A5:7D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2075: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2076: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2077: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2078: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2079: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191370 (0x433ed58a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:53 2025 Not After : Thu Nov 28 11:15:53 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:e6:a7:55:67:2c:bc:34:9d:7c:c5:c7:db:ec:2e:e0: c0:3c:38:90:a7:b3:7d:37:d6:20:0f:5e:02:0f:2d:7c: 18:17:f2:bb:e6:b0:61:0c:44:b9:95:31:67:49:13:e1: 09:48:25:de:3c:d3:eb:84:ee:3e:22:3e:38:5f:b1:fc: 22:56:ec:9c:45:fe:b8:a1:b9:4d:7b:8f:09:33:ba:a7: 96:d2:32:07:29:c6:9f:2e:2a:94:bd:99:ae:26:ef:31: f6:d1:1a:84:62:f2:79:5b:90:1a:d6:62:ad:c1:4a:a0: e2:5c:2a:98:00:53:d2:78:41:90:f1:fd:a5:f7:97:85: 6b:4c:19:c2:7c:f0:d3:cf:0b:0c:2f:00:10:61:fd:b3: ad:1e:ec:6a:69:91:5b:b4:84:83:a5:e4:7b:07:b1:ea: b4:31:f2:b2:d3:f8:77:d7:3b:60:30:ff:5f:0c:85:94: 21:69:08:ac:5c:37:ee:69:85:b8:90:c0:bc:c4:f3:fb: b1:04:71:d4:dd:d6:22:25:36:49:68:5d:f8:24:78:80: bc:c6:1f:d4:42:89:1b:73:66:a6:4e:68:af:51:f3:e9: 01:2a:f7:75:9c:dd:0f:da:c1:63:34:df:fd:d8:b1:b7: 17:bf:f1:7f:9e:58:a1:45:1d:ef:68:81:a5:8d:da:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:db:47:5c:87:21:6e:a9:ce:59:6d:14:94:4f:8c:5e: 69:ad:4f:ac:54:f6:e4:b2:c2:1b:5a:6c:95:14:30:df: 71:54:1f:36:42:fc:2c:09:b2:7d:de:dd:92:f5:fe:84: b0:58:fe:82:0e:17:96:67:1d:9a:82:64:b1:60:ce:df: 4d:d4:5e:1d:78:79:9a:bd:8f:01:b9:14:8b:f4:08:df: 9b:0a:9a:09:b2:f9:79:2d:72:0d:f2:fe:e2:60:a3:74: fb:e4:5b:cc:00:e7:0f:9a:32:22:e6:09:85:7a:b3:03: 9d:88:cc:0d:ab:19:dd:70:db:c9:ad:f2:c8:c8:16:39: 41:87:b8:e6:02:11:c7:4a:43:23:38:5a:5b:a5:1f:4d: 0d:fe:98:0d:b5:f5:37:38:68:54:50:3d:5b:e0:78:49: 58:90:bc:e5:1b:2c:3e:c2:b4:1d:01:09:92:61:3a:2c: f9:d6:77:bf:96:9e:20:77:ba:9b:5d:4b:87:e6:9b:b8: 04:6b:72:64:5f:3d:bb:6e:db:54:e9:4f:39:7d:80:22: 13:04:fb:1a:85:29:7a:b4:58:4b:1c:98:f3:ce:42:36: 1f:48:20:3d:e6:bc:32:19:ac:49:f9:fb:54:0f:0a:7c: 09:c1:20:77:c7:fc:f3:41:c1:be:dd:a8:fa:d9:56:6b Fingerprint (SHA-256): AB:F3:AD:28:C1:BF:6D:D1:50:FB:92:79:3C:E7:03:62:9A:FE:1B:9D:17:F0:AE:ED:3D:25:AF:EE:EF:9D:F0:1D Fingerprint (SHA1): 06:27:57:62:A9:ED:BD:D2:19:97:D3:8F:07:F1:42:31:38:D5:E5:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2080: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2081: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191371 (0x433ed58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:54 2025 Not After : Thu Nov 28 11:15:54 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a1:88:41:a6:97:74:50:fe:30:c6:fd:40:56:de:38: 3e:cf:0d:65:32:bc:84:b9:7b:2e:51:f6:be:47:df:ce: 39:f6:c0:32:b5:cf:70:4d:78:9c:40:af:e0:40:dd:ab: 03:07:d2:5f:4c:f1:89:87:49:12:2c:b7:3b:8b:a8:58: f5:0e:76:7f:d1:5d:cc:16:f4:50:e5:03:2d:f1:3c:7b: 70:c0:40:6c:7b:18:3f:56:b0:30:80:60:8d:5d:74:d6: fe:0e:53:e7:fb:17:1f:e7:59:57:c0:59:20:fe:a0:01: 0d:25:70:4e:77:1b:6b:47:4d:bc:15:e8:f0:07:ef:c3: cc:34:45:60:90:f2:94:88:28:12:03:26:81:1e:d9:cd: 8a:37:b8:89:e0:40:8e:bb:7d:eb:f8:bf:04:64:77:24: d8:8e:db:62:4e:f1:e5:e3:c2:e4:41:29:93:20:99:95: 8c:eb:ab:1a:46:c5:61:1f:7e:45:78:d0:69:7e:39:b9: 9f:56:cf:bc:01:61:16:9c:b0:06:f2:b2:70:e2:c1:6b: 26:98:31:ba:c2:5e:ee:d9:c8:ae:2d:53:df:81:0d:21: 66:e0:54:e5:d0:cd:04:90:02:79:9e:47:ba:19:2f:44: 87:ab:b8:70:6a:68:0f:b8:42:cf:53:bd:2c:07:fb:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:cd:4a:86:f5:b2:f6:d5:66:a5:2e:35:de:c6:99:58: 35:46:ea:f2:10:65:06:b9:f1:a3:a1:a4:97:f2:a1:7e: 0d:d2:57:f3:81:3e:12:f8:ae:6e:0e:ac:83:3d:f0:7f: 78:fd:95:8f:88:6d:94:e0:23:1c:bb:42:a6:1d:91:a5: dc:d6:9c:46:f6:c9:cf:db:bc:4f:6b:6d:88:2d:60:ec: cf:07:36:85:ee:9c:a2:ad:91:48:6e:14:ca:60:59:89: 7f:51:04:52:58:87:21:23:cb:27:f5:28:2a:05:e4:0c: da:2a:88:65:db:e4:b7:cc:c7:5b:02:cb:18:60:a6:43: 4c:fe:eb:ce:96:09:69:22:4b:0d:83:d4:c5:07:9f:11: 28:2b:c2:a3:41:5c:50:e2:c0:c1:66:8c:e6:2f:4b:f1: f2:3b:80:65:bc:b2:da:a5:e9:c2:11:7b:a5:81:99:d4: 37:88:c9:b8:cf:a9:95:18:8a:d7:97:c5:9a:d2:2a:1f: 02:0d:65:31:ef:dc:39:ac:6c:d0:02:29:1c:68:40:81: 16:0d:b4:94:d8:8c:17:48:79:ee:1f:1f:6c:38:36:ca: bd:36:af:45:48:ba:dc:27:c2:d6:3c:9e:a5:e5:ee:11: 30:db:5a:aa:b6:18:8c:4d:47:4e:39:f5:f9:c9:69:af Fingerprint (SHA-256): 85:4E:98:63:8A:59:68:E3:68:54:72:F5:5B:13:E8:02:E8:C6:48:E6:27:EC:72:9D:8E:A4:7A:61:2D:C7:77:B7 Fingerprint (SHA1): 91:38:38:53:38:D1:3D:6A:48:05:57:30:51:06:E8:58:93:8C:4C:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2082: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2083: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191372 (0x433ed58c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:55 2025 Not After : Thu Nov 28 11:15:55 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:7b:9e:0d:aa:0f:eb:e8:1b:15:8e:d9:12:27:20:9a: 7d:29:4c:d2:54:94:28:8a:08:5b:da:45:52:68:88:32: f1:d6:e6:fb:b5:86:7b:4c:c1:db:2e:f1:96:52:1b:65: c9:48:0b:65:ac:d9:a2:6f:0a:55:da:53:2d:54:e2:84: fe:03:0a:07:49:b3:5d:b1:3b:e1:03:f6:c5:a6:d2:40: 85:f6:6f:27:d8:87:36:34:0c:9f:c3:e8:63:0a:95:f4: a3:70:19:5f:bd:a1:cd:70:d5:0a:63:76:43:46:54:44: 97:86:32:02:ae:87:3f:16:5d:4a:12:d3:20:d2:51:e2: ad:25:c7:c8:68:71:df:6c:b2:d4:ce:23:90:3e:4f:d7: 55:91:c4:b9:9b:cf:e4:7f:75:2b:ad:10:58:24:1a:51: 0c:f7:67:ec:4f:82:0a:b4:e0:1a:d2:27:db:06:70:26: 35:28:70:70:02:17:1b:fc:1c:19:af:fa:f4:c6:ce:87: 13:62:5a:b4:9b:b9:57:fc:b7:6b:6f:8c:8a:66:f6:8b: 52:02:c9:7b:e1:92:7f:ed:c2:3c:0b:0b:de:a4:0c:1b: a9:fb:1e:df:6b:e6:1a:c3:f3:70:a4:2d:39:19:6f:d1: 16:f6:1e:8d:21:6d:92:7e:aa:e8:f1:16:c5:89:d7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:59:26:2a:d4:54:df:02:f9:3f:8e:d3:45:dc:f9:e9: 4c:ea:de:39:9e:31:4b:60:54:be:43:b0:29:f9:ee:3c: 7c:38:52:c8:38:4e:9f:ce:c5:aa:42:9f:21:cd:43:c5: 17:61:11:79:d8:3f:2a:7d:3c:2e:59:b8:63:d7:01:d5: 71:55:78:bf:d6:51:84:e2:af:2b:ce:af:8e:58:57:f3: a2:2b:db:4e:03:69:31:ec:fc:64:bc:a5:b3:5c:46:29: 16:1b:3b:dd:00:67:92:79:04:a2:47:e3:e3:a5:57:e0: 04:4a:e5:3f:06:b2:fd:5e:59:23:eb:e2:c6:33:8b:54: 61:9f:27:58:b4:8e:44:56:91:f3:51:19:da:90:e3:69: 31:70:87:da:d2:d4:51:95:b0:be:f2:95:59:50:67:03: f5:f7:1b:da:e1:03:8a:34:ae:35:6e:b2:c4:e2:73:b5: 9f:ec:9a:eb:81:39:39:59:1a:c0:37:36:4a:47:19:82: 4f:95:f0:12:a7:72:82:80:d5:ee:58:c8:99:78:3f:bb: 82:43:8f:8b:d5:81:74:a5:64:df:a5:2c:67:00:55:4c: 19:68:d0:13:e4:06:df:b6:98:22:43:87:0a:49:46:61: 1a:b1:c1:8a:76:1c:07:d3:75:75:04:e0:da:c3:8b:07 Fingerprint (SHA-256): 44:68:56:E1:8E:11:7F:6D:EE:93:7E:22:64:01:5C:25:8A:8E:6E:F9:F0:DC:3C:92:35:9F:9C:E9:E1:32:FC:AD Fingerprint (SHA1): B4:CE:01:09:58:05:C3:FA:CF:1C:B3:A0:A5:6A:8B:CE:54:B5:A5:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2084: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2085: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191370 (0x433ed58a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:53 2025 Not After : Thu Nov 28 11:15:53 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:e6:a7:55:67:2c:bc:34:9d:7c:c5:c7:db:ec:2e:e0: c0:3c:38:90:a7:b3:7d:37:d6:20:0f:5e:02:0f:2d:7c: 18:17:f2:bb:e6:b0:61:0c:44:b9:95:31:67:49:13:e1: 09:48:25:de:3c:d3:eb:84:ee:3e:22:3e:38:5f:b1:fc: 22:56:ec:9c:45:fe:b8:a1:b9:4d:7b:8f:09:33:ba:a7: 96:d2:32:07:29:c6:9f:2e:2a:94:bd:99:ae:26:ef:31: f6:d1:1a:84:62:f2:79:5b:90:1a:d6:62:ad:c1:4a:a0: e2:5c:2a:98:00:53:d2:78:41:90:f1:fd:a5:f7:97:85: 6b:4c:19:c2:7c:f0:d3:cf:0b:0c:2f:00:10:61:fd:b3: ad:1e:ec:6a:69:91:5b:b4:84:83:a5:e4:7b:07:b1:ea: b4:31:f2:b2:d3:f8:77:d7:3b:60:30:ff:5f:0c:85:94: 21:69:08:ac:5c:37:ee:69:85:b8:90:c0:bc:c4:f3:fb: b1:04:71:d4:dd:d6:22:25:36:49:68:5d:f8:24:78:80: bc:c6:1f:d4:42:89:1b:73:66:a6:4e:68:af:51:f3:e9: 01:2a:f7:75:9c:dd:0f:da:c1:63:34:df:fd:d8:b1:b7: 17:bf:f1:7f:9e:58:a1:45:1d:ef:68:81:a5:8d:da:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:db:47:5c:87:21:6e:a9:ce:59:6d:14:94:4f:8c:5e: 69:ad:4f:ac:54:f6:e4:b2:c2:1b:5a:6c:95:14:30:df: 71:54:1f:36:42:fc:2c:09:b2:7d:de:dd:92:f5:fe:84: b0:58:fe:82:0e:17:96:67:1d:9a:82:64:b1:60:ce:df: 4d:d4:5e:1d:78:79:9a:bd:8f:01:b9:14:8b:f4:08:df: 9b:0a:9a:09:b2:f9:79:2d:72:0d:f2:fe:e2:60:a3:74: fb:e4:5b:cc:00:e7:0f:9a:32:22:e6:09:85:7a:b3:03: 9d:88:cc:0d:ab:19:dd:70:db:c9:ad:f2:c8:c8:16:39: 41:87:b8:e6:02:11:c7:4a:43:23:38:5a:5b:a5:1f:4d: 0d:fe:98:0d:b5:f5:37:38:68:54:50:3d:5b:e0:78:49: 58:90:bc:e5:1b:2c:3e:c2:b4:1d:01:09:92:61:3a:2c: f9:d6:77:bf:96:9e:20:77:ba:9b:5d:4b:87:e6:9b:b8: 04:6b:72:64:5f:3d:bb:6e:db:54:e9:4f:39:7d:80:22: 13:04:fb:1a:85:29:7a:b4:58:4b:1c:98:f3:ce:42:36: 1f:48:20:3d:e6:bc:32:19:ac:49:f9:fb:54:0f:0a:7c: 09:c1:20:77:c7:fc:f3:41:c1:be:dd:a8:fa:d9:56:6b Fingerprint (SHA-256): AB:F3:AD:28:C1:BF:6D:D1:50:FB:92:79:3C:E7:03:62:9A:FE:1B:9D:17:F0:AE:ED:3D:25:AF:EE:EF:9D:F0:1D Fingerprint (SHA1): 06:27:57:62:A9:ED:BD:D2:19:97:D3:8F:07:F1:42:31:38:D5:E5:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2086: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191370 (0x433ed58a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:53 2025 Not After : Thu Nov 28 11:15:53 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:e6:a7:55:67:2c:bc:34:9d:7c:c5:c7:db:ec:2e:e0: c0:3c:38:90:a7:b3:7d:37:d6:20:0f:5e:02:0f:2d:7c: 18:17:f2:bb:e6:b0:61:0c:44:b9:95:31:67:49:13:e1: 09:48:25:de:3c:d3:eb:84:ee:3e:22:3e:38:5f:b1:fc: 22:56:ec:9c:45:fe:b8:a1:b9:4d:7b:8f:09:33:ba:a7: 96:d2:32:07:29:c6:9f:2e:2a:94:bd:99:ae:26:ef:31: f6:d1:1a:84:62:f2:79:5b:90:1a:d6:62:ad:c1:4a:a0: e2:5c:2a:98:00:53:d2:78:41:90:f1:fd:a5:f7:97:85: 6b:4c:19:c2:7c:f0:d3:cf:0b:0c:2f:00:10:61:fd:b3: ad:1e:ec:6a:69:91:5b:b4:84:83:a5:e4:7b:07:b1:ea: b4:31:f2:b2:d3:f8:77:d7:3b:60:30:ff:5f:0c:85:94: 21:69:08:ac:5c:37:ee:69:85:b8:90:c0:bc:c4:f3:fb: b1:04:71:d4:dd:d6:22:25:36:49:68:5d:f8:24:78:80: bc:c6:1f:d4:42:89:1b:73:66:a6:4e:68:af:51:f3:e9: 01:2a:f7:75:9c:dd:0f:da:c1:63:34:df:fd:d8:b1:b7: 17:bf:f1:7f:9e:58:a1:45:1d:ef:68:81:a5:8d:da:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:db:47:5c:87:21:6e:a9:ce:59:6d:14:94:4f:8c:5e: 69:ad:4f:ac:54:f6:e4:b2:c2:1b:5a:6c:95:14:30:df: 71:54:1f:36:42:fc:2c:09:b2:7d:de:dd:92:f5:fe:84: b0:58:fe:82:0e:17:96:67:1d:9a:82:64:b1:60:ce:df: 4d:d4:5e:1d:78:79:9a:bd:8f:01:b9:14:8b:f4:08:df: 9b:0a:9a:09:b2:f9:79:2d:72:0d:f2:fe:e2:60:a3:74: fb:e4:5b:cc:00:e7:0f:9a:32:22:e6:09:85:7a:b3:03: 9d:88:cc:0d:ab:19:dd:70:db:c9:ad:f2:c8:c8:16:39: 41:87:b8:e6:02:11:c7:4a:43:23:38:5a:5b:a5:1f:4d: 0d:fe:98:0d:b5:f5:37:38:68:54:50:3d:5b:e0:78:49: 58:90:bc:e5:1b:2c:3e:c2:b4:1d:01:09:92:61:3a:2c: f9:d6:77:bf:96:9e:20:77:ba:9b:5d:4b:87:e6:9b:b8: 04:6b:72:64:5f:3d:bb:6e:db:54:e9:4f:39:7d:80:22: 13:04:fb:1a:85:29:7a:b4:58:4b:1c:98:f3:ce:42:36: 1f:48:20:3d:e6:bc:32:19:ac:49:f9:fb:54:0f:0a:7c: 09:c1:20:77:c7:fc:f3:41:c1:be:dd:a8:fa:d9:56:6b Fingerprint (SHA-256): AB:F3:AD:28:C1:BF:6D:D1:50:FB:92:79:3C:E7:03:62:9A:FE:1B:9D:17:F0:AE:ED:3D:25:AF:EE:EF:9D:F0:1D Fingerprint (SHA1): 06:27:57:62:A9:ED:BD:D2:19:97:D3:8F:07:F1:42:31:38:D5:E5:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2087: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191371 (0x433ed58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:54 2025 Not After : Thu Nov 28 11:15:54 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a1:88:41:a6:97:74:50:fe:30:c6:fd:40:56:de:38: 3e:cf:0d:65:32:bc:84:b9:7b:2e:51:f6:be:47:df:ce: 39:f6:c0:32:b5:cf:70:4d:78:9c:40:af:e0:40:dd:ab: 03:07:d2:5f:4c:f1:89:87:49:12:2c:b7:3b:8b:a8:58: f5:0e:76:7f:d1:5d:cc:16:f4:50:e5:03:2d:f1:3c:7b: 70:c0:40:6c:7b:18:3f:56:b0:30:80:60:8d:5d:74:d6: fe:0e:53:e7:fb:17:1f:e7:59:57:c0:59:20:fe:a0:01: 0d:25:70:4e:77:1b:6b:47:4d:bc:15:e8:f0:07:ef:c3: cc:34:45:60:90:f2:94:88:28:12:03:26:81:1e:d9:cd: 8a:37:b8:89:e0:40:8e:bb:7d:eb:f8:bf:04:64:77:24: d8:8e:db:62:4e:f1:e5:e3:c2:e4:41:29:93:20:99:95: 8c:eb:ab:1a:46:c5:61:1f:7e:45:78:d0:69:7e:39:b9: 9f:56:cf:bc:01:61:16:9c:b0:06:f2:b2:70:e2:c1:6b: 26:98:31:ba:c2:5e:ee:d9:c8:ae:2d:53:df:81:0d:21: 66:e0:54:e5:d0:cd:04:90:02:79:9e:47:ba:19:2f:44: 87:ab:b8:70:6a:68:0f:b8:42:cf:53:bd:2c:07:fb:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:cd:4a:86:f5:b2:f6:d5:66:a5:2e:35:de:c6:99:58: 35:46:ea:f2:10:65:06:b9:f1:a3:a1:a4:97:f2:a1:7e: 0d:d2:57:f3:81:3e:12:f8:ae:6e:0e:ac:83:3d:f0:7f: 78:fd:95:8f:88:6d:94:e0:23:1c:bb:42:a6:1d:91:a5: dc:d6:9c:46:f6:c9:cf:db:bc:4f:6b:6d:88:2d:60:ec: cf:07:36:85:ee:9c:a2:ad:91:48:6e:14:ca:60:59:89: 7f:51:04:52:58:87:21:23:cb:27:f5:28:2a:05:e4:0c: da:2a:88:65:db:e4:b7:cc:c7:5b:02:cb:18:60:a6:43: 4c:fe:eb:ce:96:09:69:22:4b:0d:83:d4:c5:07:9f:11: 28:2b:c2:a3:41:5c:50:e2:c0:c1:66:8c:e6:2f:4b:f1: f2:3b:80:65:bc:b2:da:a5:e9:c2:11:7b:a5:81:99:d4: 37:88:c9:b8:cf:a9:95:18:8a:d7:97:c5:9a:d2:2a:1f: 02:0d:65:31:ef:dc:39:ac:6c:d0:02:29:1c:68:40:81: 16:0d:b4:94:d8:8c:17:48:79:ee:1f:1f:6c:38:36:ca: bd:36:af:45:48:ba:dc:27:c2:d6:3c:9e:a5:e5:ee:11: 30:db:5a:aa:b6:18:8c:4d:47:4e:39:f5:f9:c9:69:af Fingerprint (SHA-256): 85:4E:98:63:8A:59:68:E3:68:54:72:F5:5B:13:E8:02:E8:C6:48:E6:27:EC:72:9D:8E:A4:7A:61:2D:C7:77:B7 Fingerprint (SHA1): 91:38:38:53:38:D1:3D:6A:48:05:57:30:51:06:E8:58:93:8C:4C:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2088: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191371 (0x433ed58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:15:54 2025 Not After : Thu Nov 28 11:15:54 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:a1:88:41:a6:97:74:50:fe:30:c6:fd:40:56:de:38: 3e:cf:0d:65:32:bc:84:b9:7b:2e:51:f6:be:47:df:ce: 39:f6:c0:32:b5:cf:70:4d:78:9c:40:af:e0:40:dd:ab: 03:07:d2:5f:4c:f1:89:87:49:12:2c:b7:3b:8b:a8:58: f5:0e:76:7f:d1:5d:cc:16:f4:50:e5:03:2d:f1:3c:7b: 70:c0:40:6c:7b:18:3f:56:b0:30:80:60:8d:5d:74:d6: fe:0e:53:e7:fb:17:1f:e7:59:57:c0:59:20:fe:a0:01: 0d:25:70:4e:77:1b:6b:47:4d:bc:15:e8:f0:07:ef:c3: cc:34:45:60:90:f2:94:88:28:12:03:26:81:1e:d9:cd: 8a:37:b8:89:e0:40:8e:bb:7d:eb:f8:bf:04:64:77:24: d8:8e:db:62:4e:f1:e5:e3:c2:e4:41:29:93:20:99:95: 8c:eb:ab:1a:46:c5:61:1f:7e:45:78:d0:69:7e:39:b9: 9f:56:cf:bc:01:61:16:9c:b0:06:f2:b2:70:e2:c1:6b: 26:98:31:ba:c2:5e:ee:d9:c8:ae:2d:53:df:81:0d:21: 66:e0:54:e5:d0:cd:04:90:02:79:9e:47:ba:19:2f:44: 87:ab:b8:70:6a:68:0f:b8:42:cf:53:bd:2c:07:fb:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:cd:4a:86:f5:b2:f6:d5:66:a5:2e:35:de:c6:99:58: 35:46:ea:f2:10:65:06:b9:f1:a3:a1:a4:97:f2:a1:7e: 0d:d2:57:f3:81:3e:12:f8:ae:6e:0e:ac:83:3d:f0:7f: 78:fd:95:8f:88:6d:94:e0:23:1c:bb:42:a6:1d:91:a5: dc:d6:9c:46:f6:c9:cf:db:bc:4f:6b:6d:88:2d:60:ec: cf:07:36:85:ee:9c:a2:ad:91:48:6e:14:ca:60:59:89: 7f:51:04:52:58:87:21:23:cb:27:f5:28:2a:05:e4:0c: da:2a:88:65:db:e4:b7:cc:c7:5b:02:cb:18:60:a6:43: 4c:fe:eb:ce:96:09:69:22:4b:0d:83:d4:c5:07:9f:11: 28:2b:c2:a3:41:5c:50:e2:c0:c1:66:8c:e6:2f:4b:f1: f2:3b:80:65:bc:b2:da:a5:e9:c2:11:7b:a5:81:99:d4: 37:88:c9:b8:cf:a9:95:18:8a:d7:97:c5:9a:d2:2a:1f: 02:0d:65:31:ef:dc:39:ac:6c:d0:02:29:1c:68:40:81: 16:0d:b4:94:d8:8c:17:48:79:ee:1f:1f:6c:38:36:ca: bd:36:af:45:48:ba:dc:27:c2:d6:3c:9e:a5:e5:ee:11: 30:db:5a:aa:b6:18:8c:4d:47:4e:39:f5:f9:c9:69:af Fingerprint (SHA-256): 85:4E:98:63:8A:59:68:E3:68:54:72:F5:5B:13:E8:02:E8:C6:48:E6:27:EC:72:9D:8E:A4:7A:61:2D:C7:77:B7 Fingerprint (SHA1): 91:38:38:53:38:D1:3D:6A:48:05:57:30:51:06:E8:58:93:8C:4C:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2089: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191372 (0x433ed58c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:55 2025 Not After : Thu Nov 28 11:15:55 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:7b:9e:0d:aa:0f:eb:e8:1b:15:8e:d9:12:27:20:9a: 7d:29:4c:d2:54:94:28:8a:08:5b:da:45:52:68:88:32: f1:d6:e6:fb:b5:86:7b:4c:c1:db:2e:f1:96:52:1b:65: c9:48:0b:65:ac:d9:a2:6f:0a:55:da:53:2d:54:e2:84: fe:03:0a:07:49:b3:5d:b1:3b:e1:03:f6:c5:a6:d2:40: 85:f6:6f:27:d8:87:36:34:0c:9f:c3:e8:63:0a:95:f4: a3:70:19:5f:bd:a1:cd:70:d5:0a:63:76:43:46:54:44: 97:86:32:02:ae:87:3f:16:5d:4a:12:d3:20:d2:51:e2: ad:25:c7:c8:68:71:df:6c:b2:d4:ce:23:90:3e:4f:d7: 55:91:c4:b9:9b:cf:e4:7f:75:2b:ad:10:58:24:1a:51: 0c:f7:67:ec:4f:82:0a:b4:e0:1a:d2:27:db:06:70:26: 35:28:70:70:02:17:1b:fc:1c:19:af:fa:f4:c6:ce:87: 13:62:5a:b4:9b:b9:57:fc:b7:6b:6f:8c:8a:66:f6:8b: 52:02:c9:7b:e1:92:7f:ed:c2:3c:0b:0b:de:a4:0c:1b: a9:fb:1e:df:6b:e6:1a:c3:f3:70:a4:2d:39:19:6f:d1: 16:f6:1e:8d:21:6d:92:7e:aa:e8:f1:16:c5:89:d7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:59:26:2a:d4:54:df:02:f9:3f:8e:d3:45:dc:f9:e9: 4c:ea:de:39:9e:31:4b:60:54:be:43:b0:29:f9:ee:3c: 7c:38:52:c8:38:4e:9f:ce:c5:aa:42:9f:21:cd:43:c5: 17:61:11:79:d8:3f:2a:7d:3c:2e:59:b8:63:d7:01:d5: 71:55:78:bf:d6:51:84:e2:af:2b:ce:af:8e:58:57:f3: a2:2b:db:4e:03:69:31:ec:fc:64:bc:a5:b3:5c:46:29: 16:1b:3b:dd:00:67:92:79:04:a2:47:e3:e3:a5:57:e0: 04:4a:e5:3f:06:b2:fd:5e:59:23:eb:e2:c6:33:8b:54: 61:9f:27:58:b4:8e:44:56:91:f3:51:19:da:90:e3:69: 31:70:87:da:d2:d4:51:95:b0:be:f2:95:59:50:67:03: f5:f7:1b:da:e1:03:8a:34:ae:35:6e:b2:c4:e2:73:b5: 9f:ec:9a:eb:81:39:39:59:1a:c0:37:36:4a:47:19:82: 4f:95:f0:12:a7:72:82:80:d5:ee:58:c8:99:78:3f:bb: 82:43:8f:8b:d5:81:74:a5:64:df:a5:2c:67:00:55:4c: 19:68:d0:13:e4:06:df:b6:98:22:43:87:0a:49:46:61: 1a:b1:c1:8a:76:1c:07:d3:75:75:04:e0:da:c3:8b:07 Fingerprint (SHA-256): 44:68:56:E1:8E:11:7F:6D:EE:93:7E:22:64:01:5C:25:8A:8E:6E:F9:F0:DC:3C:92:35:9F:9C:E9:E1:32:FC:AD Fingerprint (SHA1): B4:CE:01:09:58:05:C3:FA:CF:1C:B3:A0:A5:6A:8B:CE:54:B5:A5:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2090: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191372 (0x433ed58c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:15:55 2025 Not After : Thu Nov 28 11:15:55 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:7b:9e:0d:aa:0f:eb:e8:1b:15:8e:d9:12:27:20:9a: 7d:29:4c:d2:54:94:28:8a:08:5b:da:45:52:68:88:32: f1:d6:e6:fb:b5:86:7b:4c:c1:db:2e:f1:96:52:1b:65: c9:48:0b:65:ac:d9:a2:6f:0a:55:da:53:2d:54:e2:84: fe:03:0a:07:49:b3:5d:b1:3b:e1:03:f6:c5:a6:d2:40: 85:f6:6f:27:d8:87:36:34:0c:9f:c3:e8:63:0a:95:f4: a3:70:19:5f:bd:a1:cd:70:d5:0a:63:76:43:46:54:44: 97:86:32:02:ae:87:3f:16:5d:4a:12:d3:20:d2:51:e2: ad:25:c7:c8:68:71:df:6c:b2:d4:ce:23:90:3e:4f:d7: 55:91:c4:b9:9b:cf:e4:7f:75:2b:ad:10:58:24:1a:51: 0c:f7:67:ec:4f:82:0a:b4:e0:1a:d2:27:db:06:70:26: 35:28:70:70:02:17:1b:fc:1c:19:af:fa:f4:c6:ce:87: 13:62:5a:b4:9b:b9:57:fc:b7:6b:6f:8c:8a:66:f6:8b: 52:02:c9:7b:e1:92:7f:ed:c2:3c:0b:0b:de:a4:0c:1b: a9:fb:1e:df:6b:e6:1a:c3:f3:70:a4:2d:39:19:6f:d1: 16:f6:1e:8d:21:6d:92:7e:aa:e8:f1:16:c5:89:d7:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:59:26:2a:d4:54:df:02:f9:3f:8e:d3:45:dc:f9:e9: 4c:ea:de:39:9e:31:4b:60:54:be:43:b0:29:f9:ee:3c: 7c:38:52:c8:38:4e:9f:ce:c5:aa:42:9f:21:cd:43:c5: 17:61:11:79:d8:3f:2a:7d:3c:2e:59:b8:63:d7:01:d5: 71:55:78:bf:d6:51:84:e2:af:2b:ce:af:8e:58:57:f3: a2:2b:db:4e:03:69:31:ec:fc:64:bc:a5:b3:5c:46:29: 16:1b:3b:dd:00:67:92:79:04:a2:47:e3:e3:a5:57:e0: 04:4a:e5:3f:06:b2:fd:5e:59:23:eb:e2:c6:33:8b:54: 61:9f:27:58:b4:8e:44:56:91:f3:51:19:da:90:e3:69: 31:70:87:da:d2:d4:51:95:b0:be:f2:95:59:50:67:03: f5:f7:1b:da:e1:03:8a:34:ae:35:6e:b2:c4:e2:73:b5: 9f:ec:9a:eb:81:39:39:59:1a:c0:37:36:4a:47:19:82: 4f:95:f0:12:a7:72:82:80:d5:ee:58:c8:99:78:3f:bb: 82:43:8f:8b:d5:81:74:a5:64:df:a5:2c:67:00:55:4c: 19:68:d0:13:e4:06:df:b6:98:22:43:87:0a:49:46:61: 1a:b1:c1:8a:76:1c:07:d3:75:75:04:e0:da:c3:8b:07 Fingerprint (SHA-256): 44:68:56:E1:8E:11:7F:6D:EE:93:7E:22:64:01:5C:25:8A:8E:6E:F9:F0:DC:3C:92:35:9F:9C:E9:E1:32:FC:AD Fingerprint (SHA1): B4:CE:01:09:58:05:C3:FA:CF:1C:B3:A0:A5:6A:8B:CE:54:B5:A5:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2091: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2092: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191375 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2093: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2094: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2095: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2096: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191376 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2097: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2098: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2099: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2100: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191377 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2101: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2102: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2103: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2104: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128191378 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2105: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2106: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2107: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2108: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191379 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2109: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2110: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2111: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2112: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191380 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2113: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2114: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2115: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2116: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128191381 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2117: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2118: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2119: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2120: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2121: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2122: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2123: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191375 (0x433ed58f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:59 2025 Not After : Thu Nov 28 11:15:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:3d:de:f3:cf:4d:d7:9d:60:12:43:c5:9b:7d:27:2c: 02:cf:0f:e7:93:cb:8f:25:93:3b:f0:11:dc:02:55:87: 9a:6e:32:62:4f:1b:3b:bb:31:37:f3:bd:6f:08:d9:f7: ee:9f:32:63:a2:8b:5b:67:dc:18:c3:4a:68:34:a5:e0: 02:83:e5:05:a4:05:40:d8:7c:51:14:5e:5e:76:7f:eb: be:b1:8f:0f:cc:96:53:59:ad:f6:b4:bc:4e:06:98:79: 17:d1:d7:14:3b:e1:ae:a5:10:02:9a:3e:14:4d:87:67: 8e:c8:d3:5b:81:67:d0:be:47:d0:ce:3e:00:22:12:75: 84:94:b6:1f:08:6b:82:3a:0c:e1:75:63:b2:56:14:1a: b2:b3:a8:74:c9:a2:7b:3b:fe:e0:a4:92:24:39:86:ec: 8b:56:8f:5f:02:57:98:41:4d:e0:2d:dc:98:c5:be:65: f2:16:2e:4f:b2:15:48:d9:b2:16:20:f5:3c:b4:8d:cb: 9a:b6:d8:d2:85:51:d9:f7:87:5c:42:d6:c5:45:28:9a: ad:56:9d:de:bb:c1:34:3e:e9:68:e4:e6:e4:68:c1:e5: e0:e2:1c:3f:6a:15:7c:f1:fe:30:19:6f:4f:ab:07:8a: cd:cd:93:3b:f5:a6:17:d7:e6:8b:70:e5:e5:2d:fc:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:43:7a:e0:15:af:0b:9a:28:ff:41:b9:24:0f:bf:10: 17:37:c0:c9:ef:24:b7:35:e7:39:03:a7:b9:1a:d9:c7: 2d:13:ad:24:7e:14:5c:45:fb:41:ee:8d:8f:7c:3a:d2: a3:ae:02:18:19:14:34:84:c7:de:3e:51:b7:d2:e8:48: 4f:51:dd:6e:a6:d5:c8:db:be:7c:75:ca:8b:79:f4:cf: 53:88:0f:a6:12:9a:af:b9:eb:c0:8c:a0:0f:95:35:56: 04:f2:02:cd:9f:08:7d:7f:99:8d:f5:dc:21:10:fa:f2: 7d:8c:2e:1c:dc:65:a3:0e:09:24:79:81:86:6d:bb:47: be:10:5c:71:de:5f:45:b5:22:b1:d4:aa:98:fb:82:1e: 68:2f:a7:9c:75:2f:03:31:77:6b:7c:45:19:c5:b2:82: 4c:b4:50:39:a1:1b:1a:22:5e:c9:70:08:3a:f6:d0:52: 6b:4b:37:64:f2:b3:a6:6f:c6:13:e4:71:c2:22:5a:a3: b1:e4:53:24:fa:05:09:2a:7b:49:c7:30:d7:26:65:7a: ae:32:45:ae:c8:ee:4b:e9:aa:b2:58:97:33:0f:64:4a: 79:36:d6:ce:5e:9e:74:d2:16:41:fc:d8:73:45:d0:fc: 28:cb:db:1c:b4:18:c3:af:b6:9e:d9:13:96:44:31:03 Fingerprint (SHA-256): 5F:38:D6:7F:9B:2F:E2:B4:A9:C0:4F:35:43:75:7B:61:86:F7:A3:A7:9E:4A:6C:2E:46:23:CB:89:13:06:D3:48 Fingerprint (SHA1): 51:FE:7F:A5:78:24:3B:B8:30:55:EF:86:59:86:53:15:63:2B:A6:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2124: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2125: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2126: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2127: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191375 (0x433ed58f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:15:59 2025 Not After : Thu Nov 28 11:15:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:3d:de:f3:cf:4d:d7:9d:60:12:43:c5:9b:7d:27:2c: 02:cf:0f:e7:93:cb:8f:25:93:3b:f0:11:dc:02:55:87: 9a:6e:32:62:4f:1b:3b:bb:31:37:f3:bd:6f:08:d9:f7: ee:9f:32:63:a2:8b:5b:67:dc:18:c3:4a:68:34:a5:e0: 02:83:e5:05:a4:05:40:d8:7c:51:14:5e:5e:76:7f:eb: be:b1:8f:0f:cc:96:53:59:ad:f6:b4:bc:4e:06:98:79: 17:d1:d7:14:3b:e1:ae:a5:10:02:9a:3e:14:4d:87:67: 8e:c8:d3:5b:81:67:d0:be:47:d0:ce:3e:00:22:12:75: 84:94:b6:1f:08:6b:82:3a:0c:e1:75:63:b2:56:14:1a: b2:b3:a8:74:c9:a2:7b:3b:fe:e0:a4:92:24:39:86:ec: 8b:56:8f:5f:02:57:98:41:4d:e0:2d:dc:98:c5:be:65: f2:16:2e:4f:b2:15:48:d9:b2:16:20:f5:3c:b4:8d:cb: 9a:b6:d8:d2:85:51:d9:f7:87:5c:42:d6:c5:45:28:9a: ad:56:9d:de:bb:c1:34:3e:e9:68:e4:e6:e4:68:c1:e5: e0:e2:1c:3f:6a:15:7c:f1:fe:30:19:6f:4f:ab:07:8a: cd:cd:93:3b:f5:a6:17:d7:e6:8b:70:e5:e5:2d:fc:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:43:7a:e0:15:af:0b:9a:28:ff:41:b9:24:0f:bf:10: 17:37:c0:c9:ef:24:b7:35:e7:39:03:a7:b9:1a:d9:c7: 2d:13:ad:24:7e:14:5c:45:fb:41:ee:8d:8f:7c:3a:d2: a3:ae:02:18:19:14:34:84:c7:de:3e:51:b7:d2:e8:48: 4f:51:dd:6e:a6:d5:c8:db:be:7c:75:ca:8b:79:f4:cf: 53:88:0f:a6:12:9a:af:b9:eb:c0:8c:a0:0f:95:35:56: 04:f2:02:cd:9f:08:7d:7f:99:8d:f5:dc:21:10:fa:f2: 7d:8c:2e:1c:dc:65:a3:0e:09:24:79:81:86:6d:bb:47: be:10:5c:71:de:5f:45:b5:22:b1:d4:aa:98:fb:82:1e: 68:2f:a7:9c:75:2f:03:31:77:6b:7c:45:19:c5:b2:82: 4c:b4:50:39:a1:1b:1a:22:5e:c9:70:08:3a:f6:d0:52: 6b:4b:37:64:f2:b3:a6:6f:c6:13:e4:71:c2:22:5a:a3: b1:e4:53:24:fa:05:09:2a:7b:49:c7:30:d7:26:65:7a: ae:32:45:ae:c8:ee:4b:e9:aa:b2:58:97:33:0f:64:4a: 79:36:d6:ce:5e:9e:74:d2:16:41:fc:d8:73:45:d0:fc: 28:cb:db:1c:b4:18:c3:af:b6:9e:d9:13:96:44:31:03 Fingerprint (SHA-256): 5F:38:D6:7F:9B:2F:E2:B4:A9:C0:4F:35:43:75:7B:61:86:F7:A3:A7:9E:4A:6C:2E:46:23:CB:89:13:06:D3:48 Fingerprint (SHA1): 51:FE:7F:A5:78:24:3B:B8:30:55:EF:86:59:86:53:15:63:2B:A6:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2128: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2129: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2130: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191382 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2131: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2132: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2133: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2134: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191383 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2135: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2136: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2137: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2138: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128191384 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2139: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2140: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2141: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2142: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128191385 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2143: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2144: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2145: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2146: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128191386 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2147: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2148: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2149: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2150: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128191387 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2151: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2152: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2153: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2154: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128191388 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2155: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2156: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2157: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2158: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128191389 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2159: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2160: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #2161: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2162: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128191390 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2163: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2164: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #2165: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2166: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128191391 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2167: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2168: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2169: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2170: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128191392 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2171: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2172: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #2173: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2174: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128191393 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2175: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2176: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #2177: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2178: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128191394 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2179: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2180: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2181: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2182: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128191395 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2183: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2184: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #2185: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2186: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128191396 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2187: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2188: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #2189: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2190: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128191397 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2191: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2192: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #2193: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2194: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128191398 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2195: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2196: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #2197: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2198: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128191399 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2199: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2200: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #2201: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2202: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128191400 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2203: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2204: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #2205: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2206: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128191401 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2207: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2208: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #2209: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2210: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128191402 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2211: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2212: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #2213: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2214: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128191403 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2215: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2216: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #2217: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2218: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128191404 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2219: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2220: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #2221: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2222: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128191405 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2223: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2224: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #2225: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2226: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128191406 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2227: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2228: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #2229: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2230: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128191407 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2231: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2232: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #2233: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2234: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128191408 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2235: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2236: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #2237: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2238: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128191409 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2239: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2240: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #2241: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2242: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128191410 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2243: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2244: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #2245: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2246: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128191411 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2247: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2248: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2249: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2250: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2251: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2252: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2253: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2254: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2255: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2256: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2257: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2258: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2259: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2260: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2261: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2262: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2263: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2264: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2265: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2266: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2267: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2268: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2269: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2270: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2271: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191382 (0x433ed596) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:16:05 2025 Not After : Thu Nov 28 11:16:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:47:d7:11:4a:98:71:a7:4e:a4:d5:6b:ec:fd:92:c5: 4a:c6:98:78:ad:54:f9:93:49:e5:04:2e:20:db:97:45: 82:35:7e:df:a3:81:45:19:35:0a:8d:c0:fa:0e:9b:b7: 0a:76:2a:51:e1:b1:82:a0:59:77:59:bc:84:14:59:96: d0:e0:22:cf:61:cf:6b:d0:ec:ee:d9:7d:13:a7:10:81: 6e:7a:36:31:d7:a7:42:2a:4e:b2:92:94:cf:1d:51:d7: 0f:74:29:44:a1:d7:d7:09:5f:a2:2d:68:88:fd:ab:51: 8c:e4:24:76:2d:2e:c4:5f:cf:da:7d:71:9d:e6:0c:69: 17:01:09:11:68:c9:ab:a0:5a:43:54:d9:d5:ec:fb:4a: 72:9b:95:ce:4e:97:38:9a:ea:43:75:27:25:84:5b:9b: c6:75:30:af:99:65:62:e1:57:b6:2d:8a:28:06:74:8a: 6d:46:83:18:02:55:c3:1c:c5:0a:8d:d5:c4:a5:42:2a: cd:87:bb:4b:db:24:ae:e3:bb:95:d0:47:22:44:59:55: a7:e3:f1:fe:5f:ce:92:a6:d7:f3:e9:4c:68:5d:a8:6a: a6:b8:eb:e5:96:0d:a4:bb:83:fc:20:bb:d9:7e:dc:68: 7b:98:7b:56:0c:24:a9:07:1f:07:a1:ed:20:e1:4e:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:ce:ec:16:a8:09:43:a6:39:0e:0e:60:79:3b:ec:cd: a6:82:62:d3:68:21:98:1a:7d:6b:ea:98:92:a3:c1:56: 71:d2:37:e1:6d:e4:35:a5:46:9e:5c:a7:e2:d9:da:a4: 79:93:6c:af:67:e6:45:9c:ee:89:1f:c0:0e:66:84:ba: 23:a5:80:a8:2b:dd:c4:84:07:c3:bf:9c:8c:1c:c7:e8: 17:c9:19:70:c4:62:47:d9:fb:bf:80:9b:c1:1c:0d:72: 75:fb:fb:98:36:c0:f3:ec:ae:6a:9b:31:e9:47:29:d5: 09:fb:06:dc:15:40:91:f6:6a:4b:bd:eb:e9:62:0d:12: fc:35:7c:c5:66:ff:ac:e7:e0:02:40:a1:39:dd:33:48: cc:ff:68:05:49:5a:21:42:1e:24:13:c4:80:8f:28:5d: d4:eb:09:23:60:d9:99:3a:d3:d5:38:ce:7d:6a:ec:01: 5f:de:d1:25:88:76:c6:08:79:9e:45:57:02:44:2c:15: c2:0c:82:ee:50:f6:85:d1:ff:31:da:8e:1f:66:98:1e: 79:6a:3a:ba:ee:c1:70:26:54:67:91:e6:00:bd:6b:6e: dc:cd:41:76:f3:8b:bd:54:c5:71:85:d9:ff:a7:6d:7e: 4d:68:ee:23:8d:47:0a:dd:f5:8d:73:3f:8f:97:ef:46 Fingerprint (SHA-256): F8:91:5E:23:A6:E2:A8:E6:B8:25:0E:40:B5:70:CC:5C:6B:C7:F6:F3:DC:6C:5D:0E:7B:DA:88:56:BE:E9:82:6B Fingerprint (SHA1): C1:70:EC:C0:F4:93:04:15:A8:B5:3C:E1:53:65:4B:18:B4:80:75:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2272: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2273: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2274: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191412 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2275: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2276: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #2277: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2278: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128191413 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2279: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2280: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #2281: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2282: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128191414 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2283: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2284: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #2285: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2286: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128191415 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2287: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2288: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #2289: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2290: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128191416 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2291: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2292: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #2293: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2294: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128191417 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2295: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2296: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #2297: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2298: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128191418 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2299: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2300: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2301: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191412 (0x433ed5b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:28 2025 Not After : Thu Nov 28 11:16:28 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:ba:2d:1c:7c:5c:7e:92:28:c3:40:1a:93:c6:83:8f: b1:b9:8d:53:c3:24:46:c3:1f:18:3a:11:ce:bb:65:3b: 65:88:40:ea:28:74:c3:12:58:5c:ee:b7:86:d8:17:b3: 99:ea:14:57:5f:8a:cf:f7:8e:9b:d2:e8:1b:f8:0f:cb: 00:18:be:a3:68:92:8d:59:2a:e0:cf:65:97:f9:af:f2: 6d:d6:da:db:51:97:56:bc:ca:9a:1d:28:e0:4c:6f:d9: 9b:27:a2:8e:6e:48:f5:6a:2c:17:7c:6f:1b:15:0c:dc: 3c:cb:65:69:5b:e9:fe:28:d8:58:e2:86:a2:23:db:5a: 3e:39:28:5e:f4:75:f5:c0:5b:30:f6:e6:78:bb:1a:78: 2d:9d:1d:fb:31:2b:25:a9:c0:d5:aa:35:d0:e0:ad:f7: 6a:b6:89:92:62:01:9d:ed:07:22:fa:9d:47:7c:f9:9d: 9a:02:36:61:67:46:da:db:be:25:0f:be:30:6d:9c:52: 29:b7:f6:df:c3:66:94:27:07:de:a4:87:1c:32:96:48: e8:a6:53:00:74:f8:56:6d:32:27:58:cd:ef:43:05:f1: 10:f6:cd:c3:e2:c7:8f:5f:38:6a:b9:1d:12:d3:96:8c: 47:d6:79:fc:f7:02:4b:b1:35:42:7b:b1:75:a4:57:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:19:b0:ca:d7:a0:d3:b6:4b:df:9c:52:ed:1d:66:92: 55:3d:ed:7c:9c:8d:ec:29:da:ee:d9:c3:28:9d:12:b9: 75:b7:0b:43:87:62:c7:5a:8b:54:61:92:5d:0f:e0:65: 25:64:be:99:62:1d:35:0c:3b:ab:72:e7:bf:3c:50:aa: 06:6a:42:51:74:e1:fe:3e:ad:79:1d:a3:4a:9e:07:de: 01:85:de:15:d1:ac:97:e9:d9:a2:19:28:f5:41:ed:ef: 7c:f3:34:ad:71:5b:d4:44:48:b2:1a:f3:38:64:32:5d: 51:79:3f:92:58:be:85:ae:fe:61:a7:16:78:4f:b8:d1: a0:03:a3:fe:82:9b:92:66:5b:80:41:d0:f1:26:3e:16: e2:d0:5d:a6:bd:28:1b:12:f1:04:31:8d:a1:5d:29:e3: fb:2b:9f:7c:26:74:92:08:0a:c4:4c:61:a9:60:0d:90: 85:5e:97:3f:f9:ad:4f:e9:bc:fe:92:91:bb:00:61:00: 68:90:09:81:54:d1:31:9e:08:1f:b2:09:75:6e:fc:63: ce:b9:50:c0:f8:5f:b2:73:dd:06:0a:81:91:a5:7d:3c: ca:13:cf:0a:60:ea:0a:51:9d:2f:22:d8:ad:32:1a:09: 6d:1d:ce:39:bf:a0:56:ba:21:64:99:96:39:a4:04:1d Fingerprint (SHA-256): 54:5D:BE:D4:47:94:03:33:54:6E:15:E4:4A:58:33:7D:D4:67:48:E9:14:B9:BB:A6:9F:E1:DB:31:86:B7:93:23 Fingerprint (SHA1): BD:A4:63:56:80:CB:1E:B6:4E:92:7C:46:BE:A4:27:67:A8:C8:59:74 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #2302: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2303: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2304: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2305: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191412 (0x433ed5b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:28 2025 Not After : Thu Nov 28 11:16:28 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:ba:2d:1c:7c:5c:7e:92:28:c3:40:1a:93:c6:83:8f: b1:b9:8d:53:c3:24:46:c3:1f:18:3a:11:ce:bb:65:3b: 65:88:40:ea:28:74:c3:12:58:5c:ee:b7:86:d8:17:b3: 99:ea:14:57:5f:8a:cf:f7:8e:9b:d2:e8:1b:f8:0f:cb: 00:18:be:a3:68:92:8d:59:2a:e0:cf:65:97:f9:af:f2: 6d:d6:da:db:51:97:56:bc:ca:9a:1d:28:e0:4c:6f:d9: 9b:27:a2:8e:6e:48:f5:6a:2c:17:7c:6f:1b:15:0c:dc: 3c:cb:65:69:5b:e9:fe:28:d8:58:e2:86:a2:23:db:5a: 3e:39:28:5e:f4:75:f5:c0:5b:30:f6:e6:78:bb:1a:78: 2d:9d:1d:fb:31:2b:25:a9:c0:d5:aa:35:d0:e0:ad:f7: 6a:b6:89:92:62:01:9d:ed:07:22:fa:9d:47:7c:f9:9d: 9a:02:36:61:67:46:da:db:be:25:0f:be:30:6d:9c:52: 29:b7:f6:df:c3:66:94:27:07:de:a4:87:1c:32:96:48: e8:a6:53:00:74:f8:56:6d:32:27:58:cd:ef:43:05:f1: 10:f6:cd:c3:e2:c7:8f:5f:38:6a:b9:1d:12:d3:96:8c: 47:d6:79:fc:f7:02:4b:b1:35:42:7b:b1:75:a4:57:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:19:b0:ca:d7:a0:d3:b6:4b:df:9c:52:ed:1d:66:92: 55:3d:ed:7c:9c:8d:ec:29:da:ee:d9:c3:28:9d:12:b9: 75:b7:0b:43:87:62:c7:5a:8b:54:61:92:5d:0f:e0:65: 25:64:be:99:62:1d:35:0c:3b:ab:72:e7:bf:3c:50:aa: 06:6a:42:51:74:e1:fe:3e:ad:79:1d:a3:4a:9e:07:de: 01:85:de:15:d1:ac:97:e9:d9:a2:19:28:f5:41:ed:ef: 7c:f3:34:ad:71:5b:d4:44:48:b2:1a:f3:38:64:32:5d: 51:79:3f:92:58:be:85:ae:fe:61:a7:16:78:4f:b8:d1: a0:03:a3:fe:82:9b:92:66:5b:80:41:d0:f1:26:3e:16: e2:d0:5d:a6:bd:28:1b:12:f1:04:31:8d:a1:5d:29:e3: fb:2b:9f:7c:26:74:92:08:0a:c4:4c:61:a9:60:0d:90: 85:5e:97:3f:f9:ad:4f:e9:bc:fe:92:91:bb:00:61:00: 68:90:09:81:54:d1:31:9e:08:1f:b2:09:75:6e:fc:63: ce:b9:50:c0:f8:5f:b2:73:dd:06:0a:81:91:a5:7d:3c: ca:13:cf:0a:60:ea:0a:51:9d:2f:22:d8:ad:32:1a:09: 6d:1d:ce:39:bf:a0:56:ba:21:64:99:96:39:a4:04:1d Fingerprint (SHA-256): 54:5D:BE:D4:47:94:03:33:54:6E:15:E4:4A:58:33:7D:D4:67:48:E9:14:B9:BB:A6:9F:E1:DB:31:86:B7:93:23 Fingerprint (SHA1): BD:A4:63:56:80:CB:1E:B6:4E:92:7C:46:BE:A4:27:67:A8:C8:59:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #2306: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2307: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2308: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2309: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191419 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2310: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2311: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2312: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2313: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191420 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2314: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2315: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2316: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2317: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191421 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2318: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2319: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2320: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2321: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191422 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2322: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2323: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2324: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2325: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2326: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2327: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191419 (0x433ed5bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:34 2025 Not After : Thu Nov 28 11:16:34 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:94:f0:c8:df:ec:fb:85:04:9f:5c:2a:1c:4f:f4:43: 2f:83:6a:14:6c:10:fd:df:b8:c2:7d:7e:3f:30:c4:a4: b9:da:68:60:97:c4:b6:7d:e8:d5:ac:ce:cb:71:16:70: 1c:0a:c1:4c:a5:23:b2:27:1c:2c:9e:f0:cd:8d:37:aa: 7d:97:52:85:55:a6:dc:fe:08:22:c9:a2:37:bb:ec:52: 29:b3:1b:fe:57:24:ee:39:ea:3e:25:d5:ed:a9:d5:63: e8:da:70:ba:85:d0:1d:4e:29:11:5a:86:92:a1:25:e6: f0:96:c6:11:53:a6:8e:ce:04:ee:d6:0b:c2:26:13:dc: ef:14:96:35:fb:6d:8d:2a:d4:e1:05:bf:fb:aa:23:cf: 16:46:9f:aa:9a:32:1a:17:1e:b2:91:b0:ad:01:ed:bd: fe:45:cb:82:9a:15:33:71:5b:ae:98:4f:2b:cd:e6:9a: 44:04:82:41:84:84:02:6f:d3:25:a7:09:56:b5:e2:23: 10:33:e3:d3:96:35:9d:02:95:4e:fa:74:13:8b:6e:0d: 9f:9e:41:29:26:39:b0:52:19:6c:0b:30:e5:e2:eb:3c: 94:08:54:b1:81:43:7e:6c:7b:60:41:ef:2b:47:d1:12: 8f:e7:c7:45:5a:8f:52:77:db:ce:55:92:ea:b6:e1:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:68:97:1f:d6:94:f4:0b:56:52:9a:b5:fb:04:86:c9: 0c:6a:4d:40:c9:13:9b:e6:5c:93:b5:c1:b0:f3:95:5c: dd:d6:a6:d5:79:f1:99:ae:eb:3a:f1:d1:66:7a:f7:e8: e7:b8:08:73:40:e6:83:2d:e7:bb:73:98:55:b8:da:fc: a2:47:d5:89:5c:93:b1:00:8d:08:e5:8f:18:a3:4b:40: 0f:b1:62:ea:b0:66:97:0c:bf:d3:ad:69:36:e8:03:c0: ee:b8:40:13:57:18:28:48:27:a7:3d:5f:d9:09:02:6a: 9c:50:bb:2f:9e:fe:0c:d5:3a:22:89:d1:76:c1:c1:35: 18:fe:b8:b1:b5:04:0e:10:2e:40:4c:9c:3e:f6:65:4d: 2f:4b:28:d9:b0:d4:af:46:a0:6a:1e:07:c9:87:c5:26: 44:0a:03:6c:23:3d:be:64:34:b0:18:7b:10:6a:02:25: 62:a6:83:23:e4:99:b9:9d:29:e2:4a:1b:be:11:75:58: 32:e7:b9:50:35:d6:ff:a0:d6:f0:d7:33:b5:0b:b5:57: 54:ef:b6:f0:b7:c8:c5:dd:a0:7b:60:94:60:a6:21:8b: 2f:1c:f4:ad:f5:b5:ee:63:60:74:c9:b0:db:de:74:22: a9:ba:00:48:58:12:83:7d:38:ee:0c:a9:e4:e1:11:a5 Fingerprint (SHA-256): FD:D5:1E:D4:C0:A5:4D:40:40:10:E3:18:7A:3A:5C:9B:6F:80:9D:BC:DF:1D:28:09:48:E1:45:FC:F6:6D:67:6F Fingerprint (SHA1): 9A:D7:E5:DC:35:65:75:C3:F4:EC:EB:A7:C0:F1:B6:30:A5:86:31:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2328: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2329: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2330: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191420 (0x433ed5bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:35 2025 Not After : Thu Nov 28 11:16:35 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:d6:dd:0e:1f:e8:06:77:76:6d:8b:67:65:31:63:c4: f5:92:61:74:69:7e:00:a0:ed:69:2b:32:af:c5:14:c1: d4:ee:e1:10:c2:3c:94:cd:9c:87:8a:e4:6f:8f:81:4c: ae:92:64:8c:23:42:43:f4:b1:e8:04:25:19:83:ff:64: 73:73:98:93:34:2c:5b:55:0b:ef:5c:83:9e:26:48:54: ce:a1:03:2f:f3:42:e6:70:84:4e:95:f6:40:34:3f:2e: 10:27:7b:3a:28:67:ec:c3:9b:38:45:a3:ec:b1:d9:55: 00:6b:75:a0:73:31:82:84:71:40:21:0e:f6:e4:42:82: a0:0a:79:64:ef:af:dd:cc:95:49:04:52:b4:3e:1b:09: 06:ab:d3:b3:8f:71:a3:d9:6f:99:22:0a:04:4f:2d:21: a9:7b:bf:0c:0f:99:07:50:bb:9c:17:66:b9:01:bb:11: 4e:be:4f:cc:e5:d7:76:58:80:6b:c2:b4:bd:1d:4c:b9: 8c:28:b5:2a:fc:38:dd:ef:3a:a5:13:ae:d0:e0:a0:d3: 51:86:bc:49:b3:0a:e4:aa:ed:12:b8:23:88:5d:ca:df: af:7d:e0:ec:51:3e:25:8e:69:96:09:a3:1b:32:79:df: 02:ae:fb:64:29:8e:ea:2d:30:ca:78:a4:bc:de:98:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:95:5d:88:97:bd:fb:8e:fc:f0:14:a2:3d:cd:f7:7a: cb:2b:21:a1:af:1f:ac:9f:a8:c4:2a:99:f7:53:c3:c7: 70:57:4c:e7:db:4c:4e:7f:1f:c7:a5:42:18:37:83:33: ed:9a:fe:ce:c0:10:6a:16:ab:bd:47:45:d1:62:76:87: 69:9b:a4:ba:b6:9f:ac:18:ab:03:00:e7:7d:6b:2c:5e: f3:0f:ab:15:10:52:a7:d7:28:25:4a:db:35:2b:88:10: 93:b9:d2:b0:15:98:13:4c:8f:aa:d5:67:81:5c:c1:06: f1:63:7f:d8:63:d7:a6:92:ea:7b:60:b3:50:b3:a0:fc: 78:1f:86:66:0b:bf:fe:8e:78:b3:72:75:c9:71:73:14: 5e:9c:07:5a:fd:10:ee:d1:9f:13:c4:50:2f:1e:43:70: 0e:b5:0d:af:f6:6a:9a:f3:cd:bf:0d:d2:38:fd:a5:86: 56:5e:24:fe:0d:87:8d:23:8a:30:21:bd:a4:42:9c:77: 2a:99:34:a3:35:c7:4b:15:d4:da:91:0d:9b:d9:f8:8c: d1:0f:5a:f0:28:fa:07:ca:f3:3f:c6:be:92:0b:07:b3: ce:42:df:eb:dc:88:27:fd:18:f3:d3:20:20:0a:83:6f: 11:14:b1:e4:97:8a:e1:a0:0b:e7:a4:47:32:df:49:45 Fingerprint (SHA-256): 63:E4:BD:59:C5:3E:93:2A:92:D0:BA:51:34:82:B6:CA:EB:29:54:7C:FE:DE:EF:1D:87:CB:58:D3:D3:A7:FA:4B Fingerprint (SHA1): AF:87:1F:E9:B6:A7:AF:00:94:56:4E:81:C8:EC:CC:CB:9E:9A:FD:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2331: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2332: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191421 (0x433ed5bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:16:35 2025 Not After : Thu Nov 28 11:16:35 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:6f:49:51:00:98:7d:a8:0b:d9:d2:dc:95:5f:b9:bf: 7b:f0:34:24:d6:d8:40:8c:1f:1e:5a:ee:ff:74:ad:e6: f2:fb:76:01:e7:f7:aa:9e:5c:99:82:99:4d:cc:01:37: ad:e0:aa:49:89:49:a1:33:6b:f6:71:0f:08:04:3d:e5: bb:db:51:43:92:9f:a4:ff:81:aa:6f:a4:7d:7e:a9:85: e4:7b:14:81:bc:c7:a1:1c:95:5a:8d:77:35:a6:3e:02: 7f:6a:ab:23:1e:56:e5:5a:4b:d9:4c:0a:aa:72:0f:f5: 9d:75:3e:57:ee:09:07:4f:35:b3:f7:49:9d:53:4d:cb: d9:89:7a:27:64:d6:95:6b:79:45:5d:a6:b3:25:5f:61: 55:0e:5c:e3:0b:6a:b8:e5:26:5b:0e:2b:64:d8:1a:79: 95:d6:57:2c:b5:9d:d6:78:26:6f:b9:1e:11:7f:f6:84: 71:36:62:71:23:1f:10:18:21:fa:97:81:ee:45:93:fc: 14:b4:0e:59:9a:d4:5a:45:45:74:8a:33:c7:1a:3f:a9: cf:a5:b6:c9:5c:7d:02:b2:6f:50:17:21:93:bd:c1:ba: d7:cb:a5:a7:8f:31:7d:17:32:4b:61:bf:cf:00:95:b4: 50:9d:28:c5:e1:d6:bd:ab:03:02:97:a1:75:bd:c0:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:f0:1e:96:40:35:59:18:0a:36:32:2f:f1:51:d9:04: ec:8f:a6:2a:29:75:ce:c5:50:17:ad:a7:24:9d:7f:e3: 3a:fc:2c:39:35:d8:8a:0c:b4:f2:84:76:e8:25:90:42: ad:ac:d3:f5:79:94:d3:f8:ea:26:fc:17:9f:ac:c4:2c: 37:eb:33:71:38:33:8d:01:96:79:78:37:88:47:a0:bc: 93:89:2a:36:89:5a:46:be:e1:e5:7e:b2:48:07:1e:32: d5:4e:94:d7:c0:48:da:75:f9:21:c5:dd:3c:c1:d3:cd: 91:db:7f:e5:d1:43:f6:c1:79:1f:50:ac:29:64:89:d0: db:df:ac:63:38:21:e0:db:ff:e6:e2:ad:a8:e4:3f:53: 67:a6:7b:c2:59:60:ea:d1:b7:f7:a4:13:0c:4d:60:a8: 39:d4:e4:dc:75:b6:87:8c:aa:51:50:13:f1:78:ca:91: e0:53:f4:45:07:f8:b4:9e:1e:ef:6e:f8:28:ad:02:34: c5:0f:f1:16:f6:a9:0f:57:c3:27:76:4b:3f:d9:2b:d3: d6:a5:0a:ec:59:46:31:b0:2d:94:f1:bf:b9:13:56:4b: 1b:8e:9e:44:87:2a:dd:64:17:c8:a6:d0:74:1e:29:a1: 28:60:93:0e:82:73:b2:dd:24:6f:cf:19:f2:2e:1b:1a Fingerprint (SHA-256): 0A:75:5A:13:BC:66:6F:F1:2A:06:7E:C2:A2:60:18:51:2C:0F:9A:86:46:56:B3:C7:D4:23:30:50:14:CE:AE:86 Fingerprint (SHA1): ED:74:A6:80:D8:B4:DB:03:C8:41:E2:D7:FE:BB:8C:C6:B5:D7:89:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2333: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2334: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191423 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2335: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2336: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2337: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2338: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191424 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2339: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2340: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2341: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2342: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191425 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2343: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2344: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2345: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2346: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128191426 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2347: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2348: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2349: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2350: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128191427 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2351: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2352: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2353: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2354: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2355: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2356: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #2357: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191423 (0x433ed5bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:37 2025 Not After : Thu Nov 28 11:16:37 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:05:6b:64:8e:74:d0:66:6d:42:06:10:5c:f4:58:c3: 61:af:fe:3b:c8:11:f0:61:13:ec:9b:08:6c:ef:95:fe: b1:4c:46:b4:e5:c1:f0:b9:6c:c2:e3:74:6d:d2:b8:8a: e4:a4:34:1d:4d:12:1e:5c:e0:40:18:49:79:d4:7d:36: 51:c1:46:a6:ea:db:43:1c:40:70:c9:94:21:57:72:bd: 4a:65:cd:d6:8f:a8:a7:4c:43:35:97:d9:73:30:65:e5: 9a:91:ba:c1:5c:65:74:75:46:c7:4f:9f:ef:a2:e9:71: 5f:af:4a:72:20:a0:cd:3d:60:74:ae:7c:f3:3c:1e:01: 00:df:54:d8:d1:37:34:b5:9a:94:5d:f9:27:76:b0:8b: 5f:a3:23:9b:e3:50:48:7f:3f:4f:0b:e3:40:96:15:dc: 31:00:84:2e:16:9c:07:19:ca:a4:9a:91:4f:59:00:0b: a0:85:8c:53:db:d1:d4:0d:3a:2a:cf:78:58:56:3b:58: 44:7a:17:db:66:7d:a3:df:18:4c:6d:ef:42:5b:de:ae: 1f:1c:a8:6b:f1:d1:dc:f9:24:41:e2:eb:d3:bd:60:8b: c5:0f:7e:06:d6:61:51:5c:b1:71:d7:e4:ea:04:91:19: 1f:c1:55:9d:3a:ca:00:f1:eb:61:ee:ce:07:79:10:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:9a:c3:b6:df:ab:a2:8f:5b:d2:7a:40:54:39:98:18: 70:57:9f:22:40:cd:db:92:c8:88:a5:ef:2c:27:43:27: df:e0:f9:65:76:ab:58:8f:3c:b4:39:62:41:eb:93:68: 23:26:c1:b3:86:ee:98:a9:4c:8c:5a:4d:10:56:10:39: 7e:0b:12:92:cb:8f:ba:83:f6:ac:2d:29:56:38:b2:58: dd:17:c7:7e:b6:ef:e2:2e:fb:9f:9c:2a:c7:cf:0b:e1: 4c:39:7a:86:d0:cd:2c:a5:32:b5:a4:d6:0e:e8:99:bb: 43:70:6c:0c:23:34:1f:2b:05:24:c3:ba:26:6e:8d:66: 4a:6d:6f:24:19:09:94:59:35:3a:d6:32:a9:41:19:97: 8a:82:93:92:0c:98:96:5f:b4:fb:78:3e:c7:58:77:6e: ec:17:18:87:cd:37:23:55:44:3d:00:6f:60:f1:5b:97: a9:0e:cc:7f:b5:13:28:0a:69:77:98:b8:07:2a:75:36: 1a:ce:51:14:c5:52:f3:a4:d5:cd:f0:c8:e1:48:e2:d8: fd:b9:e6:43:be:d8:05:ce:90:61:0a:7e:ca:00:8d:4b: 42:73:50:68:03:e6:20:df:ca:34:4f:eb:a3:fc:a6:68: ec:1e:71:21:db:67:4b:bc:46:4d:14:1f:a8:73:55:fc Fingerprint (SHA-256): B3:0A:99:36:7F:F4:6A:7E:F8:DD:04:91:5C:FB:5E:F0:D3:68:34:48:58:E3:85:DB:28:3A:24:AA:78:3C:A1:13 Fingerprint (SHA1): 32:7B:03:2F:1F:9F:7B:71:15:F2:A8:D6:39:58:5F:12:9C:E3:89:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2358: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2359: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191424 (0x433ed5c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:38 2025 Not After : Thu Nov 28 11:16:38 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c7:5b:52:c2:e5:cb:b9:58:ea:eb:31:7d:2b:8b:2f: 74:2c:a8:e7:16:bf:0c:81:b6:7e:89:85:f1:7a:12:1a: 65:cb:67:c1:e1:97:bb:44:b7:36:64:65:6d:a4:31:e9: 5a:96:95:06:32:8f:f3:f2:fb:49:ef:e0:df:e4:1c:bc: b5:61:6c:4b:7c:fc:8f:9a:ea:1f:91:c7:07:8f:8d:88: e9:1c:c7:08:28:76:c7:ae:08:91:57:31:1a:14:4d:87: 2b:db:4e:46:6d:3f:b0:99:2b:59:be:8b:9c:30:80:bb: de:74:0b:6a:d2:76:56:d3:d6:fb:eb:c8:d4:8b:9d:87: d2:b2:2b:f3:27:7e:67:32:67:3e:da:e7:d5:2a:2d:e5: a9:a1:0a:19:8d:ad:3c:11:f0:21:04:c5:40:e4:5d:bf: fc:16:41:40:9a:da:8d:18:94:ac:62:f2:8c:73:0e:5b: 4d:00:70:dd:72:0a:97:ed:b1:67:94:e3:94:09:0b:f7: 75:9a:88:65:a2:7c:12:ed:8b:e6:19:29:d5:45:ed:be: 7e:a4:71:ed:96:d5:f7:1b:e9:9c:96:0b:e8:1d:88:06: 2f:c9:79:f8:99:09:a2:d6:67:26:88:0d:83:1a:c8:8c: 22:10:f1:e1:4f:5e:ad:33:83:68:5c:63:3d:b0:b7:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:ab:d4:c1:cb:e6:d1:50:0f:ce:10:1d:cb:d2:c9:d8: a0:40:c6:4d:b8:b2:1b:c8:74:f0:79:ca:16:c8:be:9e: 41:74:65:6c:83:b0:8b:2d:a2:c2:9c:1e:15:7f:82:5a: 47:c5:45:cd:c3:a9:fb:3d:9f:92:0d:35:59:d1:69:12: 39:f1:2b:69:92:90:70:7d:27:5b:ee:8a:f3:d7:fa:c9: 7c:05:da:46:2c:29:57:97:26:14:17:c6:f8:d6:24:5d: 3f:4c:de:0a:97:c9:86:97:3c:e7:6b:51:24:83:77:eb: cf:a1:63:84:0c:be:e0:1d:66:f9:7e:8a:65:fa:41:6a: 3d:2d:72:ac:13:fc:9c:f9:f2:f5:89:2c:4a:7a:09:7b: 19:e2:94:ce:27:41:7f:67:3c:94:32:f8:fd:30:85:30: f1:e9:10:df:2f:db:87:4e:4b:01:72:11:ff:17:13:cd: e4:30:7e:b3:4a:5f:72:a3:64:90:6e:72:b6:23:03:d4: 60:c1:72:12:bb:ad:54:3c:07:12:ea:e1:82:40:90:ed: cc:4f:c0:68:56:40:a2:73:a6:10:3b:34:e1:87:74:1e: 64:b0:45:65:aa:e5:69:60:10:1b:02:29:6f:30:9a:44: 16:bf:16:20:de:60:07:65:46:ed:07:6b:74:47:21:4a Fingerprint (SHA-256): 42:40:AF:00:AC:EB:C8:1D:78:72:90:A8:A3:06:26:74:B0:8A:8F:A4:25:BE:E4:84:BD:E5:C2:27:D9:41:96:D9 Fingerprint (SHA1): D5:6F:00:69:4B:E3:3B:D6:96:B5:E8:EC:58:7D:3C:0E:25:0A:5C:37 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2360: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2361: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2362: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191425 (0x433ed5c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:16:38 2025 Not After : Thu Nov 28 11:16:38 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:3d:63:df:26:16:05:1a:ce:d5:08:84:96:40:e1:7f: e8:31:f8:58:ac:85:46:10:46:ce:a9:29:5e:02:67:96: c2:f2:1f:f7:57:b7:70:78:1a:01:a7:1e:35:66:dc:a8: 50:4c:03:f0:3a:72:b1:11:a3:be:c3:01:16:13:e9:b5: 3d:04:0c:fd:c5:c3:96:45:33:41:13:f3:d0:6f:b2:ab: f5:7b:00:52:8a:a5:95:dd:ff:64:70:e0:4d:38:ae:b0: 15:9a:3e:49:76:e3:f4:96:28:3d:6d:6c:e0:db:32:4c: dc:e1:b2:3d:c8:89:49:3d:09:fe:f0:e0:2d:1e:74:18: ee:a4:7d:94:18:76:7d:5e:aa:c4:06:c8:87:05:81:8f: a7:0c:5e:63:aa:25:f6:86:f1:0d:50:90:31:07:42:a3: a4:5a:1a:e5:8d:c2:2b:b7:57:a3:b1:d4:9a:4f:38:e1: 9f:f5:b7:e7:60:0c:95:69:01:82:39:d0:63:e4:71:d2: 36:88:8d:15:cd:f5:e8:9a:54:69:0a:c5:b3:59:f7:8d: b6:96:f6:53:ed:c2:f1:b0:1d:a1:dc:ba:70:e3:89:3d: 3a:78:35:7b:44:45:22:a6:c4:34:01:30:f3:39:1d:4f: 8a:c2:3d:58:51:9b:12:bf:1e:65:7c:d7:60:7a:d8:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:7f:93:dc:37:63:55:3d:8c:27:6e:65:96:8c:3f:4b: 08:7c:33:d6:7c:ff:a2:f1:dc:41:19:89:a6:3c:60:cb: 45:f1:c7:ee:07:10:5f:c8:fe:ba:bd:49:9d:a8:fc:20: ad:a6:7d:a1:63:0c:d3:fd:e6:65:a3:c6:03:ee:8c:7f: ec:b3:e3:7f:9d:e0:81:b8:0b:83:0c:a1:de:89:97:81: 2d:61:be:b4:83:f2:76:9b:a2:63:ca:f4:c0:78:15:03: 69:01:4c:a6:65:91:ae:67:1f:d2:01:35:ab:af:a1:9e: 72:ad:54:cb:5f:fe:fc:df:66:c0:58:6e:e6:0d:8e:9c: f4:e7:9b:6a:9b:06:c6:82:48:c7:3e:f4:b9:4e:10:1f: 7e:b5:2a:12:26:aa:b9:95:14:df:69:4f:fb:6e:91:5c: 85:d3:6c:c8:ed:ee:27:ba:bc:7c:26:2e:54:a4:4a:53: 18:00:ba:97:4a:8d:09:15:b0:0a:c2:24:73:88:52:1d: 83:1a:1d:dc:cb:80:03:14:dd:37:3d:01:8e:54:e7:bf: 55:c4:93:c8:d7:89:67:d7:b8:38:60:36:03:de:d8:d0: 83:e3:c6:e6:7e:6f:76:36:39:08:15:36:32:07:f8:41: be:0f:2a:6a:67:44:f9:79:02:85:45:b2:f1:97:79:40 Fingerprint (SHA-256): 96:6B:ED:81:91:43:E9:15:11:E9:B9:69:D6:0E:D4:C8:17:F8:8B:99:67:04:C7:DD:6A:9B:42:96:5A:E7:34:F1 Fingerprint (SHA1): 83:59:25:03:96:37:E2:C8:18:C1:E2:0D:2B:42:5C:99:43:DD:4F:77 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #2363: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2364: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191428 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2365: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2366: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2367: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2368: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191429 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2369: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2370: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2371: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2372: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191430 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128191061.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2373: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2374: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2375: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2376: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191431 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2377: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2378: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #2379: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191428 (0x433ed5c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:16:41 2025 Not After : Thu Nov 28 11:16:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:36:31:40:54:f0:fb:85:8e:df:fe:42:c3:cd:60:dd: a3:f9:c1:51:a0:6c:e5:ae:6c:3f:b7:2f:54:40:2c:72: c4:29:3b:1d:86:be:66:26:d3:9a:18:d9:50:c3:9a:28: 38:90:52:57:18:62:ea:25:8c:fe:52:f1:6c:ab:23:67: 4b:6c:46:35:94:57:db:35:30:18:d6:2d:4c:32:da:77: 35:cf:10:9e:9b:83:4b:f5:eb:15:07:5c:7e:40:e9:3a: 0d:25:2b:05:3f:4d:b9:a5:00:56:15:c6:6a:f5:14:9c: 4b:c8:a3:09:a2:7c:0c:fc:da:56:78:b3:0e:9f:30:25: 3e:3d:d4:09:7c:ec:9d:4d:8c:e0:17:ee:dd:a6:d2:e1: dc:e2:0e:61:6e:fe:3e:93:47:2f:f9:6f:09:00:dc:b7: ba:ce:ae:d7:f7:47:7c:52:52:3d:70:ac:1c:64:c7:14: 3e:90:29:54:a8:c5:91:6e:7a:30:14:a8:a2:9a:b9:a4: 0a:5a:8f:6b:e4:19:08:13:82:5f:33:cc:3f:2e:63:2b: fc:6d:b1:de:ac:dc:ae:3b:d0:cd:6e:13:d6:ef:96:68: 4d:14:44:07:46:4d:08:19:f9:93:09:bc:4a:35:42:79: 29:fe:cf:bb:b2:fc:f9:83:bb:bc:3e:3a:a8:8a:e9:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:de:93:31:1d:bc:75:a5:92:65:30:a1:3e:52:f7:b7: 58:a6:09:bd:65:c5:ec:8e:72:42:06:9e:a1:2b:a4:b6: 31:87:a3:3d:13:04:ba:78:f4:90:7c:9c:3b:81:fa:3a: 79:be:11:dc:ec:b7:62:9a:b9:7c:f0:fa:bb:93:3b:60: 4e:f2:18:bf:94:d4:fe:dc:f3:03:6f:60:5e:7c:0d:d3: 38:d8:7f:f1:0d:c9:e0:20:48:0d:49:73:68:69:e2:85: bc:0a:13:37:8c:ef:ca:c6:e6:30:8a:70:35:41:1d:a9: 5c:86:3d:75:98:2d:58:f4:2f:b3:f7:b1:b3:d5:18:da: 4c:6f:19:7d:cd:33:c1:b8:4b:1c:47:24:ce:73:50:96: 21:02:9c:85:34:58:3c:49:a4:b3:28:44:d2:43:60:f9: 75:b4:52:2e:37:e2:17:44:d0:a2:c3:b9:85:52:35:0d: 35:25:fc:5c:d2:b1:98:ee:3a:bb:d0:71:8c:e8:ab:52: 72:1f:b2:5a:08:11:39:63:79:1a:b8:3b:84:43:76:e3: 19:aa:5e:af:5a:5b:e5:00:b3:ab:d5:bb:aa:9f:1d:c4: 9b:85:93:49:45:28:c8:e0:84:a7:73:c0:e5:dc:ba:8b: f2:92:02:27:53:8f:fd:26:c5:ba:f1:f9:c3:9b:4f:3c Fingerprint (SHA-256): 99:1F:71:6F:67:84:C3:0A:DD:BE:C1:39:C1:2C:30:4B:0E:07:F8:00:B0:EC:62:71:14:54:7D:5A:86:D6:1F:E5 Fingerprint (SHA1): 39:EC:6D:A3:72:ED:D3:68:F6:55:00:DE:89:BB:AA:3B:33:06:AD:7B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2380: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2381: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191432 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2382: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2383: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2384: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191433 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2385: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2386: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2387: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2388: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191434 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2389: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2390: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191435 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2391: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2392: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2393: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2394: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2395: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191436 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191062.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2396: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2397: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2398: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2399: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191437 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2400: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2401: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2402: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191432 (0x433ed5c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:16:44 2025 Not After : Thu Nov 28 11:16:44 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:9d:ef:97:30:a2:d3:d4:c8:13:4b:2f:cf:6b:79:92: ce:9a:3f:2d:34:3c:65:4c:40:e4:70:23:92:64:40:39: e5:ea:43:fd:62:23:08:75:c3:85:76:e5:46:6f:10:d6: 39:c1:37:7d:56:45:1e:67:55:03:4b:51:3d:57:a8:e7: 8a:30:ed:af:29:f7:d5:fb:1d:b3:20:7c:df:fe:e7:99: a1:9d:e8:58:2a:c1:04:35:f6:bb:eb:f7:83:a1:bf:81: 74:f5:59:48:54:67:c0:34:25:e7:4e:32:ad:e5:11:f8: eb:fb:9f:06:35:1d:37:90:30:7d:52:3a:1c:2d:b7:a4: ec:80:3b:b0:8c:5c:8c:1b:33:9d:bc:89:b1:7b:49:33: 8e:18:4f:a8:27:65:0f:a7:56:c9:96:65:79:d6:98:7d: fa:a5:18:e7:8d:32:06:81:1a:b9:22:20:32:b6:91:4b: 98:1f:d0:33:24:b1:2c:49:c0:c0:fc:75:22:a7:bf:f5: b0:20:78:fc:3b:85:c2:13:b8:26:e6:63:6d:10:7a:af: db:a3:e7:61:44:d6:28:a1:46:6c:23:04:7e:db:ea:0e: d5:09:80:3c:05:5e:4b:0b:8e:88:de:fd:d6:37:85:5d: 7c:1f:7e:16:d9:a5:b4:db:58:7d:a1:29:36:0c:06:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:7b:89:cc:8e:aa:64:b2:c5:ed:b0:9f:7a:30:35:98: 2c:4a:ae:33:ee:69:94:e8:89:b7:91:a1:bf:ea:f9:5f: 13:e6:65:e5:bf:72:4b:2a:9f:6d:61:9b:b6:0a:45:d1: c7:64:c7:de:58:d2:12:14:f5:08:97:a4:3d:8e:12:11: 27:57:56:0d:06:11:8c:8d:1c:94:a1:c3:93:15:fc:1a: c2:83:c2:30:ec:b0:3f:73:16:b1:5a:05:cf:7b:67:6c: 15:21:79:f0:bb:87:fd:d0:42:81:15:80:27:e9:43:a9: 4c:11:1c:75:a4:33:12:50:c9:38:6a:fb:da:29:cc:8b: 7b:fa:84:3b:13:d0:75:96:4d:d9:4b:99:1b:12:f7:d2: 45:27:79:a0:6c:ed:3a:a7:08:5c:5d:6c:4a:cf:6b:54: a2:8c:8f:ea:39:64:fb:e2:20:25:8f:c5:c7:27:4c:61: 65:05:5b:37:2b:0f:5f:ee:3c:71:57:fd:56:ad:e5:00: 29:5a:8c:fc:4f:61:18:b9:9e:70:f7:ad:96:14:06:b0: f2:18:a3:a5:87:72:ad:49:81:f1:6b:44:47:e8:15:78: 7c:71:2a:a8:81:d6:9f:65:d5:43:e0:67:79:ff:62:e5: 0e:d9:15:c8:c4:70:13:ad:4c:85:bf:a2:9d:46:6e:62 Fingerprint (SHA-256): 52:B5:37:14:F3:A2:F1:F2:50:C4:39:E9:13:97:AF:88:C6:35:19:9F:AE:46:73:67:DB:36:BC:FE:0E:90:A8:7A Fingerprint (SHA1): 45:16:6E:F3:CE:65:C8:2B:25:BB:4F:6D:F5:FE:24:53:2E:A8:BD:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2403: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191433 (0x433ed5c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:45 2025 Not After : Thu Nov 28 11:16:45 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:62:99:85:9d:cb:1b:e7:9c:02:88:c2:ba:11:d1:f9: 33:03:aa:eb:5b:23:c3:48:8c:f8:9a:8e:dd:27:db:48: 99:16:75:4d:25:b6:88:8b:92:6b:7f:12:32:bb:0b:01: e9:b9:3a:42:3a:04:0a:42:c6:fd:96:7e:05:93:3b:ed: 59:73:1e:14:89:a4:b8:35:7a:3d:95:56:dc:78:cf:7f: 1f:a3:10:fb:ac:be:3c:34:b3:18:68:62:78:14:e2:10: e9:7a:26:85:69:7d:d5:66:e1:da:a8:25:c5:7c:39:53: 56:b8:da:40:30:d2:54:91:04:9b:22:8a:c4:f1:4b:30: a9:3c:66:7e:68:e3:e7:48:70:34:fa:f2:7a:c2:d0:08: 55:a5:a7:45:f6:86:ea:fd:57:f0:cc:cf:b2:ac:7b:cd: b8:fb:35:f8:ee:a4:80:27:ca:93:bf:48:ad:47:af:e5: 0b:b0:ca:fc:04:ac:d9:3b:59:4e:41:4d:15:03:af:41: de:19:ef:c2:39:2e:9b:16:92:e1:8f:3d:4c:4f:00:4a: 36:14:37:86:aa:ea:f6:87:47:d7:23:34:1f:35:52:04: 10:3a:05:c6:a3:9a:e9:3a:76:64:9d:5a:6e:ff:6c:cc: 30:5c:03:a2:62:9a:44:65:e9:6d:c7:72:b4:a2:33:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:06:6a:25:15:99:50:ef:eb:8e:93:0b:12:d1:31:8b: 0a:77:38:18:da:1d:1a:fb:6b:5d:21:2c:f9:59:e4:a1: 93:6c:2a:49:07:48:d2:aa:50:02:fa:80:53:64:e8:bc: 42:ab:02:06:9e:94:ad:4f:05:89:03:65:36:6e:75:ce: 8f:0b:30:41:a5:51:b4:f9:de:25:3f:2c:54:2d:07:9b: 8a:db:87:58:aa:f1:9f:23:a3:ad:d5:de:d2:08:6e:41: 15:c2:f7:44:35:c7:5f:e4:2d:01:d6:ed:68:55:62:de: be:bc:ae:69:b4:17:5e:11:70:f9:eb:d7:35:08:4e:a7: 98:27:55:7e:3d:80:89:46:d8:d9:0e:d2:ec:14:c1:58: 2b:b6:aa:02:ed:f2:17:fd:58:f0:3b:fc:a5:e1:ed:0c: 2b:ec:51:29:59:c9:92:a4:09:8c:bf:b9:99:29:5f:c3: 54:9e:27:ba:dd:20:f1:98:51:58:a0:11:4c:b7:b6:cc: c4:94:da:b2:27:f0:c2:2d:da:fa:ae:2d:69:3f:32:90: 68:9f:87:35:d6:da:78:e9:2b:a4:a4:45:cb:a3:83:4b: b7:82:b3:1f:08:b2:f2:cd:d2:25:64:e6:a2:dc:68:91: af:5f:b0:af:cf:3b:09:74:23:12:ad:e8:84:05:c0:01 Fingerprint (SHA-256): 99:79:29:2D:85:53:89:CE:A2:F8:24:85:F4:0D:A8:50:AB:9E:06:F2:17:25:E8:C3:42:72:89:81:44:91:50:E6 Fingerprint (SHA1): C0:40:75:68:3D:BC:7F:6D:41:EF:3A:66:CC:2A:D1:FF:5C:5E:B2:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2404: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191433 (0x433ed5c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:45 2025 Not After : Thu Nov 28 11:16:45 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:62:99:85:9d:cb:1b:e7:9c:02:88:c2:ba:11:d1:f9: 33:03:aa:eb:5b:23:c3:48:8c:f8:9a:8e:dd:27:db:48: 99:16:75:4d:25:b6:88:8b:92:6b:7f:12:32:bb:0b:01: e9:b9:3a:42:3a:04:0a:42:c6:fd:96:7e:05:93:3b:ed: 59:73:1e:14:89:a4:b8:35:7a:3d:95:56:dc:78:cf:7f: 1f:a3:10:fb:ac:be:3c:34:b3:18:68:62:78:14:e2:10: e9:7a:26:85:69:7d:d5:66:e1:da:a8:25:c5:7c:39:53: 56:b8:da:40:30:d2:54:91:04:9b:22:8a:c4:f1:4b:30: a9:3c:66:7e:68:e3:e7:48:70:34:fa:f2:7a:c2:d0:08: 55:a5:a7:45:f6:86:ea:fd:57:f0:cc:cf:b2:ac:7b:cd: b8:fb:35:f8:ee:a4:80:27:ca:93:bf:48:ad:47:af:e5: 0b:b0:ca:fc:04:ac:d9:3b:59:4e:41:4d:15:03:af:41: de:19:ef:c2:39:2e:9b:16:92:e1:8f:3d:4c:4f:00:4a: 36:14:37:86:aa:ea:f6:87:47:d7:23:34:1f:35:52:04: 10:3a:05:c6:a3:9a:e9:3a:76:64:9d:5a:6e:ff:6c:cc: 30:5c:03:a2:62:9a:44:65:e9:6d:c7:72:b4:a2:33:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:06:6a:25:15:99:50:ef:eb:8e:93:0b:12:d1:31:8b: 0a:77:38:18:da:1d:1a:fb:6b:5d:21:2c:f9:59:e4:a1: 93:6c:2a:49:07:48:d2:aa:50:02:fa:80:53:64:e8:bc: 42:ab:02:06:9e:94:ad:4f:05:89:03:65:36:6e:75:ce: 8f:0b:30:41:a5:51:b4:f9:de:25:3f:2c:54:2d:07:9b: 8a:db:87:58:aa:f1:9f:23:a3:ad:d5:de:d2:08:6e:41: 15:c2:f7:44:35:c7:5f:e4:2d:01:d6:ed:68:55:62:de: be:bc:ae:69:b4:17:5e:11:70:f9:eb:d7:35:08:4e:a7: 98:27:55:7e:3d:80:89:46:d8:d9:0e:d2:ec:14:c1:58: 2b:b6:aa:02:ed:f2:17:fd:58:f0:3b:fc:a5:e1:ed:0c: 2b:ec:51:29:59:c9:92:a4:09:8c:bf:b9:99:29:5f:c3: 54:9e:27:ba:dd:20:f1:98:51:58:a0:11:4c:b7:b6:cc: c4:94:da:b2:27:f0:c2:2d:da:fa:ae:2d:69:3f:32:90: 68:9f:87:35:d6:da:78:e9:2b:a4:a4:45:cb:a3:83:4b: b7:82:b3:1f:08:b2:f2:cd:d2:25:64:e6:a2:dc:68:91: af:5f:b0:af:cf:3b:09:74:23:12:ad:e8:84:05:c0:01 Fingerprint (SHA-256): 99:79:29:2D:85:53:89:CE:A2:F8:24:85:F4:0D:A8:50:AB:9E:06:F2:17:25:E8:C3:42:72:89:81:44:91:50:E6 Fingerprint (SHA1): C0:40:75:68:3D:BC:7F:6D:41:EF:3A:66:CC:2A:D1:FF:5C:5E:B2:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2405: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2406: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191438 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2407: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2408: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2409: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191439 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2410: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2411: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2412: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2413: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191440 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2414: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2415: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191441 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2416: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2417: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2418: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2419: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2420: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191442 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191063.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2421: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2422: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2423: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2424: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191443 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2425: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2426: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2427: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2428: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191444 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128191064.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2429: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2430: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2431: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2432: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191445 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2433: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2434: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2435: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191438 (0x433ed5ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:16:48 2025 Not After : Thu Nov 28 11:16:48 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:ee:d8:ad:84:96:d6:48:be:d8:2d:3b:9c:d8:e1:27: f4:99:82:d3:10:a6:fd:a9:35:24:3a:68:5b:42:9e:74: c5:59:31:f6:19:2b:fd:7d:23:a5:58:ce:ef:cf:91:89: 55:36:69:87:f9:ef:9b:af:2f:56:67:ee:ae:3e:c5:a4: 2c:ab:aa:97:05:2b:a4:e4:fb:a0:62:ec:e0:11:d6:18: 5c:bf:58:66:e4:52:e6:f9:16:d5:c3:84:2f:82:51:5f: aa:30:3c:11:d0:02:dc:97:24:b6:78:40:48:f1:e2:5c: e4:5b:f6:8f:18:fd:19:90:34:86:1d:39:01:15:5b:71: f0:52:fa:5a:b0:17:4d:4f:26:27:96:d7:a7:18:f6:de: 07:87:24:f8:12:23:a2:32:34:af:0a:44:ef:8c:03:4c: e3:16:2a:15:2d:82:50:79:8c:c7:49:47:1f:8e:3d:ad: 76:88:de:b0:55:0a:db:db:ba:a7:d6:f0:f1:ff:04:0f: 2e:dd:12:27:c9:c2:f8:6f:1a:3b:ff:be:69:8b:f3:e2: 24:db:5c:5e:52:bd:1b:e5:cb:e8:38:d6:ab:f8:a3:42: dd:7e:51:be:d3:e7:b1:6b:21:77:ae:f1:3f:42:f4:f5: 36:a7:f7:3a:1d:dc:e1:75:df:38:81:ef:84:b5:6a:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:50:ed:f7:eb:f6:e6:34:85:21:ee:82:4f:20:7e:ea: 93:5f:1c:2e:b8:64:21:c5:44:06:0c:e9:1c:84:02:95: b2:12:8c:e4:77:68:72:4a:85:b4:06:37:37:37:b8:44: 68:f6:24:f4:7e:bb:f2:71:5a:40:6d:84:ad:94:05:93: d5:ff:99:33:3c:64:61:02:b8:e7:b7:27:60:ec:d8:ee: 57:58:75:c0:5a:be:34:eb:37:e3:0a:3f:6f:55:b3:70: 01:05:77:70:03:44:7e:64:d7:74:55:10:23:69:33:7c: c9:41:d1:62:9f:74:02:6f:8d:66:36:91:e8:68:a7:d8: 94:92:f6:5c:06:d4:5f:ef:4b:a1:a5:2a:be:bf:8a:d1: c3:9d:8a:f0:1f:1c:d1:56:3d:4c:a9:b7:6f:56:8b:34: ff:4d:0d:37:1c:55:98:0c:62:1e:26:92:d6:50:7e:f9: e5:49:7e:62:70:d5:b5:60:bf:53:96:d7:00:8f:cf:b7: 3d:12:5f:ff:2d:f0:5d:68:d3:17:eb:74:b1:70:a0:5a: da:3a:b1:0f:18:ef:3d:df:5a:6b:5d:a7:87:bf:f5:cb: 7d:ac:fe:91:02:77:ca:28:7d:8f:fc:e6:6a:cc:dd:42: ca:1f:4f:2b:c1:0d:99:2c:6b:65:2e:f1:50:6c:91:c7 Fingerprint (SHA-256): C1:A9:26:83:E0:A2:2E:F0:22:00:4F:7F:33:9C:54:FB:14:47:8B:83:A3:F2:D6:2C:EF:28:09:D2:38:61:E6:DF Fingerprint (SHA1): E1:5C:D1:5F:94:DF:13:EF:69:A1:D8:EE:BA:28:7D:E6:F6:34:DE:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2436: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191439 (0x433ed5cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:49 2025 Not After : Thu Nov 28 11:16:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:8e:15:f2:73:1f:d2:7f:0f:5f:10:90:5b:4a:3d: 5d:ff:47:e6:7c:a7:71:e2:55:28:be:d2:cc:a5:7e:86: 02:9b:a6:5c:19:e6:75:44:ea:bb:d4:d6:fb:bf:21:95: fc:8e:ac:1f:09:ca:59:c9:31:da:98:2d:e9:f3:49:9c: 97:6e:09:56:1d:87:7d:46:51:30:b3:b0:30:5c:78:81: 56:47:a9:be:89:26:d5:04:a0:78:f1:af:4f:b5:19:bb: 70:51:63:6d:dd:d4:ff:81:81:aa:2e:90:3e:b0:04:90: 2c:0f:89:38:78:9e:7b:52:f3:c9:69:05:49:17:72:55: 03:8a:e2:61:f8:be:ff:ab:68:41:ef:be:55:ff:ed:20: b6:b0:41:c7:ff:82:9d:19:c9:bc:a0:4e:34:05:12:01: 6d:05:58:e6:0e:a5:5c:e6:84:00:26:91:9a:ba:6c:40: dc:fb:a7:7d:59:30:14:b9:3c:19:cc:a3:45:80:ea:31: 18:a3:bc:d1:c3:5c:d7:cd:c7:b3:06:fb:ce:b6:bc:51: 81:76:15:23:a9:01:f9:bc:da:5f:ce:71:ce:bc:a7:a7: d5:66:49:36:de:f1:e5:1a:bf:66:25:ae:f9:a3:73:78: 41:90:d8:39:08:fb:b6:41:db:be:06:33:85:7d:5a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:52:a4:47:f8:bc:01:11:f3:ef:15:7f:2f:18:fe:31: bb:3d:8b:3e:88:8a:56:ab:89:eb:e7:26:a5:cc:b8:91: e0:15:98:0c:0b:75:8b:52:ee:ee:be:61:b9:a3:7f:68: 99:3b:5c:0d:e2:ce:13:c7:4d:a3:3d:e6:81:90:ee:03: 95:58:27:3f:0d:cb:36:5f:8e:34:1b:1d:68:bb:cf:b9: 30:20:65:ac:30:93:d5:08:30:9c:2e:d0:0d:57:3e:cf: aa:d5:5a:3a:06:bc:1f:a2:a6:68:1a:51:44:93:97:18: 40:54:62:8e:d6:3f:6e:28:67:29:1f:dc:20:87:cf:12: 54:b2:36:bb:73:2a:5f:19:eb:82:28:e1:15:09:43:0d: 45:2e:5b:94:95:ea:73:58:9c:76:dd:4f:d9:e6:fe:4d: 4a:a0:c5:fe:1f:c0:4e:05:e0:1d:84:1a:38:6f:18:84: 88:5d:c8:1a:67:58:57:31:35:5c:b2:d6:71:6d:8d:19: 65:9e:33:89:db:b3:32:a4:14:39:81:96:ed:95:d2:f0: 7a:ad:7f:7b:7a:4f:da:e7:81:ba:d6:4f:e3:4a:02:47: be:01:0f:c1:63:1b:55:e5:af:96:77:27:b0:fd:5f:62: fe:40:0c:e0:be:f1:e3:e5:dd:3a:cd:b7:3d:e7:6b:41 Fingerprint (SHA-256): 2F:1C:53:1F:2B:C8:FB:4E:DF:12:8C:34:5A:29:60:82:B1:B2:90:FA:72:52:99:7A:EE:BB:64:BA:8D:AD:41:20 Fingerprint (SHA1): 37:22:74:1B:8B:D9:05:AD:37:F9:6D:14:DC:21:71:E6:BD:1F:B5:6D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2437: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191439 (0x433ed5cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:49 2025 Not After : Thu Nov 28 11:16:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:8e:15:f2:73:1f:d2:7f:0f:5f:10:90:5b:4a:3d: 5d:ff:47:e6:7c:a7:71:e2:55:28:be:d2:cc:a5:7e:86: 02:9b:a6:5c:19:e6:75:44:ea:bb:d4:d6:fb:bf:21:95: fc:8e:ac:1f:09:ca:59:c9:31:da:98:2d:e9:f3:49:9c: 97:6e:09:56:1d:87:7d:46:51:30:b3:b0:30:5c:78:81: 56:47:a9:be:89:26:d5:04:a0:78:f1:af:4f:b5:19:bb: 70:51:63:6d:dd:d4:ff:81:81:aa:2e:90:3e:b0:04:90: 2c:0f:89:38:78:9e:7b:52:f3:c9:69:05:49:17:72:55: 03:8a:e2:61:f8:be:ff:ab:68:41:ef:be:55:ff:ed:20: b6:b0:41:c7:ff:82:9d:19:c9:bc:a0:4e:34:05:12:01: 6d:05:58:e6:0e:a5:5c:e6:84:00:26:91:9a:ba:6c:40: dc:fb:a7:7d:59:30:14:b9:3c:19:cc:a3:45:80:ea:31: 18:a3:bc:d1:c3:5c:d7:cd:c7:b3:06:fb:ce:b6:bc:51: 81:76:15:23:a9:01:f9:bc:da:5f:ce:71:ce:bc:a7:a7: d5:66:49:36:de:f1:e5:1a:bf:66:25:ae:f9:a3:73:78: 41:90:d8:39:08:fb:b6:41:db:be:06:33:85:7d:5a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:52:a4:47:f8:bc:01:11:f3:ef:15:7f:2f:18:fe:31: bb:3d:8b:3e:88:8a:56:ab:89:eb:e7:26:a5:cc:b8:91: e0:15:98:0c:0b:75:8b:52:ee:ee:be:61:b9:a3:7f:68: 99:3b:5c:0d:e2:ce:13:c7:4d:a3:3d:e6:81:90:ee:03: 95:58:27:3f:0d:cb:36:5f:8e:34:1b:1d:68:bb:cf:b9: 30:20:65:ac:30:93:d5:08:30:9c:2e:d0:0d:57:3e:cf: aa:d5:5a:3a:06:bc:1f:a2:a6:68:1a:51:44:93:97:18: 40:54:62:8e:d6:3f:6e:28:67:29:1f:dc:20:87:cf:12: 54:b2:36:bb:73:2a:5f:19:eb:82:28:e1:15:09:43:0d: 45:2e:5b:94:95:ea:73:58:9c:76:dd:4f:d9:e6:fe:4d: 4a:a0:c5:fe:1f:c0:4e:05:e0:1d:84:1a:38:6f:18:84: 88:5d:c8:1a:67:58:57:31:35:5c:b2:d6:71:6d:8d:19: 65:9e:33:89:db:b3:32:a4:14:39:81:96:ed:95:d2:f0: 7a:ad:7f:7b:7a:4f:da:e7:81:ba:d6:4f:e3:4a:02:47: be:01:0f:c1:63:1b:55:e5:af:96:77:27:b0:fd:5f:62: fe:40:0c:e0:be:f1:e3:e5:dd:3a:cd:b7:3d:e7:6b:41 Fingerprint (SHA-256): 2F:1C:53:1F:2B:C8:FB:4E:DF:12:8C:34:5A:29:60:82:B1:B2:90:FA:72:52:99:7A:EE:BB:64:BA:8D:AD:41:20 Fingerprint (SHA1): 37:22:74:1B:8B:D9:05:AD:37:F9:6D:14:DC:21:71:E6:BD:1F:B5:6D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2438: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #2439: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191438 (0x433ed5ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:16:48 2025 Not After : Thu Nov 28 11:16:48 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:ee:d8:ad:84:96:d6:48:be:d8:2d:3b:9c:d8:e1:27: f4:99:82:d3:10:a6:fd:a9:35:24:3a:68:5b:42:9e:74: c5:59:31:f6:19:2b:fd:7d:23:a5:58:ce:ef:cf:91:89: 55:36:69:87:f9:ef:9b:af:2f:56:67:ee:ae:3e:c5:a4: 2c:ab:aa:97:05:2b:a4:e4:fb:a0:62:ec:e0:11:d6:18: 5c:bf:58:66:e4:52:e6:f9:16:d5:c3:84:2f:82:51:5f: aa:30:3c:11:d0:02:dc:97:24:b6:78:40:48:f1:e2:5c: e4:5b:f6:8f:18:fd:19:90:34:86:1d:39:01:15:5b:71: f0:52:fa:5a:b0:17:4d:4f:26:27:96:d7:a7:18:f6:de: 07:87:24:f8:12:23:a2:32:34:af:0a:44:ef:8c:03:4c: e3:16:2a:15:2d:82:50:79:8c:c7:49:47:1f:8e:3d:ad: 76:88:de:b0:55:0a:db:db:ba:a7:d6:f0:f1:ff:04:0f: 2e:dd:12:27:c9:c2:f8:6f:1a:3b:ff:be:69:8b:f3:e2: 24:db:5c:5e:52:bd:1b:e5:cb:e8:38:d6:ab:f8:a3:42: dd:7e:51:be:d3:e7:b1:6b:21:77:ae:f1:3f:42:f4:f5: 36:a7:f7:3a:1d:dc:e1:75:df:38:81:ef:84:b5:6a:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:50:ed:f7:eb:f6:e6:34:85:21:ee:82:4f:20:7e:ea: 93:5f:1c:2e:b8:64:21:c5:44:06:0c:e9:1c:84:02:95: b2:12:8c:e4:77:68:72:4a:85:b4:06:37:37:37:b8:44: 68:f6:24:f4:7e:bb:f2:71:5a:40:6d:84:ad:94:05:93: d5:ff:99:33:3c:64:61:02:b8:e7:b7:27:60:ec:d8:ee: 57:58:75:c0:5a:be:34:eb:37:e3:0a:3f:6f:55:b3:70: 01:05:77:70:03:44:7e:64:d7:74:55:10:23:69:33:7c: c9:41:d1:62:9f:74:02:6f:8d:66:36:91:e8:68:a7:d8: 94:92:f6:5c:06:d4:5f:ef:4b:a1:a5:2a:be:bf:8a:d1: c3:9d:8a:f0:1f:1c:d1:56:3d:4c:a9:b7:6f:56:8b:34: ff:4d:0d:37:1c:55:98:0c:62:1e:26:92:d6:50:7e:f9: e5:49:7e:62:70:d5:b5:60:bf:53:96:d7:00:8f:cf:b7: 3d:12:5f:ff:2d:f0:5d:68:d3:17:eb:74:b1:70:a0:5a: da:3a:b1:0f:18:ef:3d:df:5a:6b:5d:a7:87:bf:f5:cb: 7d:ac:fe:91:02:77:ca:28:7d:8f:fc:e6:6a:cc:dd:42: ca:1f:4f:2b:c1:0d:99:2c:6b:65:2e:f1:50:6c:91:c7 Fingerprint (SHA-256): C1:A9:26:83:E0:A2:2E:F0:22:00:4F:7F:33:9C:54:FB:14:47:8B:83:A3:F2:D6:2C:EF:28:09:D2:38:61:E6:DF Fingerprint (SHA1): E1:5C:D1:5F:94:DF:13:EF:69:A1:D8:EE:BA:28:7D:E6:F6:34:DE:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2440: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191439 (0x433ed5cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:49 2025 Not After : Thu Nov 28 11:16:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:8e:15:f2:73:1f:d2:7f:0f:5f:10:90:5b:4a:3d: 5d:ff:47:e6:7c:a7:71:e2:55:28:be:d2:cc:a5:7e:86: 02:9b:a6:5c:19:e6:75:44:ea:bb:d4:d6:fb:bf:21:95: fc:8e:ac:1f:09:ca:59:c9:31:da:98:2d:e9:f3:49:9c: 97:6e:09:56:1d:87:7d:46:51:30:b3:b0:30:5c:78:81: 56:47:a9:be:89:26:d5:04:a0:78:f1:af:4f:b5:19:bb: 70:51:63:6d:dd:d4:ff:81:81:aa:2e:90:3e:b0:04:90: 2c:0f:89:38:78:9e:7b:52:f3:c9:69:05:49:17:72:55: 03:8a:e2:61:f8:be:ff:ab:68:41:ef:be:55:ff:ed:20: b6:b0:41:c7:ff:82:9d:19:c9:bc:a0:4e:34:05:12:01: 6d:05:58:e6:0e:a5:5c:e6:84:00:26:91:9a:ba:6c:40: dc:fb:a7:7d:59:30:14:b9:3c:19:cc:a3:45:80:ea:31: 18:a3:bc:d1:c3:5c:d7:cd:c7:b3:06:fb:ce:b6:bc:51: 81:76:15:23:a9:01:f9:bc:da:5f:ce:71:ce:bc:a7:a7: d5:66:49:36:de:f1:e5:1a:bf:66:25:ae:f9:a3:73:78: 41:90:d8:39:08:fb:b6:41:db:be:06:33:85:7d:5a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:52:a4:47:f8:bc:01:11:f3:ef:15:7f:2f:18:fe:31: bb:3d:8b:3e:88:8a:56:ab:89:eb:e7:26:a5:cc:b8:91: e0:15:98:0c:0b:75:8b:52:ee:ee:be:61:b9:a3:7f:68: 99:3b:5c:0d:e2:ce:13:c7:4d:a3:3d:e6:81:90:ee:03: 95:58:27:3f:0d:cb:36:5f:8e:34:1b:1d:68:bb:cf:b9: 30:20:65:ac:30:93:d5:08:30:9c:2e:d0:0d:57:3e:cf: aa:d5:5a:3a:06:bc:1f:a2:a6:68:1a:51:44:93:97:18: 40:54:62:8e:d6:3f:6e:28:67:29:1f:dc:20:87:cf:12: 54:b2:36:bb:73:2a:5f:19:eb:82:28:e1:15:09:43:0d: 45:2e:5b:94:95:ea:73:58:9c:76:dd:4f:d9:e6:fe:4d: 4a:a0:c5:fe:1f:c0:4e:05:e0:1d:84:1a:38:6f:18:84: 88:5d:c8:1a:67:58:57:31:35:5c:b2:d6:71:6d:8d:19: 65:9e:33:89:db:b3:32:a4:14:39:81:96:ed:95:d2:f0: 7a:ad:7f:7b:7a:4f:da:e7:81:ba:d6:4f:e3:4a:02:47: be:01:0f:c1:63:1b:55:e5:af:96:77:27:b0:fd:5f:62: fe:40:0c:e0:be:f1:e3:e5:dd:3a:cd:b7:3d:e7:6b:41 Fingerprint (SHA-256): 2F:1C:53:1F:2B:C8:FB:4E:DF:12:8C:34:5A:29:60:82:B1:B2:90:FA:72:52:99:7A:EE:BB:64:BA:8D:AD:41:20 Fingerprint (SHA1): 37:22:74:1B:8B:D9:05:AD:37:F9:6D:14:DC:21:71:E6:BD:1F:B5:6D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2441: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191439 (0x433ed5cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:49 2025 Not After : Thu Nov 28 11:16:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bb:8e:15:f2:73:1f:d2:7f:0f:5f:10:90:5b:4a:3d: 5d:ff:47:e6:7c:a7:71:e2:55:28:be:d2:cc:a5:7e:86: 02:9b:a6:5c:19:e6:75:44:ea:bb:d4:d6:fb:bf:21:95: fc:8e:ac:1f:09:ca:59:c9:31:da:98:2d:e9:f3:49:9c: 97:6e:09:56:1d:87:7d:46:51:30:b3:b0:30:5c:78:81: 56:47:a9:be:89:26:d5:04:a0:78:f1:af:4f:b5:19:bb: 70:51:63:6d:dd:d4:ff:81:81:aa:2e:90:3e:b0:04:90: 2c:0f:89:38:78:9e:7b:52:f3:c9:69:05:49:17:72:55: 03:8a:e2:61:f8:be:ff:ab:68:41:ef:be:55:ff:ed:20: b6:b0:41:c7:ff:82:9d:19:c9:bc:a0:4e:34:05:12:01: 6d:05:58:e6:0e:a5:5c:e6:84:00:26:91:9a:ba:6c:40: dc:fb:a7:7d:59:30:14:b9:3c:19:cc:a3:45:80:ea:31: 18:a3:bc:d1:c3:5c:d7:cd:c7:b3:06:fb:ce:b6:bc:51: 81:76:15:23:a9:01:f9:bc:da:5f:ce:71:ce:bc:a7:a7: d5:66:49:36:de:f1:e5:1a:bf:66:25:ae:f9:a3:73:78: 41:90:d8:39:08:fb:b6:41:db:be:06:33:85:7d:5a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:52:a4:47:f8:bc:01:11:f3:ef:15:7f:2f:18:fe:31: bb:3d:8b:3e:88:8a:56:ab:89:eb:e7:26:a5:cc:b8:91: e0:15:98:0c:0b:75:8b:52:ee:ee:be:61:b9:a3:7f:68: 99:3b:5c:0d:e2:ce:13:c7:4d:a3:3d:e6:81:90:ee:03: 95:58:27:3f:0d:cb:36:5f:8e:34:1b:1d:68:bb:cf:b9: 30:20:65:ac:30:93:d5:08:30:9c:2e:d0:0d:57:3e:cf: aa:d5:5a:3a:06:bc:1f:a2:a6:68:1a:51:44:93:97:18: 40:54:62:8e:d6:3f:6e:28:67:29:1f:dc:20:87:cf:12: 54:b2:36:bb:73:2a:5f:19:eb:82:28:e1:15:09:43:0d: 45:2e:5b:94:95:ea:73:58:9c:76:dd:4f:d9:e6:fe:4d: 4a:a0:c5:fe:1f:c0:4e:05:e0:1d:84:1a:38:6f:18:84: 88:5d:c8:1a:67:58:57:31:35:5c:b2:d6:71:6d:8d:19: 65:9e:33:89:db:b3:32:a4:14:39:81:96:ed:95:d2:f0: 7a:ad:7f:7b:7a:4f:da:e7:81:ba:d6:4f:e3:4a:02:47: be:01:0f:c1:63:1b:55:e5:af:96:77:27:b0:fd:5f:62: fe:40:0c:e0:be:f1:e3:e5:dd:3a:cd:b7:3d:e7:6b:41 Fingerprint (SHA-256): 2F:1C:53:1F:2B:C8:FB:4E:DF:12:8C:34:5A:29:60:82:B1:B2:90:FA:72:52:99:7A:EE:BB:64:BA:8D:AD:41:20 Fingerprint (SHA1): 37:22:74:1B:8B:D9:05:AD:37:F9:6D:14:DC:21:71:E6:BD:1F:B5:6D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2442: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2443: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191446 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2444: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2445: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2446: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191447 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2447: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2448: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #2449: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2450: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128191448 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2451: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2452: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #2453: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2454: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128191449 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2455: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2456: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2457: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2458: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128191450 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2459: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2460: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128191451 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2461: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2462: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #2463: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2464: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2465: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191452 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2466: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2467: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2468: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2469: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191453 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2470: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2471: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2472: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2473: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191454 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2474: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2475: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2476: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2477: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191455 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2478: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2479: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2480: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191446 (0x433ed5d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:16:54 2025 Not After : Thu Nov 28 11:16:54 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:cd:9c:31:1e:06:c7:18:f1:5a:37:83:7d:22:5c:ba: 19:58:25:0f:43:9c:fe:f1:60:e1:26:e8:95:a9:16:0e: 62:9b:2b:66:d2:dd:95:17:15:6a:85:35:de:54:8f:77: 98:d5:f4:49:f1:db:ba:fd:60:f0:92:3f:3a:0b:6c:c4: a7:92:3b:fe:e9:53:f6:6f:d1:22:f5:74:f6:1a:75:70: aa:67:ac:09:13:5d:76:50:21:f4:3a:5d:4a:06:8f:1a: 64:4c:ea:32:9a:c4:88:30:fd:97:ce:f9:d4:60:fe:96: 16:70:b6:1d:6f:f9:92:58:57:33:6d:1d:9c:6c:ab:c1: 5b:0e:c2:14:b2:aa:cb:6a:fd:9b:31:97:f1:aa:9d:a8: 27:00:db:be:73:25:7a:9d:e3:9e:4b:9d:2f:ad:5c:28: 19:24:97:f5:4d:24:88:6a:83:0e:62:16:cb:b7:63:51: d3:60:08:0b:45:f2:6c:12:27:55:dd:b0:30:63:0e:ce: 87:e4:8b:83:6e:c7:8f:0b:cb:72:35:6c:5a:3a:aa:ac: 60:e4:8c:35:df:b0:67:90:f3:77:2e:92:ae:c4:2a:17: 62:e1:ca:83:f0:f1:2e:7c:1e:58:ad:a7:65:65:0f:fa: e7:2c:5f:a8:5b:14:45:8a:fb:49:64:d8:18:13:74:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:b2:cf:66:ba:1b:15:c3:c8:6f:38:9d:2a:b1:f8:0a: ff:1e:56:a0:7b:cc:52:d3:cb:56:96:c0:8c:da:56:d3: eb:94:c5:af:2a:3d:a5:3a:5e:ac:f1:ba:3f:6c:d6:2e: e6:d8:91:e4:e2:7f:bd:63:de:02:34:ef:4c:af:94:50: de:57:e1:f1:ff:17:72:29:44:b0:79:50:57:12:54:22: 85:2f:25:e1:ea:30:67:90:e3:fd:b6:95:84:e0:6d:5a: 2d:46:8b:8e:6f:7b:fb:93:08:8b:7f:ae:03:ee:38:00: cb:0c:6a:64:b6:a4:46:c6:a1:1a:fb:59:9a:af:ca:1a: fd:22:f0:01:ca:6d:53:f3:7d:6d:45:05:3c:22:98:92: b1:70:b8:11:6c:06:29:37:8f:b9:0c:b0:ed:9e:b3:ad: e6:ad:59:6a:bd:c3:e0:c5:0b:f4:3f:81:98:de:54:33: ce:87:a5:dc:43:a7:e6:3a:b8:b2:db:a3:7b:ef:50:51: b3:58:65:aa:a3:d2:22:da:42:26:db:48:4e:f8:c7:a4: d0:dc:23:65:d5:3e:1c:e5:24:f8:32:68:80:93:7b:c5: 3f:02:c6:35:f0:e9:a2:07:de:3a:fc:96:bf:e2:b9:1e: 48:06:8e:38:58:05:e2:c9:36:60:70:af:cb:5e:b3:2a Fingerprint (SHA-256): 5D:B5:81:32:8B:DD:9A:06:79:3E:A3:D3:FB:CA:13:61:B6:A7:37:BD:79:23:6E:4C:03:C4:13:B2:13:F6:6A:E6 Fingerprint (SHA1): 4F:E0:AD:8E:D9:0D:03:6B:FA:1B:C4:81:57:30:10:8C:26:4E:0B:07 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #2481: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2482: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2483: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2484: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2485: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191447 (0x433ed5d7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:16:55 2025 Not After : Thu Nov 28 11:16:55 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:60:fc:3f:a3:6a:9c:e4:bc:8e:32:3a:1d:25:33:da: 92:8b:5f:11:db:61:d9:13:04:45:46:11:b5:7e:9d:ea: a3:f0:29:8c:8c:0d:05:16:07:3d:36:34:02:e1:6b:9a: 38:f7:fc:2e:ed:af:32:0f:85:20:30:a9:50:2e:ed:85: 4f:cb:4d:c8:0f:37:ff:50:a6:58:d3:d8:68:0c:d6:b9: bb:d8:e4:4a:1a:6f:ce:0d:14:11:7d:f0:04:c7:ef:a3: d8:36:63:a7:2f:75:bb:6f:31:e6:be:34:11:55:63:88: 2b:4d:8b:14:e7:46:bd:25:a3:54:e1:49:b7:9b:a3:34: cf:0a:a9:15:bb:59:7c:1b:a0:98:c5:46:4f:dc:6a:98: bb:b3:2b:cc:e0:ba:ec:69:1f:45:1b:97:b3:c3:97:09: 70:a7:71:3f:77:66:9f:a8:4a:8a:4a:3d:13:20:52:18: cb:bb:60:33:ad:79:ec:74:bd:ec:c6:6c:88:15:6e:9b: 88:90:a5:0f:cf:14:d5:df:7b:79:ce:69:e8:b0:4c:71: 43:9d:f1:e8:97:43:35:3f:8a:53:a5:1a:85:a3:94:54: 26:d4:94:cc:f7:10:cf:89:dc:6b:40:9f:ca:5f:07:25: fb:ca:02:df:d0:ce:24:ad:42:29:6d:65:d5:27:c7:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b9:51:a2:a6:5d:a8:85:5e:26:2a:fb:da:83:e8:d9:b7: 14:5f:e5:89:40:fe:14:8f:dd:f0:d3:b4:bc:5e:d5:8d: 6d:6d:da:ae:12:c7:17:d3:ad:84:2c:6f:5f:9e:77:9a: ce:13:3f:78:f4:a7:e1:b1:0c:58:e7:0c:e5:eb:cd:2d: 37:d8:dd:0e:68:e7:17:d1:57:70:89:ba:9a:4c:f9:78: a3:10:e9:82:fb:db:aa:2b:6d:65:44:32:6f:d9:46:84: 80:83:16:c7:a7:16:d4:97:80:8d:e8:f1:c6:2d:b8:85: 16:c3:a5:17:a8:83:ae:f4:5b:1d:73:8c:15:c1:8e:e7: db:f5:84:e0:6a:bf:46:87:6c:c3:6b:88:27:85:e4:83: 39:34:d5:d5:08:ec:ed:e4:45:3b:9b:1b:43:3d:72:00: 1b:74:5e:77:1d:52:a6:82:9d:b2:fa:20:ee:42:50:83: 98:43:91:33:52:0f:7e:90:5e:a3:3c:1c:d8:a3:9a:ca: cb:ab:24:39:c3:ca:2d:33:ab:fa:86:5d:d5:fb:de:c9: b2:25:73:95:1a:3b:16:e4:6e:8b:46:27:c6:3b:43:9d: f0:ff:22:26:38:70:be:76:8d:5c:91:91:7f:ee:9e:0c: 45:b8:69:5e:f7:eb:9a:ba:d3:7b:5d:61:38:a0:fe:ca Fingerprint (SHA-256): 63:26:0F:1D:88:CE:2F:04:19:91:0A:4D:D0:F6:59:8A:6A:2D:A3:42:F9:BE:D7:1A:74:4A:EC:F2:05:5F:DA:07 Fingerprint (SHA1): F2:31:24:0C:FC:76:A6:3F:44:F5:7D:3D:6A:6E:68:81:9C:5F:68:44 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #2490: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2491: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2492: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2493: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2494: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2495: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2496: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #2497: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #2498: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #2499: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #2500: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #2501: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #2502: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #2503: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #2504: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #2505: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #2506: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #2507: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2508: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191456 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2509: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2510: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2511: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2512: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191457 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2513: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2514: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2515: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2516: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191458 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2517: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2518: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2519: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2520: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128191459 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2521: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2522: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2523: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2524: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191460 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2525: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2526: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2527: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2528: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128191461 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2529: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2530: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2531: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2532: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128191462 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2533: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2534: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #2535: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2536: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128191463 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2537: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2538: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2539: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2540: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128191464 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2541: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2542: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2543: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191456 (0x433ed5e0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:02 2025 Not After : Thu Nov 28 11:17:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 16:d4:e5:78:fb:68:4e:fd:5d:ef:f5:8d:1e:c4:cd:f4: 23:b9:f9:6a:63:89:31:22:9d:0c:f5:c1:06:42:7c:9a: 4c:9c:10:49:0f:6c:74:cb:ef:8f:d1:aa:a4:e4:4f:61: 04:4e:43:33:8a:2a:ad:3c:e4:9b:11:80:1c:61:09:22: 79:ed:36:96:5e:9a:c1:bd:2b:d8:22:cf:fb:fa:c8:e7: 4a:d2:03:98:eb:42:2f:31:f4:b6:ac:9a:a7:df:9a:1e: 9a:20:e9:fb:a0:ae:ce:8e:94:43:1f:3d:68:63:37:2a: c6:db:0a:39:38:94:1c:86:d4:93:ba:d0:69:f9:f0:f8: 86:ef:26:ee:89:e4:ea:00:8e:cd:82:43:20:1e:4c:e1: 5b:2f:34:da:18:90:1b:09:5a:2c:13:6c:1e:38:df:ca: a9:31:e5:bc:8d:f6:d5:76:1e:a5:e0:6b:2c:43:7a:f5: 83:00:24:8f:20:67:7a:96:1e:9e:d2:ce:ee:fe:c5:97: be:4e:69:67:25:26:82:d6:08:49:a4:7e:71:63:31:7b: e6:6d:d0:ce:0a:6f:d6:a0:e5:27:40:01:3c:19:17:11: 49:ad:2f:34:a9:f2:a4:d8:ee:15:aa:a5:70:7b:5b:c1: 2a:3d:30:81:bf:de:b9:22:ad:1a:32:d6:69:52:a6:ef Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:6f:82:7c:47:da:a6:60:75:38:ef:1f:fb: 3b:11:18:80:04:78:48:e7:b9:ec:6d:65:0d:8a:f7:df: 02:1d:00:8c:12:f0:59:f3:52:0b:9a:13:64:79:ca:18: 00:97:cf:49:6c:97:9c:fd:59:56:f1:6d:f6:25:39 Fingerprint (SHA-256): 99:7D:3A:C0:E7:36:7B:0F:E0:E3:E6:4F:80:24:16:C4:E7:5F:5F:FB:B4:B3:9B:2E:EF:3E:F7:5F:11:56:2E:EC Fingerprint (SHA1): A7:17:9B:35:53:02:90:E5:96:7D:66:CB:57:AB:FE:9F:49:F6:D6:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2544: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191456 (0x433ed5e0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:02 2025 Not After : Thu Nov 28 11:17:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 16:d4:e5:78:fb:68:4e:fd:5d:ef:f5:8d:1e:c4:cd:f4: 23:b9:f9:6a:63:89:31:22:9d:0c:f5:c1:06:42:7c:9a: 4c:9c:10:49:0f:6c:74:cb:ef:8f:d1:aa:a4:e4:4f:61: 04:4e:43:33:8a:2a:ad:3c:e4:9b:11:80:1c:61:09:22: 79:ed:36:96:5e:9a:c1:bd:2b:d8:22:cf:fb:fa:c8:e7: 4a:d2:03:98:eb:42:2f:31:f4:b6:ac:9a:a7:df:9a:1e: 9a:20:e9:fb:a0:ae:ce:8e:94:43:1f:3d:68:63:37:2a: c6:db:0a:39:38:94:1c:86:d4:93:ba:d0:69:f9:f0:f8: 86:ef:26:ee:89:e4:ea:00:8e:cd:82:43:20:1e:4c:e1: 5b:2f:34:da:18:90:1b:09:5a:2c:13:6c:1e:38:df:ca: a9:31:e5:bc:8d:f6:d5:76:1e:a5:e0:6b:2c:43:7a:f5: 83:00:24:8f:20:67:7a:96:1e:9e:d2:ce:ee:fe:c5:97: be:4e:69:67:25:26:82:d6:08:49:a4:7e:71:63:31:7b: e6:6d:d0:ce:0a:6f:d6:a0:e5:27:40:01:3c:19:17:11: 49:ad:2f:34:a9:f2:a4:d8:ee:15:aa:a5:70:7b:5b:c1: 2a:3d:30:81:bf:de:b9:22:ad:1a:32:d6:69:52:a6:ef Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:6f:82:7c:47:da:a6:60:75:38:ef:1f:fb: 3b:11:18:80:04:78:48:e7:b9:ec:6d:65:0d:8a:f7:df: 02:1d:00:8c:12:f0:59:f3:52:0b:9a:13:64:79:ca:18: 00:97:cf:49:6c:97:9c:fd:59:56:f1:6d:f6:25:39 Fingerprint (SHA-256): 99:7D:3A:C0:E7:36:7B:0F:E0:E3:E6:4F:80:24:16:C4:E7:5F:5F:FB:B4:B3:9B:2E:EF:3E:F7:5F:11:56:2E:EC Fingerprint (SHA1): A7:17:9B:35:53:02:90:E5:96:7D:66:CB:57:AB:FE:9F:49:F6:D6:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2545: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191456 (0x433ed5e0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:02 2025 Not After : Thu Nov 28 11:17:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 16:d4:e5:78:fb:68:4e:fd:5d:ef:f5:8d:1e:c4:cd:f4: 23:b9:f9:6a:63:89:31:22:9d:0c:f5:c1:06:42:7c:9a: 4c:9c:10:49:0f:6c:74:cb:ef:8f:d1:aa:a4:e4:4f:61: 04:4e:43:33:8a:2a:ad:3c:e4:9b:11:80:1c:61:09:22: 79:ed:36:96:5e:9a:c1:bd:2b:d8:22:cf:fb:fa:c8:e7: 4a:d2:03:98:eb:42:2f:31:f4:b6:ac:9a:a7:df:9a:1e: 9a:20:e9:fb:a0:ae:ce:8e:94:43:1f:3d:68:63:37:2a: c6:db:0a:39:38:94:1c:86:d4:93:ba:d0:69:f9:f0:f8: 86:ef:26:ee:89:e4:ea:00:8e:cd:82:43:20:1e:4c:e1: 5b:2f:34:da:18:90:1b:09:5a:2c:13:6c:1e:38:df:ca: a9:31:e5:bc:8d:f6:d5:76:1e:a5:e0:6b:2c:43:7a:f5: 83:00:24:8f:20:67:7a:96:1e:9e:d2:ce:ee:fe:c5:97: be:4e:69:67:25:26:82:d6:08:49:a4:7e:71:63:31:7b: e6:6d:d0:ce:0a:6f:d6:a0:e5:27:40:01:3c:19:17:11: 49:ad:2f:34:a9:f2:a4:d8:ee:15:aa:a5:70:7b:5b:c1: 2a:3d:30:81:bf:de:b9:22:ad:1a:32:d6:69:52:a6:ef Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:6f:82:7c:47:da:a6:60:75:38:ef:1f:fb: 3b:11:18:80:04:78:48:e7:b9:ec:6d:65:0d:8a:f7:df: 02:1d:00:8c:12:f0:59:f3:52:0b:9a:13:64:79:ca:18: 00:97:cf:49:6c:97:9c:fd:59:56:f1:6d:f6:25:39 Fingerprint (SHA-256): 99:7D:3A:C0:E7:36:7B:0F:E0:E3:E6:4F:80:24:16:C4:E7:5F:5F:FB:B4:B3:9B:2E:EF:3E:F7:5F:11:56:2E:EC Fingerprint (SHA1): A7:17:9B:35:53:02:90:E5:96:7D:66:CB:57:AB:FE:9F:49:F6:D6:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #2546: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191456 (0x433ed5e0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:02 2025 Not After : Thu Nov 28 11:17:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 16:d4:e5:78:fb:68:4e:fd:5d:ef:f5:8d:1e:c4:cd:f4: 23:b9:f9:6a:63:89:31:22:9d:0c:f5:c1:06:42:7c:9a: 4c:9c:10:49:0f:6c:74:cb:ef:8f:d1:aa:a4:e4:4f:61: 04:4e:43:33:8a:2a:ad:3c:e4:9b:11:80:1c:61:09:22: 79:ed:36:96:5e:9a:c1:bd:2b:d8:22:cf:fb:fa:c8:e7: 4a:d2:03:98:eb:42:2f:31:f4:b6:ac:9a:a7:df:9a:1e: 9a:20:e9:fb:a0:ae:ce:8e:94:43:1f:3d:68:63:37:2a: c6:db:0a:39:38:94:1c:86:d4:93:ba:d0:69:f9:f0:f8: 86:ef:26:ee:89:e4:ea:00:8e:cd:82:43:20:1e:4c:e1: 5b:2f:34:da:18:90:1b:09:5a:2c:13:6c:1e:38:df:ca: a9:31:e5:bc:8d:f6:d5:76:1e:a5:e0:6b:2c:43:7a:f5: 83:00:24:8f:20:67:7a:96:1e:9e:d2:ce:ee:fe:c5:97: be:4e:69:67:25:26:82:d6:08:49:a4:7e:71:63:31:7b: e6:6d:d0:ce:0a:6f:d6:a0:e5:27:40:01:3c:19:17:11: 49:ad:2f:34:a9:f2:a4:d8:ee:15:aa:a5:70:7b:5b:c1: 2a:3d:30:81:bf:de:b9:22:ad:1a:32:d6:69:52:a6:ef Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:6f:82:7c:47:da:a6:60:75:38:ef:1f:fb: 3b:11:18:80:04:78:48:e7:b9:ec:6d:65:0d:8a:f7:df: 02:1d:00:8c:12:f0:59:f3:52:0b:9a:13:64:79:ca:18: 00:97:cf:49:6c:97:9c:fd:59:56:f1:6d:f6:25:39 Fingerprint (SHA-256): 99:7D:3A:C0:E7:36:7B:0F:E0:E3:E6:4F:80:24:16:C4:E7:5F:5F:FB:B4:B3:9B:2E:EF:3E:F7:5F:11:56:2E:EC Fingerprint (SHA1): A7:17:9B:35:53:02:90:E5:96:7D:66:CB:57:AB:FE:9F:49:F6:D6:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #2547: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2548: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2549: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2550: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2551: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2552: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2553: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2554: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2555: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2556: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2557: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2558: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2559: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2560: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2561: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2562: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #2563: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2564: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2565: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2566: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2567: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2568: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2569: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2570: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2571: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2572: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2573: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2574: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111712Z nextupdate=20261128111712Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:17:12 2025 Next Update: Sat Nov 28 11:17:12 2026 CRL Extensions: chains.sh: #2575: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111712Z nextupdate=20261128111712Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:17:12 2025 Next Update: Sat Nov 28 11:17:12 2026 CRL Extensions: chains.sh: #2576: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111712Z nextupdate=20261128111712Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:17:12 2025 Next Update: Sat Nov 28 11:17:12 2026 CRL Extensions: chains.sh: #2577: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111712Z nextupdate=20261128111712Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:17:12 2025 Next Update: Sat Nov 28 11:17:12 2026 CRL Extensions: chains.sh: #2578: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111713Z addcert 14 20251128111713Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:17:13 2025 Next Update: Sat Nov 28 11:17:12 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:17:13 2025 CRL Extensions: chains.sh: #2579: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111714Z addcert 15 20251128111714Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:17:14 2025 Next Update: Sat Nov 28 11:17:12 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:17:14 2025 CRL Extensions: chains.sh: #2580: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2581: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2582: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2583: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #2584: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #2585: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #2586: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #2587: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #2588: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #2589: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:07 2025 Not After : Thu Nov 28 11:17:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:98:3a:74:8f:31:01:6c:64:37:03:3f:ca:98:92:a4: 0b:79:b2:6c:a6:0d:e7:b3:25:30:fb:e4:41:6f:71:01: cc:3b:82:d9:9f:d1:06:e5:7e:05:59:33:ca:9f:24:1e: 6f:c9:1f:71:29:cf:b7:0f:42:43:1d:f9:6d:9e:e8:7d: 80:1b:91:95:57:31:20:2e:c2:15:53:fa:57:6f:16:63: e6:1c:90:73:ca:bc:c2:1a:c7:ab:9d:73:64:5d:98:7a: df:7f:e7:3a:6f:f3:9c:ca:b7:be:eb:a7:e7:0e:60:24: c4:7d:9f:70:05:26:89:99:0f:d9:70:b4:31:88:ec:2d: 91:26:07:50:4f:78:72:05:8f:54:90:24:e9:a4:62:82: 3c:7b:71:f6:ac:a5:13:c3:7f:e7:73:71:6b:22:20:93: 87:83:2d:e9:63:3f:91:e8:8e:59:72:32:18:a9:b4:cb: 07:66:91:ea:63:b6:5e:2a:1e:ec:f6:95:1d:88:71:1a: bc:3b:7e:f2:25:4a:5d:f9:9c:00:14:fa:a2:3f:29:15: 41:b3:8a:da:b3:d4:42:e7:d8:d9:6f:3c:b1:5b:42:f0: 88:52:18:6d:d9:fd:ed:62:a3:ef:95:07:61:82:31:5a: 25:4a:74:41:14:99:c4:27:b4:3c:ca:60:de:ec:5a:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:5b:c7:00:3f:d6:d5:3b:66:a3:e6:16:4c:fc:3e:27: 87:8c:90:ed:5c:4b:29:9d:56:ac:93:3b:53:19:82:55: 45:ef:29:5e:9e:05:fe:8c:f4:c3:af:7f:ea:cf:ae:98: d6:44:0b:c2:a6:02:dd:64:59:c8:87:95:4f:e1:23:67: fe:a7:aa:51:60:96:a8:d3:1d:e4:09:65:52:41:5d:e6: 5c:f5:c8:ab:ba:65:09:5e:43:21:e0:3e:4e:ef:23:b2: c2:f8:15:9a:35:54:3f:6f:b3:17:a3:d4:f4:31:0b:ab: c1:d1:44:65:24:0f:54:5a:06:e8:0d:ee:af:e9:70:4f: 13:69:19:04:4d:df:10:7f:49:94:21:82:4c:ce:00:07: 29:23:e8:3f:9a:be:98:c1:47:07:59:4f:1f:23:2c:dc: bb:3b:36:49:51:36:86:f6:de:6f:f3:e9:4c:6c:14:48: b0:66:3a:37:09:7f:64:27:49:cf:61:ef:b4:7a:e7:8f: 37:48:4d:de:f3:f7:b1:d0:8d:ad:95:ec:73:de:92:a7: 51:df:57:0c:9a:b8:53:22:14:0d:53:bf:2b:47:b1:ef: 39:67:70:40:a3:c2:50:c5:39:b7:5f:f0:b8:7b:88:4f: 17:2f:3d:67:84:db:13:3a:fa:b1:94:c6:e7:81:67:ca Fingerprint (SHA-256): 3E:33:31:D9:72:AB:5C:EF:33:0C:97:C1:62:06:DB:99:C2:91:5D:A8:49:FD:09:4D:A0:07:63:49:2A:83:7E:BB Fingerprint (SHA1): 76:10:D6:8F:AE:B0:BC:42:13:C9:DD:4B:9D:A2:5A:18:89:81:9B:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2590: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2591: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:07 2025 Not After : Thu Nov 28 11:17:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:98:3a:74:8f:31:01:6c:64:37:03:3f:ca:98:92:a4: 0b:79:b2:6c:a6:0d:e7:b3:25:30:fb:e4:41:6f:71:01: cc:3b:82:d9:9f:d1:06:e5:7e:05:59:33:ca:9f:24:1e: 6f:c9:1f:71:29:cf:b7:0f:42:43:1d:f9:6d:9e:e8:7d: 80:1b:91:95:57:31:20:2e:c2:15:53:fa:57:6f:16:63: e6:1c:90:73:ca:bc:c2:1a:c7:ab:9d:73:64:5d:98:7a: df:7f:e7:3a:6f:f3:9c:ca:b7:be:eb:a7:e7:0e:60:24: c4:7d:9f:70:05:26:89:99:0f:d9:70:b4:31:88:ec:2d: 91:26:07:50:4f:78:72:05:8f:54:90:24:e9:a4:62:82: 3c:7b:71:f6:ac:a5:13:c3:7f:e7:73:71:6b:22:20:93: 87:83:2d:e9:63:3f:91:e8:8e:59:72:32:18:a9:b4:cb: 07:66:91:ea:63:b6:5e:2a:1e:ec:f6:95:1d:88:71:1a: bc:3b:7e:f2:25:4a:5d:f9:9c:00:14:fa:a2:3f:29:15: 41:b3:8a:da:b3:d4:42:e7:d8:d9:6f:3c:b1:5b:42:f0: 88:52:18:6d:d9:fd:ed:62:a3:ef:95:07:61:82:31:5a: 25:4a:74:41:14:99:c4:27:b4:3c:ca:60:de:ec:5a:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:5b:c7:00:3f:d6:d5:3b:66:a3:e6:16:4c:fc:3e:27: 87:8c:90:ed:5c:4b:29:9d:56:ac:93:3b:53:19:82:55: 45:ef:29:5e:9e:05:fe:8c:f4:c3:af:7f:ea:cf:ae:98: d6:44:0b:c2:a6:02:dd:64:59:c8:87:95:4f:e1:23:67: fe:a7:aa:51:60:96:a8:d3:1d:e4:09:65:52:41:5d:e6: 5c:f5:c8:ab:ba:65:09:5e:43:21:e0:3e:4e:ef:23:b2: c2:f8:15:9a:35:54:3f:6f:b3:17:a3:d4:f4:31:0b:ab: c1:d1:44:65:24:0f:54:5a:06:e8:0d:ee:af:e9:70:4f: 13:69:19:04:4d:df:10:7f:49:94:21:82:4c:ce:00:07: 29:23:e8:3f:9a:be:98:c1:47:07:59:4f:1f:23:2c:dc: bb:3b:36:49:51:36:86:f6:de:6f:f3:e9:4c:6c:14:48: b0:66:3a:37:09:7f:64:27:49:cf:61:ef:b4:7a:e7:8f: 37:48:4d:de:f3:f7:b1:d0:8d:ad:95:ec:73:de:92:a7: 51:df:57:0c:9a:b8:53:22:14:0d:53:bf:2b:47:b1:ef: 39:67:70:40:a3:c2:50:c5:39:b7:5f:f0:b8:7b:88:4f: 17:2f:3d:67:84:db:13:3a:fa:b1:94:c6:e7:81:67:ca Fingerprint (SHA-256): 3E:33:31:D9:72:AB:5C:EF:33:0C:97:C1:62:06:DB:99:C2:91:5D:A8:49:FD:09:4D:A0:07:63:49:2A:83:7E:BB Fingerprint (SHA1): 76:10:D6:8F:AE:B0:BC:42:13:C9:DD:4B:9D:A2:5A:18:89:81:9B:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2592: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2593: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #2594: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #2595: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2596: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #2597: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2598: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111716Z nextupdate=20261128111716Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:17:16 2025 Next Update: Sat Nov 28 11:17:16 2026 CRL Extensions: chains.sh: #2599: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111717Z addcert 3 20251128111717Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:17:17 2025 Next Update: Sat Nov 28 11:17:16 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:17:17 2025 CRL Extensions: chains.sh: #2600: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111718Z addcert 4 20251128111718Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:17:18 2025 Next Update: Sat Nov 28 11:17:16 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:17:18 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:17:17 2025 CRL Extensions: chains.sh: #2601: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2602: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2603: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2604: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2605: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #2606: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2607: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2608: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #2609: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2610: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2611: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2612: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #2613: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2614: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:46 2025 Not After : Thu Nov 28 11:10:46 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:de:1f:02:6e:9c:11:8d:14:99:cc:04:bf:ff:f4:4c: b8:8b:a4:d8:63:3b:35:c5:13:dd:d0:db:00:0a:70:2f: a8:37:44:d5:96:78:87:a3:89:26:6c:94:f9:3a:2c:0a: a2:5a:b2:dc:4a:5c:e5:ef:6b:de:17:e0:6b:be:f1:64: 28:2e:f3:13:23:4e:f0:6a:d0:f6:5d:03:a0:70:49:1d: b2:af:3d:66:e4:23:b7:00:01:45:62:90:9a:c0:b3:24: 69:70:66:df:ee:aa:4e:93:20:46:43:d1:ac:e3:2e:1b: 2e:fd:e5:0f:4d:80:fc:a9:e4:70:6d:76:1c:57:f9:6b: 5a:81:18:ab:d6:80:46:63:0e:42:0c:af:df:71:63:e2: 5b:fa:a1:00:24:3f:a2:f9:e7:6f:5e:c3:59:b9:2e:0a: 22:46:15:2d:b2:86:21:30:24:e9:3f:94:46:9a:8b:f4: 10:31:d0:c6:b6:12:45:4e:4f:5a:72:eb:35:57:d8:33: 9e:fe:23:b2:75:84:ad:e1:13:24:4c:9d:00:fa:3e:eb: 34:13:da:16:8b:dc:1c:ec:34:db:17:ed:80:9e:d2:36: 9c:27:12:f3:77:b2:72:48:36:e8:63:92:4e:e8:0a:12: f8:99:fc:83:f3:e1:72:57:d5:60:17:4d:50:e4:9e:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:a8:a7:03:e0:13:8e:f2:a4:d3:27:12:3d:9e:cb:3b: ec:2c:48:f7:05:a6:fd:07:24:a9:a9:d9:9e:ec:0b:df: 53:04:29:04:ad:0d:b6:8d:a3:03:8d:da:18:24:c4:1c: 2a:98:fc:b1:52:d1:0d:00:ad:7c:2e:30:5a:63:06:5c: 84:44:b4:a8:87:22:97:a1:55:dc:78:1d:28:ba:ad:17: 85:e6:21:f9:02:79:0e:33:2d:7e:6e:40:b7:15:9f:ad: 43:4e:52:7b:79:30:d7:ff:81:99:6d:23:ad:53:81:a0: 0b:bb:a5:9a:e1:95:50:d5:ec:16:4b:b6:4e:4d:d2:0a: a9:0f:f1:ff:29:6b:a0:e5:7d:28:33:f9:08:ef:90:0e: 34:83:34:a0:95:94:a8:88:74:94:ad:b3:aa:a6:01:89: 39:0f:3f:c0:c9:e8:a9:55:87:cc:e9:7c:67:1f:1c:6a: a9:9a:d1:22:9b:bb:4b:95:41:9b:c8:2c:da:39:6e:f6: 94:6c:3d:99:f0:ec:ef:6b:8a:cc:e8:42:12:3c:28:20: d9:10:f1:46:dc:36:ba:76:e0:f4:d4:8f:0f:c0:db:2e: 06:cd:75:62:7f:10:55:03:e7:a9:cf:62:a1:f3:a2:ab: 71:eb:39:9a:47:83:70:04:79:ff:0d:f0:83:0f:c4:eb Fingerprint (SHA-256): FA:9F:34:98:3E:45:9C:64:C3:1D:B0:D6:1F:FD:E7:E1:0A:FA:6E:FB:8D:38:E4:88:EA:D6:1E:1D:95:72:E9:16 Fingerprint (SHA1): 2B:9F:53:8F:89:96:19:33:10:A1:56:57:42:D6:AD:CC:A5:CE:1D:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #2615: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #2616: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2617: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2618: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #2619: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2620: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #2621: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2622: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191465 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2623: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2624: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2625: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2626: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128191466 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2627: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2628: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2629: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191106.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2630: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191065.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2631: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2632: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2633: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191106.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2634: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128191467 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2635: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2636: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2637: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191106.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2638: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191066.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2639: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2640: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2641: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2642: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128191468 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2643: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2644: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2645: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191106.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2646: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191067.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2647: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2648: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2649: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191106.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2650: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191068.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2651: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2652: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111728Z nextupdate=20261128111728Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:17:28 2025 Next Update: Sat Nov 28 11:17:28 2026 CRL Extensions: chains.sh: #2653: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111728Z nextupdate=20261128111728Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:17:28 2025 Next Update: Sat Nov 28 11:17:28 2026 CRL Extensions: chains.sh: #2654: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111728Z nextupdate=20261128111728Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:17:28 2025 Next Update: Sat Nov 28 11:17:28 2026 CRL Extensions: chains.sh: #2655: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111728Z nextupdate=20261128111728Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:17:28 2025 Next Update: Sat Nov 28 11:17:28 2026 CRL Extensions: chains.sh: #2656: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111729Z addcert 20 20251128111729Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:17:29 2025 Next Update: Sat Nov 28 11:17:28 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:17:29 2025 CRL Extensions: chains.sh: #2657: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111730Z addcert 40 20251128111730Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:17:30 2025 Next Update: Sat Nov 28 11:17:28 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:17:29 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:17:30 2025 CRL Extensions: chains.sh: #2658: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2659: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2660: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2661: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191465 (0x433ed5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:21 2025 Not After : Thu Nov 28 11:17:21 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:0f:0d:41:15:bc:51:5b:3b:59:aa:17:57:9f:d6:e2: 0d:41:8a:82:7d:7f:6b:87:4f:94:8f:39:69:74:f8:10: da:c6:84:cd:b2:df:59:9d:8b:6d:97:59:63:36:1c:e5: 44:16:c0:b7:c0:29:a8:57:79:d1:24:5c:0b:f7:c2:55: 1b:86:e1:1e:67:fb:1d:55:84:fc:f1:63:9b:99:d7:45: f6:f9:87:c5:ba:51:f7:fd:6d:15:27:c1:e3:70:a1:e2: 2f:97:0c:b2:89:59:1d:95:b8:4d:9b:5d:71:2e:be:e5: 1e:4b:14:23:91:0e:37:3c:f4:87:49:13:4a:26:e0:da: 2a:a4:e6:45:96:f4:b4:67:5c:f2:d6:81:cf:10:e4:7e: 73:5d:3b:a2:1f:15:8e:25:2b:a3:11:6f:b5:f5:c5:fd: ce:56:ab:a3:02:7b:47:f4:cc:73:07:af:38:9d:b2:83: 12:24:e5:79:39:de:fc:fc:6f:71:ee:71:25:bf:ae:cd: 3a:a0:4f:3e:b7:10:05:8f:45:06:33:d4:77:9c:57:d7: ff:93:b2:79:4a:44:5b:d2:ba:b6:62:23:6c:05:7e:ca: 84:70:23:5a:26:65:7d:a7:20:39:fe:9a:80:fe:c9:9d: 5b:b0:a6:83:16:60:c3:47:65:2b:09:d9:84:20:97:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:14:2e:af:00:a5:c3:d2:49:77:d8:a4:70:82:5c:08: e1:59:c8:3e:ac:6d:10:75:14:0b:f9:1d:26:e5:a8:23: da:2c:c3:2d:83:9e:b9:aa:b7:e8:ad:07:a9:a5:a9:34: db:d4:4d:34:90:eb:31:2a:c6:e0:11:79:91:ce:43:66: d7:bb:6a:37:d4:c3:75:7d:5a:e8:07:b0:9a:d1:76:36: 0b:67:33:12:8b:20:09:c9:b0:69:8f:0c:14:a6:dd:9e: 51:3f:da:21:33:e4:9c:92:95:65:bf:0e:5b:bd:ed:16: 90:2d:03:a8:1c:39:93:ce:c7:68:4e:ac:64:eb:33:7a: eb:4d:96:ec:82:6f:6f:6d:82:c9:f8:97:59:83:b3:02: 58:07:d2:df:95:09:0a:6a:de:8c:4f:19:c6:c6:7a:92: 6e:7c:12:5e:64:0b:ef:29:5d:1d:9e:16:51:f7:23:59: af:70:35:08:89:89:f8:95:ca:f9:b3:11:6c:2c:83:5e: 5f:5c:93:20:ca:28:35:d9:eb:cd:c9:cb:d7:7c:7c:c5: 28:8a:b2:8e:f4:29:eb:7c:57:ce:b7:c1:51:28:46:89: 33:3d:4d:0c:26:8b:51:d7:64:12:ed:3b:9d:86:f2:76: 9d:0c:fb:79:9c:34:12:2b:93:56:10:cb:9f:64:85:3b Fingerprint (SHA-256): 8B:6C:47:36:18:E4:08:25:A6:3E:E1:7F:DD:B2:DE:A6:81:59:EC:6C:46:22:F8:23:38:63:AB:FB:63:B8:A3:58 Fingerprint (SHA1): 9A:76:69:6B:E4:63:26:A8:89:0D:53:58:37:64:23:52:0E:8A:BA:44 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2662: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2663: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191465 (0x433ed5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:21 2025 Not After : Thu Nov 28 11:17:21 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:0f:0d:41:15:bc:51:5b:3b:59:aa:17:57:9f:d6:e2: 0d:41:8a:82:7d:7f:6b:87:4f:94:8f:39:69:74:f8:10: da:c6:84:cd:b2:df:59:9d:8b:6d:97:59:63:36:1c:e5: 44:16:c0:b7:c0:29:a8:57:79:d1:24:5c:0b:f7:c2:55: 1b:86:e1:1e:67:fb:1d:55:84:fc:f1:63:9b:99:d7:45: f6:f9:87:c5:ba:51:f7:fd:6d:15:27:c1:e3:70:a1:e2: 2f:97:0c:b2:89:59:1d:95:b8:4d:9b:5d:71:2e:be:e5: 1e:4b:14:23:91:0e:37:3c:f4:87:49:13:4a:26:e0:da: 2a:a4:e6:45:96:f4:b4:67:5c:f2:d6:81:cf:10:e4:7e: 73:5d:3b:a2:1f:15:8e:25:2b:a3:11:6f:b5:f5:c5:fd: ce:56:ab:a3:02:7b:47:f4:cc:73:07:af:38:9d:b2:83: 12:24:e5:79:39:de:fc:fc:6f:71:ee:71:25:bf:ae:cd: 3a:a0:4f:3e:b7:10:05:8f:45:06:33:d4:77:9c:57:d7: ff:93:b2:79:4a:44:5b:d2:ba:b6:62:23:6c:05:7e:ca: 84:70:23:5a:26:65:7d:a7:20:39:fe:9a:80:fe:c9:9d: 5b:b0:a6:83:16:60:c3:47:65:2b:09:d9:84:20:97:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:14:2e:af:00:a5:c3:d2:49:77:d8:a4:70:82:5c:08: e1:59:c8:3e:ac:6d:10:75:14:0b:f9:1d:26:e5:a8:23: da:2c:c3:2d:83:9e:b9:aa:b7:e8:ad:07:a9:a5:a9:34: db:d4:4d:34:90:eb:31:2a:c6:e0:11:79:91:ce:43:66: d7:bb:6a:37:d4:c3:75:7d:5a:e8:07:b0:9a:d1:76:36: 0b:67:33:12:8b:20:09:c9:b0:69:8f:0c:14:a6:dd:9e: 51:3f:da:21:33:e4:9c:92:95:65:bf:0e:5b:bd:ed:16: 90:2d:03:a8:1c:39:93:ce:c7:68:4e:ac:64:eb:33:7a: eb:4d:96:ec:82:6f:6f:6d:82:c9:f8:97:59:83:b3:02: 58:07:d2:df:95:09:0a:6a:de:8c:4f:19:c6:c6:7a:92: 6e:7c:12:5e:64:0b:ef:29:5d:1d:9e:16:51:f7:23:59: af:70:35:08:89:89:f8:95:ca:f9:b3:11:6c:2c:83:5e: 5f:5c:93:20:ca:28:35:d9:eb:cd:c9:cb:d7:7c:7c:c5: 28:8a:b2:8e:f4:29:eb:7c:57:ce:b7:c1:51:28:46:89: 33:3d:4d:0c:26:8b:51:d7:64:12:ed:3b:9d:86:f2:76: 9d:0c:fb:79:9c:34:12:2b:93:56:10:cb:9f:64:85:3b Fingerprint (SHA-256): 8B:6C:47:36:18:E4:08:25:A6:3E:E1:7F:DD:B2:DE:A6:81:59:EC:6C:46:22:F8:23:38:63:AB:FB:63:B8:A3:58 Fingerprint (SHA1): 9A:76:69:6B:E4:63:26:A8:89:0D:53:58:37:64:23:52:0E:8A:BA:44 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2664: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2665: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2666: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191469 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2667: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2668: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2669: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2670: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191470 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2671: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2672: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2673: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2674: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191471 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2675: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2676: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2677: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2678: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128191472 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2679: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2680: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #2681: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191473 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2682: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #2683: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #2684: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2685: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128191474 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2686: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2687: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2688: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2689: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128191475 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2690: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2691: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #2692: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #2693: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #2694: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191469 (0x433ed5ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:17:31 2025 Not After : Thu Nov 28 11:17:31 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:c4:04:46:74:10:ce:60:86:3d:f1:3e:40:ed:b6:a6: 2c:ad:20:66:e3:d0:a0:42:ba:4e:9d:1b:e7:06:31:cd: ff:c3:3f:0f:fa:35:c2:e0:fe:7b:80:65:d1:59:85:a0: 70:8c:c8:14:f3:72:eb:34:37:af:b8:1e:0f:03:90:00: ea:dc:fc:58:28:09:ee:b0:ec:dd:25:04:a6:d8:83:da: 07:b1:f2:aa:3a:a3:1a:eb:03:f3:11:f8:59:60:96:9e: c8:ce:6e:5b:16:e8:f5:97:15:11:4c:9a:ad:6e:3a:6e: 3c:cb:50:38:f5:73:85:86:d8:18:b8:03:6b:48:4c:d5: 0a:b5:62:0f:58:d2:34:cc:e9:aa:da:20:c2:58:c7:14: 6d:c9:5b:b0:3e:91:0f:17:a2:fa:d9:f1:8c:9f:be:d1: 30:39:76:81:5a:1e:c5:65:80:fe:76:4a:c5:b4:06:e3: 9c:ca:5e:a1:3e:32:96:f3:d7:6d:c9:10:ff:af:53:90: f8:6d:1c:09:e8:4d:4e:67:46:89:9b:95:89:7e:74:b9: bd:29:00:72:3f:71:03:65:f1:d7:91:66:e8:b3:45:d9: 67:7b:69:3a:d8:3e:8e:a5:06:1a:63:32:f2:38:b9:a9: e9:64:ed:fc:6d:5a:15:10:5b:14:47:73:df:ba:49:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:34:7b:77:e1:c8:e4:83:37:cd:cf:3f:c9:f7:3c:46: 22:c1:30:d8:ae:54:a4:d7:3a:46:45:79:60:ff:ee:e7: f5:c5:29:61:45:ce:fa:50:39:cd:3c:3d:dc:b9:e5:fe: ed:b2:5a:28:cb:bf:4a:15:a7:b0:aa:bb:a9:93:a7:8d: 11:64:52:9e:e5:16:8b:c7:f7:8d:c4:63:dc:c0:34:05: ae:53:c8:21:99:c3:43:1c:94:e8:93:d5:c2:66:6d:ee: 47:2d:f4:b9:72:c7:fb:56:5a:5a:6f:e4:e2:0e:1c:5c: 05:1b:47:40:c1:8b:5c:54:3a:76:f8:70:da:b3:9e:51: 30:48:01:c3:2b:8f:12:c8:fe:cd:e1:5b:b3:0e:38:db: bb:7b:18:30:5a:66:7c:07:76:ba:4b:1e:3d:a6:59:54: 8d:ab:cc:87:e7:e2:68:7d:3d:75:6d:a4:94:88:56:a2: d0:a0:2b:01:fd:63:24:df:02:9f:a2:5e:9e:b1:2a:f3: 5f:28:da:db:86:4b:26:b9:f3:88:94:c8:9c:d0:ab:16: ca:d7:db:f6:77:60:d4:24:07:93:b1:c1:dd:ee:aa:fd: fc:e9:e7:68:06:30:ea:fa:33:8b:97:7d:dd:b5:32:76: f9:6c:08:00:71:70:38:0d:a7:04:97:85:21:33:3c:cf Fingerprint (SHA-256): 69:31:08:C6:68:DC:29:12:A0:76:0E:FB:E5:71:81:8D:E0:9B:68:D7:61:85:00:41:B8:16:B9:1B:15:B7:14:E1 Fingerprint (SHA1): AD:2F:0F:6E:99:15:08:6A:A7:5B:96:1B:61:F7:45:E4:AF:7D:14:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2695: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191471 (0x433ed5ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:17:32 2025 Not After : Thu Nov 28 11:17:32 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:e7:4c:9c:1e:54:35:be:ea:78:b2:98:27:cd:fc:61: a1:26:13:79:80:df:d5:c4:0c:3e:c2:12:55:4d:2d:91: 1f:b0:f3:07:0e:b3:83:db:76:90:89:8f:e7:8b:60:df: 4f:9d:a2:2f:7d:dc:20:3e:51:bf:c1:f9:ee:8a:f4:7e: 43:e0:21:95:20:b0:f8:55:3d:4b:44:ab:33:36:f3:43: ba:b9:11:9d:10:fc:e6:6b:e5:44:b5:bb:05:fb:0c:7b: ab:f3:a1:a0:1e:37:ba:fc:dc:9c:64:eb:01:df:72:63: 0a:95:ff:4d:9a:4c:9f:27:70:14:4f:ef:34:ac:77:62: 2e:cd:11:a2:ab:60:b5:a5:45:a6:62:46:3c:ee:13:86: 83:89:88:5e:e2:fe:97:00:77:0d:38:38:50:4f:e4:1f: 31:ee:d4:aa:a5:4d:90:3d:bd:f4:05:bb:17:98:05:90: ca:28:6b:36:8d:6c:94:24:d1:73:9b:a5:76:13:60:4c: f5:63:8b:35:e4:b5:20:bf:27:3c:b5:7d:db:03:67:7d: a5:77:05:2a:47:dc:8e:6d:62:f9:97:a3:d4:6c:f9:58: aa:3a:db:0c:4a:a9:db:6b:60:78:5c:56:0a:b7:8a:67: 68:e9:51:fa:f0:4f:18:f5:70:ec:9a:c5:4d:d7:eb:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:b8:89:f4:33:5c:13:ae:88:a9:0d:59:21:3c:f3:a2: e7:fd:26:3c:bb:6d:4a:d9:71:d7:a0:0d:a1:d0:e3:ef: 35:2a:ec:1b:a9:1e:b1:d4:75:32:e3:48:52:17:8f:60: a6:09:71:83:fb:d4:50:38:9e:fc:41:b1:33:f3:0c:08: 8b:c8:8e:0e:27:a3:c7:3f:6a:9d:a4:ec:7c:bf:82:54: b9:f0:1f:9c:a3:52:5a:fd:c4:e0:be:a5:7c:d4:09:bf: af:99:e3:a2:e2:0f:4c:7f:d3:58:22:5b:bb:fb:86:e9: 23:51:3e:c1:86:a9:9b:a9:38:e2:ea:76:aa:e0:1d:30: 73:8e:35:af:9d:a4:c3:3f:3c:19:53:c2:96:63:81:76: 68:16:7c:f6:44:a7:0c:bd:a2:42:c0:af:ac:b5:bb:bf: fd:11:07:91:e7:d6:e2:6b:6e:63:f4:88:9b:47:6c:32: b0:50:88:ba:7e:3f:b3:1f:6f:4e:18:fa:cf:c9:fa:94: 67:be:be:04:c3:f6:5a:26:4f:de:e1:f5:e0:cf:1c:04: 11:f6:f4:bc:55:c6:bd:25:22:b3:d0:66:b7:7d:98:4a: 80:15:fe:f5:fd:a1:82:4f:43:51:6e:76:7a:14:1a:64: c6:09:c8:41:a2:b7:83:fa:5c:29:dc:d2:76:7e:ec:75 Fingerprint (SHA-256): 80:91:FC:AC:FF:24:CA:07:8F:9A:A4:8B:4E:82:79:53:05:8A:55:CC:59:10:29:B9:FA:5A:C1:50:AA:F8:47:39 Fingerprint (SHA1): D9:3D:E1:D4:C3:6F:FA:56:73:0A:92:63:A3:54:8D:80:8D:D4:31:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #2696: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191469 (0x433ed5ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:17:31 2025 Not After : Thu Nov 28 11:17:31 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:c4:04:46:74:10:ce:60:86:3d:f1:3e:40:ed:b6:a6: 2c:ad:20:66:e3:d0:a0:42:ba:4e:9d:1b:e7:06:31:cd: ff:c3:3f:0f:fa:35:c2:e0:fe:7b:80:65:d1:59:85:a0: 70:8c:c8:14:f3:72:eb:34:37:af:b8:1e:0f:03:90:00: ea:dc:fc:58:28:09:ee:b0:ec:dd:25:04:a6:d8:83:da: 07:b1:f2:aa:3a:a3:1a:eb:03:f3:11:f8:59:60:96:9e: c8:ce:6e:5b:16:e8:f5:97:15:11:4c:9a:ad:6e:3a:6e: 3c:cb:50:38:f5:73:85:86:d8:18:b8:03:6b:48:4c:d5: 0a:b5:62:0f:58:d2:34:cc:e9:aa:da:20:c2:58:c7:14: 6d:c9:5b:b0:3e:91:0f:17:a2:fa:d9:f1:8c:9f:be:d1: 30:39:76:81:5a:1e:c5:65:80:fe:76:4a:c5:b4:06:e3: 9c:ca:5e:a1:3e:32:96:f3:d7:6d:c9:10:ff:af:53:90: f8:6d:1c:09:e8:4d:4e:67:46:89:9b:95:89:7e:74:b9: bd:29:00:72:3f:71:03:65:f1:d7:91:66:e8:b3:45:d9: 67:7b:69:3a:d8:3e:8e:a5:06:1a:63:32:f2:38:b9:a9: e9:64:ed:fc:6d:5a:15:10:5b:14:47:73:df:ba:49:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:34:7b:77:e1:c8:e4:83:37:cd:cf:3f:c9:f7:3c:46: 22:c1:30:d8:ae:54:a4:d7:3a:46:45:79:60:ff:ee:e7: f5:c5:29:61:45:ce:fa:50:39:cd:3c:3d:dc:b9:e5:fe: ed:b2:5a:28:cb:bf:4a:15:a7:b0:aa:bb:a9:93:a7:8d: 11:64:52:9e:e5:16:8b:c7:f7:8d:c4:63:dc:c0:34:05: ae:53:c8:21:99:c3:43:1c:94:e8:93:d5:c2:66:6d:ee: 47:2d:f4:b9:72:c7:fb:56:5a:5a:6f:e4:e2:0e:1c:5c: 05:1b:47:40:c1:8b:5c:54:3a:76:f8:70:da:b3:9e:51: 30:48:01:c3:2b:8f:12:c8:fe:cd:e1:5b:b3:0e:38:db: bb:7b:18:30:5a:66:7c:07:76:ba:4b:1e:3d:a6:59:54: 8d:ab:cc:87:e7:e2:68:7d:3d:75:6d:a4:94:88:56:a2: d0:a0:2b:01:fd:63:24:df:02:9f:a2:5e:9e:b1:2a:f3: 5f:28:da:db:86:4b:26:b9:f3:88:94:c8:9c:d0:ab:16: ca:d7:db:f6:77:60:d4:24:07:93:b1:c1:dd:ee:aa:fd: fc:e9:e7:68:06:30:ea:fa:33:8b:97:7d:dd:b5:32:76: f9:6c:08:00:71:70:38:0d:a7:04:97:85:21:33:3c:cf Fingerprint (SHA-256): 69:31:08:C6:68:DC:29:12:A0:76:0E:FB:E5:71:81:8D:E0:9B:68:D7:61:85:00:41:B8:16:B9:1B:15:B7:14:E1 Fingerprint (SHA1): AD:2F:0F:6E:99:15:08:6A:A7:5B:96:1B:61:F7:45:E4:AF:7D:14:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2697: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #2698: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191469 (0x433ed5ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:17:31 2025 Not After : Thu Nov 28 11:17:31 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:c4:04:46:74:10:ce:60:86:3d:f1:3e:40:ed:b6:a6: 2c:ad:20:66:e3:d0:a0:42:ba:4e:9d:1b:e7:06:31:cd: ff:c3:3f:0f:fa:35:c2:e0:fe:7b:80:65:d1:59:85:a0: 70:8c:c8:14:f3:72:eb:34:37:af:b8:1e:0f:03:90:00: ea:dc:fc:58:28:09:ee:b0:ec:dd:25:04:a6:d8:83:da: 07:b1:f2:aa:3a:a3:1a:eb:03:f3:11:f8:59:60:96:9e: c8:ce:6e:5b:16:e8:f5:97:15:11:4c:9a:ad:6e:3a:6e: 3c:cb:50:38:f5:73:85:86:d8:18:b8:03:6b:48:4c:d5: 0a:b5:62:0f:58:d2:34:cc:e9:aa:da:20:c2:58:c7:14: 6d:c9:5b:b0:3e:91:0f:17:a2:fa:d9:f1:8c:9f:be:d1: 30:39:76:81:5a:1e:c5:65:80:fe:76:4a:c5:b4:06:e3: 9c:ca:5e:a1:3e:32:96:f3:d7:6d:c9:10:ff:af:53:90: f8:6d:1c:09:e8:4d:4e:67:46:89:9b:95:89:7e:74:b9: bd:29:00:72:3f:71:03:65:f1:d7:91:66:e8:b3:45:d9: 67:7b:69:3a:d8:3e:8e:a5:06:1a:63:32:f2:38:b9:a9: e9:64:ed:fc:6d:5a:15:10:5b:14:47:73:df:ba:49:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:34:7b:77:e1:c8:e4:83:37:cd:cf:3f:c9:f7:3c:46: 22:c1:30:d8:ae:54:a4:d7:3a:46:45:79:60:ff:ee:e7: f5:c5:29:61:45:ce:fa:50:39:cd:3c:3d:dc:b9:e5:fe: ed:b2:5a:28:cb:bf:4a:15:a7:b0:aa:bb:a9:93:a7:8d: 11:64:52:9e:e5:16:8b:c7:f7:8d:c4:63:dc:c0:34:05: ae:53:c8:21:99:c3:43:1c:94:e8:93:d5:c2:66:6d:ee: 47:2d:f4:b9:72:c7:fb:56:5a:5a:6f:e4:e2:0e:1c:5c: 05:1b:47:40:c1:8b:5c:54:3a:76:f8:70:da:b3:9e:51: 30:48:01:c3:2b:8f:12:c8:fe:cd:e1:5b:b3:0e:38:db: bb:7b:18:30:5a:66:7c:07:76:ba:4b:1e:3d:a6:59:54: 8d:ab:cc:87:e7:e2:68:7d:3d:75:6d:a4:94:88:56:a2: d0:a0:2b:01:fd:63:24:df:02:9f:a2:5e:9e:b1:2a:f3: 5f:28:da:db:86:4b:26:b9:f3:88:94:c8:9c:d0:ab:16: ca:d7:db:f6:77:60:d4:24:07:93:b1:c1:dd:ee:aa:fd: fc:e9:e7:68:06:30:ea:fa:33:8b:97:7d:dd:b5:32:76: f9:6c:08:00:71:70:38:0d:a7:04:97:85:21:33:3c:cf Fingerprint (SHA-256): 69:31:08:C6:68:DC:29:12:A0:76:0E:FB:E5:71:81:8D:E0:9B:68:D7:61:85:00:41:B8:16:B9:1B:15:B7:14:E1 Fingerprint (SHA1): AD:2F:0F:6E:99:15:08:6A:A7:5B:96:1B:61:F7:45:E4:AF:7D:14:AC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2699: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191471 (0x433ed5ef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:17:32 2025 Not After : Thu Nov 28 11:17:32 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:e7:4c:9c:1e:54:35:be:ea:78:b2:98:27:cd:fc:61: a1:26:13:79:80:df:d5:c4:0c:3e:c2:12:55:4d:2d:91: 1f:b0:f3:07:0e:b3:83:db:76:90:89:8f:e7:8b:60:df: 4f:9d:a2:2f:7d:dc:20:3e:51:bf:c1:f9:ee:8a:f4:7e: 43:e0:21:95:20:b0:f8:55:3d:4b:44:ab:33:36:f3:43: ba:b9:11:9d:10:fc:e6:6b:e5:44:b5:bb:05:fb:0c:7b: ab:f3:a1:a0:1e:37:ba:fc:dc:9c:64:eb:01:df:72:63: 0a:95:ff:4d:9a:4c:9f:27:70:14:4f:ef:34:ac:77:62: 2e:cd:11:a2:ab:60:b5:a5:45:a6:62:46:3c:ee:13:86: 83:89:88:5e:e2:fe:97:00:77:0d:38:38:50:4f:e4:1f: 31:ee:d4:aa:a5:4d:90:3d:bd:f4:05:bb:17:98:05:90: ca:28:6b:36:8d:6c:94:24:d1:73:9b:a5:76:13:60:4c: f5:63:8b:35:e4:b5:20:bf:27:3c:b5:7d:db:03:67:7d: a5:77:05:2a:47:dc:8e:6d:62:f9:97:a3:d4:6c:f9:58: aa:3a:db:0c:4a:a9:db:6b:60:78:5c:56:0a:b7:8a:67: 68:e9:51:fa:f0:4f:18:f5:70:ec:9a:c5:4d:d7:eb:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:b8:89:f4:33:5c:13:ae:88:a9:0d:59:21:3c:f3:a2: e7:fd:26:3c:bb:6d:4a:d9:71:d7:a0:0d:a1:d0:e3:ef: 35:2a:ec:1b:a9:1e:b1:d4:75:32:e3:48:52:17:8f:60: a6:09:71:83:fb:d4:50:38:9e:fc:41:b1:33:f3:0c:08: 8b:c8:8e:0e:27:a3:c7:3f:6a:9d:a4:ec:7c:bf:82:54: b9:f0:1f:9c:a3:52:5a:fd:c4:e0:be:a5:7c:d4:09:bf: af:99:e3:a2:e2:0f:4c:7f:d3:58:22:5b:bb:fb:86:e9: 23:51:3e:c1:86:a9:9b:a9:38:e2:ea:76:aa:e0:1d:30: 73:8e:35:af:9d:a4:c3:3f:3c:19:53:c2:96:63:81:76: 68:16:7c:f6:44:a7:0c:bd:a2:42:c0:af:ac:b5:bb:bf: fd:11:07:91:e7:d6:e2:6b:6e:63:f4:88:9b:47:6c:32: b0:50:88:ba:7e:3f:b3:1f:6f:4e:18:fa:cf:c9:fa:94: 67:be:be:04:c3:f6:5a:26:4f:de:e1:f5:e0:cf:1c:04: 11:f6:f4:bc:55:c6:bd:25:22:b3:d0:66:b7:7d:98:4a: 80:15:fe:f5:fd:a1:82:4f:43:51:6e:76:7a:14:1a:64: c6:09:c8:41:a2:b7:83:fa:5c:29:dc:d2:76:7e:ec:75 Fingerprint (SHA-256): 80:91:FC:AC:FF:24:CA:07:8F:9A:A4:8B:4E:82:79:53:05:8A:55:CC:59:10:29:B9:FA:5A:C1:50:AA:F8:47:39 Fingerprint (SHA1): D9:3D:E1:D4:C3:6F:FA:56:73:0A:92:63:A3:54:8D:80:8D:D4:31:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #2700: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #2701: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #2702: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #2703: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191469 (0x433ed5ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:17:31 2025 Not After : Thu Nov 28 11:17:31 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:c4:04:46:74:10:ce:60:86:3d:f1:3e:40:ed:b6:a6: 2c:ad:20:66:e3:d0:a0:42:ba:4e:9d:1b:e7:06:31:cd: ff:c3:3f:0f:fa:35:c2:e0:fe:7b:80:65:d1:59:85:a0: 70:8c:c8:14:f3:72:eb:34:37:af:b8:1e:0f:03:90:00: ea:dc:fc:58:28:09:ee:b0:ec:dd:25:04:a6:d8:83:da: 07:b1:f2:aa:3a:a3:1a:eb:03:f3:11:f8:59:60:96:9e: c8:ce:6e:5b:16:e8:f5:97:15:11:4c:9a:ad:6e:3a:6e: 3c:cb:50:38:f5:73:85:86:d8:18:b8:03:6b:48:4c:d5: 0a:b5:62:0f:58:d2:34:cc:e9:aa:da:20:c2:58:c7:14: 6d:c9:5b:b0:3e:91:0f:17:a2:fa:d9:f1:8c:9f:be:d1: 30:39:76:81:5a:1e:c5:65:80:fe:76:4a:c5:b4:06:e3: 9c:ca:5e:a1:3e:32:96:f3:d7:6d:c9:10:ff:af:53:90: f8:6d:1c:09:e8:4d:4e:67:46:89:9b:95:89:7e:74:b9: bd:29:00:72:3f:71:03:65:f1:d7:91:66:e8:b3:45:d9: 67:7b:69:3a:d8:3e:8e:a5:06:1a:63:32:f2:38:b9:a9: e9:64:ed:fc:6d:5a:15:10:5b:14:47:73:df:ba:49:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:34:7b:77:e1:c8:e4:83:37:cd:cf:3f:c9:f7:3c:46: 22:c1:30:d8:ae:54:a4:d7:3a:46:45:79:60:ff:ee:e7: f5:c5:29:61:45:ce:fa:50:39:cd:3c:3d:dc:b9:e5:fe: ed:b2:5a:28:cb:bf:4a:15:a7:b0:aa:bb:a9:93:a7:8d: 11:64:52:9e:e5:16:8b:c7:f7:8d:c4:63:dc:c0:34:05: ae:53:c8:21:99:c3:43:1c:94:e8:93:d5:c2:66:6d:ee: 47:2d:f4:b9:72:c7:fb:56:5a:5a:6f:e4:e2:0e:1c:5c: 05:1b:47:40:c1:8b:5c:54:3a:76:f8:70:da:b3:9e:51: 30:48:01:c3:2b:8f:12:c8:fe:cd:e1:5b:b3:0e:38:db: bb:7b:18:30:5a:66:7c:07:76:ba:4b:1e:3d:a6:59:54: 8d:ab:cc:87:e7:e2:68:7d:3d:75:6d:a4:94:88:56:a2: d0:a0:2b:01:fd:63:24:df:02:9f:a2:5e:9e:b1:2a:f3: 5f:28:da:db:86:4b:26:b9:f3:88:94:c8:9c:d0:ab:16: ca:d7:db:f6:77:60:d4:24:07:93:b1:c1:dd:ee:aa:fd: fc:e9:e7:68:06:30:ea:fa:33:8b:97:7d:dd:b5:32:76: f9:6c:08:00:71:70:38:0d:a7:04:97:85:21:33:3c:cf Fingerprint (SHA-256): 69:31:08:C6:68:DC:29:12:A0:76:0E:FB:E5:71:81:8D:E0:9B:68:D7:61:85:00:41:B8:16:B9:1B:15:B7:14:E1 Fingerprint (SHA1): AD:2F:0F:6E:99:15:08:6A:A7:5B:96:1B:61:F7:45:E4:AF:7D:14:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2704: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191473 (0x433ed5f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:17:34 2025 Not After : Thu Nov 28 11:17:34 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ed:23:fc:ef:7c:1e:37:d7:bb:d3:15:d1:76:70:1a: ce:f0:3d:f7:75:ca:fe:c9:99:aa:dd:b7:85:b1:eb:76: b7:8a:0b:1b:3f:19:25:a2:79:c1:1a:c1:8d:2c:f7:d7: 70:4b:2d:93:f6:f5:4c:b8:7d:ce:09:83:96:da:4c:14: e1:07:18:08:a2:f1:cf:22:a5:22:95:da:a7:db:06:29: b8:7b:06:b8:89:60:5d:6f:4c:d6:c7:e4:b7:93:0a:83: c3:9f:ea:f6:51:ad:75:14:47:06:ea:ea:3d:71:42:41: 7f:e2:1e:6b:67:d4:76:17:02:cd:50:9a:e4:16:67:26: a4:99:01:5c:07:0a:93:1c:66:35:b4:ca:26:cc:f9:b6: f1:1a:f9:d5:e4:4e:ed:48:7b:ba:29:d5:10:41:19:12: fb:27:4e:65:ca:2b:f9:72:e8:1b:d2:bd:5c:08:67:75: 91:40:60:f9:07:ee:38:6e:bb:34:36:3f:cf:54:a0:79: c3:f4:a2:68:ac:0e:9f:b2:dc:62:52:3f:8a:b0:fd:50: 42:6d:e2:fd:4d:5a:d5:34:18:ef:ad:98:1a:f9:a5:dd: 2b:fe:8d:b9:3b:da:41:61:34:f2:85:e9:ca:a6:bd:8f: 29:24:63:d2:12:ec:17:04:4a:89:32:d5:5d:59:d9:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:91:d8:5d:21:2a:ae:5e:74:59:d8:84:2f:42:92:a0: e0:4a:e9:72:43:57:9b:43:71:64:4e:fb:05:54:61:0b: b6:34:77:a0:a1:e5:95:56:8f:c3:83:2e:37:67:45:b6: 65:ce:8a:87:7d:29:d1:8b:1f:3a:82:17:e9:99:34:30: 83:b5:67:0d:31:a3:d0:af:bb:a7:56:87:6f:6a:2e:b4: 54:4e:15:48:17:af:d1:62:50:be:48:b1:ac:5f:82:88: a2:0c:01:fc:f4:ed:e0:9b:29:d3:ad:be:7e:38:0c:ef: b0:b4:5d:1c:8f:40:91:3e:d1:0a:c0:97:41:62:47:af: ce:e5:51:c7:b3:73:88:9b:f3:28:c3:87:81:81:0e:49: 62:f7:96:bc:c6:39:20:14:1a:1f:8d:f4:08:c3:f7:23: b7:ab:0f:3a:76:75:34:f1:06:14:ec:8e:ca:f2:1a:47: f0:39:db:e5:5b:6f:62:3a:a5:9d:cd:74:cf:bc:4c:bf: 28:e6:28:84:73:42:40:00:f8:8e:94:62:57:a6:21:02: d5:52:46:53:db:6c:b6:88:cc:9b:70:fb:c9:43:d5:fc: bd:ca:c8:f8:a5:da:7d:63:9a:06:50:ce:c6:75:9c:e1: e7:cb:cf:7d:a7:15:4d:0c:3c:9c:75:03:a7:7f:70:7e Fingerprint (SHA-256): E5:E3:FF:92:4C:98:13:89:06:96:08:83:33:1B:9C:0C:A4:2A:F1:10:47:CB:5F:9F:3D:1E:4D:55:BE:65:92:11 Fingerprint (SHA1): A5:49:B5:FD:56:C1:94:46:38:62:0E:12:CB:1E:7D:DB:D9:91:1E:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #2705: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191469 (0x433ed5ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:17:31 2025 Not After : Thu Nov 28 11:17:31 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:c4:04:46:74:10:ce:60:86:3d:f1:3e:40:ed:b6:a6: 2c:ad:20:66:e3:d0:a0:42:ba:4e:9d:1b:e7:06:31:cd: ff:c3:3f:0f:fa:35:c2:e0:fe:7b:80:65:d1:59:85:a0: 70:8c:c8:14:f3:72:eb:34:37:af:b8:1e:0f:03:90:00: ea:dc:fc:58:28:09:ee:b0:ec:dd:25:04:a6:d8:83:da: 07:b1:f2:aa:3a:a3:1a:eb:03:f3:11:f8:59:60:96:9e: c8:ce:6e:5b:16:e8:f5:97:15:11:4c:9a:ad:6e:3a:6e: 3c:cb:50:38:f5:73:85:86:d8:18:b8:03:6b:48:4c:d5: 0a:b5:62:0f:58:d2:34:cc:e9:aa:da:20:c2:58:c7:14: 6d:c9:5b:b0:3e:91:0f:17:a2:fa:d9:f1:8c:9f:be:d1: 30:39:76:81:5a:1e:c5:65:80:fe:76:4a:c5:b4:06:e3: 9c:ca:5e:a1:3e:32:96:f3:d7:6d:c9:10:ff:af:53:90: f8:6d:1c:09:e8:4d:4e:67:46:89:9b:95:89:7e:74:b9: bd:29:00:72:3f:71:03:65:f1:d7:91:66:e8:b3:45:d9: 67:7b:69:3a:d8:3e:8e:a5:06:1a:63:32:f2:38:b9:a9: e9:64:ed:fc:6d:5a:15:10:5b:14:47:73:df:ba:49:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:34:7b:77:e1:c8:e4:83:37:cd:cf:3f:c9:f7:3c:46: 22:c1:30:d8:ae:54:a4:d7:3a:46:45:79:60:ff:ee:e7: f5:c5:29:61:45:ce:fa:50:39:cd:3c:3d:dc:b9:e5:fe: ed:b2:5a:28:cb:bf:4a:15:a7:b0:aa:bb:a9:93:a7:8d: 11:64:52:9e:e5:16:8b:c7:f7:8d:c4:63:dc:c0:34:05: ae:53:c8:21:99:c3:43:1c:94:e8:93:d5:c2:66:6d:ee: 47:2d:f4:b9:72:c7:fb:56:5a:5a:6f:e4:e2:0e:1c:5c: 05:1b:47:40:c1:8b:5c:54:3a:76:f8:70:da:b3:9e:51: 30:48:01:c3:2b:8f:12:c8:fe:cd:e1:5b:b3:0e:38:db: bb:7b:18:30:5a:66:7c:07:76:ba:4b:1e:3d:a6:59:54: 8d:ab:cc:87:e7:e2:68:7d:3d:75:6d:a4:94:88:56:a2: d0:a0:2b:01:fd:63:24:df:02:9f:a2:5e:9e:b1:2a:f3: 5f:28:da:db:86:4b:26:b9:f3:88:94:c8:9c:d0:ab:16: ca:d7:db:f6:77:60:d4:24:07:93:b1:c1:dd:ee:aa:fd: fc:e9:e7:68:06:30:ea:fa:33:8b:97:7d:dd:b5:32:76: f9:6c:08:00:71:70:38:0d:a7:04:97:85:21:33:3c:cf Fingerprint (SHA-256): 69:31:08:C6:68:DC:29:12:A0:76:0E:FB:E5:71:81:8D:E0:9B:68:D7:61:85:00:41:B8:16:B9:1B:15:B7:14:E1 Fingerprint (SHA1): AD:2F:0F:6E:99:15:08:6A:A7:5B:96:1B:61:F7:45:E4:AF:7D:14:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2706: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #2707: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #2708: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #2709: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #2710: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #2711: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191474 (0x433ed5f2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:17:34 2025 Not After : Thu Nov 28 11:17:34 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:3b:4c:2f:5e:d9:9a:1b:d3:87:d1:9b:1d:2a:e2:c1: 30:19:23:ad:80:e3:da:1c:ad:54:2b:66:49:bd:44:d3: 56:27:3d:2c:fb:d3:1e:14:45:27:8e:fb:fb:c8:61:d9: 01:4d:26:9c:52:e6:84:2f:cd:43:a1:f6:7b:da:ab:ee: 3c:18:cb:0b:21:c6:55:6b:3e:a9:b7:6d:e0:0d:da:73: 06:e4:1b:b1:e8:40:05:0f:6e:84:09:c2:23:0b:16:31: 9a:95:67:43:68:6f:74:46:c0:05:2a:87:4e:15:9c:30: 53:12:b6:bd:46:80:5c:94:ab:d0:ec:42:db:10:e2:09: 32:c2:05:f3:b3:0f:2a:44:8a:9f:bb:90:6d:f2:a3:57: 5d:42:2b:57:fe:52:99:e6:5a:d5:d8:8d:cc:99:f4:07: 94:53:a4:39:84:fe:22:19:cb:1d:92:44:84:e8:ad:d8: 01:fe:4e:d7:9b:57:09:b3:de:90:23:01:b5:5b:a7:64: cf:f0:85:6c:f3:25:24:89:39:48:4d:81:4b:2a:3b:fc: d6:81:1f:6d:7a:52:9e:ea:97:cb:fb:be:ea:6f:0f:7b: ff:6b:f3:8a:40:55:d3:74:0b:40:52:77:ff:da:e1:3c: 02:5f:86:fe:df:63:70:71:62:20:4d:92:d2:ed:90:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:a6:68:ac:e2:4d:2c:a5:70:23:ca:94:c1:ea:9b:4a: d4:6d:95:68:3d:d8:bb:70:41:3b:45:46:29:f3:37:c2: d3:a2:ba:cf:43:0e:d9:7c:54:b9:e1:ac:98:18:5c:2a: 8b:2f:b6:bd:d3:f5:8f:e7:c0:ef:c4:9b:31:d1:d7:ce: a4:1c:3a:87:a2:ed:1f:a8:03:ab:ad:b5:74:96:17:56: 55:e2:1a:f6:47:57:48:c5:aa:d4:b9:a1:7d:2a:69:dc: ad:ae:50:b4:75:42:0a:e7:25:ad:8c:4b:03:c1:91:6c: 56:26:ea:1a:e9:e6:21:bb:2f:fe:42:f7:95:82:d8:ab: 7f:1e:51:03:13:62:6b:35:4e:8c:c8:c5:38:25:13:df: 52:8f:c9:47:d4:63:66:64:e7:48:04:83:fe:d8:c1:d6: 75:51:2d:1a:75:de:ca:75:19:9b:d5:6b:8b:af:a1:f0: 9d:ca:c8:04:3c:cb:32:ad:b2:93:a1:18:2a:0c:e2:e2: 04:a7:06:c2:be:95:73:05:64:91:43:29:48:81:95:68: 7d:7d:43:cd:c8:94:68:1a:52:d8:77:0f:78:65:a5:87: db:99:a3:5c:26:3f:06:b2:62:5c:a2:20:d4:82:f8:2c: b3:ed:f2:8f:20:9f:26:0e:2b:e1:23:a3:2a:93:c7:74 Fingerprint (SHA-256): 7B:35:FB:94:3F:66:F4:17:C2:3F:68:47:F5:B1:F4:94:34:DB:3C:83:C9:9F:E4:63:0A:3A:3A:35:90:1E:83:A9 Fingerprint (SHA1): 50:DE:75:C7:5A:9C:4C:92:BC:60:53:44:9B:3A:89:85:13:7C:94:68 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #2712: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #2713: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #2714: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #2715: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #2716: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #2717: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2718: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2719: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #2720: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2721: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2722: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #2723: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2724: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2725: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2726: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2727: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2728: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #2729: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2730: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2731: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2732: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2733: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #2734: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2735: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #2736: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #2737: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2215940 at Fri Nov 28 19:17:39 CST 2025 kill -USR1 2215940 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2215940 killed at Fri Nov 28 19:17:39 CST 2025 httpserv starting at Fri Nov 28 19:17:39 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:17:39 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2228491 >/dev/null 2>/dev/null httpserv with PID 2228491 found at Fri Nov 28 19:17:39 CST 2025 httpserv with PID 2228491 started at Fri Nov 28 19:17:39 CST 2025 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #2738: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2739: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191476 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2740: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2741: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2742: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191477 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2743: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2744: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2745: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2746: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191478 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2747: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2748: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191479 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2749: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2750: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2751: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2752: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2753: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128191480 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2754: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2755: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2756: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2757: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2758: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191477 (0x433ed5f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ea:c5:3e:57:6e:b2:eb:ea:97:81:3c:71:1e:56:ae: 17:5e:b7:cf:87:0a:71:cb:e9:66:bd:e5:58:b5:b8:39: c1:e7:f7:c3:65:15:58:66:44:d8:cf:11:64:cd:6c:07: 43:4d:39:42:17:e5:46:8b:2f:81:56:54:62:ce:43:4f: 27:a5:b6:ef:1d:2a:1b:12:f1:d7:03:2a:6e:fc:c5:1d: 1b:0e:09:93:1d:08:37:9e:31:95:ad:2a:f8:2e:6b:9a: 6d:7f:ed:79:6e:1d:a9:b0:70:a9:41:54:1a:5d:97:3c: 6b:d3:20:c0:67:56:ee:f7:be:f7:85:1c:25:07:3c:92: 0a:6b:74:12:44:db:92:85:d2:8d:3d:2e:f2:c5:72:ec: 75:2b:57:b3:b7:05:5d:ad:70:cd:06:0e:7e:ef:01:37: 34:35:21:38:a5:a0:ee:4f:5f:5f:c9:86:73:68:e4:93: ad:f7:66:d8:cb:37:56:81:6b:ff:ea:7b:de:99:70:41: cc:3a:65:27:dc:8b:64:b4:41:e9:16:d6:35:4b:fd:1c: 75:73:5c:c7:38:a7:d9:0c:c0:11:04:59:22:5e:65:72: 08:b0:aa:5e:af:17:a2:ed:5c:ae:56:0d:93:6f:b0:d7: 7a:67:9c:2c:c6:c2:4a:92:d1:f8:23:37:23:08:f7:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:58:df:79:ba:0b:81:cd:18:9e:8d:68:f3:68:0b:10: f7:6d:0c:b1:ee:1c:d1:8a:da:94:62:a8:f5:92:ac:ef: 61:5a:ce:be:6c:fc:b2:e6:42:ac:7c:a7:96:32:e3:9a: 1b:42:f8:7d:4e:25:98:9c:78:b3:fb:38:2e:fa:d1:89: 59:48:43:6c:43:63:da:a8:85:b3:00:4d:46:d4:e8:c1: 1f:db:b3:6c:c4:17:27:22:62:13:4f:3c:dc:1e:62:dd: 8b:c9:29:82:3a:6d:7d:5d:6c:44:c9:77:13:41:69:0f: 82:38:e3:9a:74:06:a5:39:e4:38:8c:9c:f4:3d:10:7c: 1b:52:34:53:a7:05:78:b9:67:df:61:8c:b5:54:7a:b6: ee:66:a1:80:ea:c3:be:5d:07:a0:f6:94:39:36:ee:b4: 6b:d8:23:6d:8d:51:96:2d:ff:60:37:a1:bc:2b:39:8d: c7:63:6b:5a:96:7f:b2:73:a5:9f:ab:bd:45:a5:98:88: b8:f9:a1:22:03:24:7d:e0:8b:6c:84:2c:34:39:72:0c: 55:fd:00:8a:3f:6a:08:9f:dc:d0:3b:ee:ce:72:05:21: 3a:92:7d:51:fe:45:5d:2a:58:1e:33:e6:24:57:65:ab: 78:8b:b5:ea:69:ca:56:39:e7:8e:3a:7d:fd:6c:66:98 Fingerprint (SHA-256): B0:ED:99:FE:C9:B1:2C:7D:2F:57:C4:85:35:50:AE:8B:E1:3A:BE:77:E5:8A:9E:1D:14:76:DC:AD:0A:D0:7B:EB Fingerprint (SHA1): 41:B5:90:86:19:E5:F9:EB:76:4E:B3:BC:40:94:0B:B0:7F:A7:BE:3F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2759: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191476 (0x433ed5f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:56:49:1d:d8:4e:bf:34:8f:1b:4d:8e:1e:71:a0:03: 34:36:54:db:f5:d6:ac:f7:41:50:35:e9:ca:a5:cf:1f: 26:93:da:bc:37:72:b8:40:78:c6:06:1a:0a:c7:53:aa: 01:84:e5:11:e8:d1:df:97:e8:f0:53:82:bc:cc:55:af: cd:2b:c4:42:eb:cb:c0:29:fb:7f:a7:b5:5c:dc:1a:3e: dd:db:a4:a0:12:73:58:3a:15:c7:50:ed:f6:1e:50:6b: 41:8b:db:09:f1:a2:df:8b:83:6c:a7:54:df:d8:2b:ff: 77:60:01:3b:0f:54:20:d2:ed:0a:ac:f3:2b:19:d3:f3: b5:a1:65:ba:40:3b:dc:38:b1:c4:f0:a4:e1:dc:55:10: 1b:ad:39:d2:cb:db:e1:d7:cb:96:69:51:d2:77:37:d5: ac:e0:29:0d:3b:34:19:67:ff:f2:32:b1:6a:68:73:47: 64:82:1f:54:42:08:df:94:fb:70:20:14:be:64:39:8e: cd:2b:f0:eb:1d:c6:8e:d8:82:e8:8b:61:06:86:ee:7d: 8a:5c:3d:d5:fb:ce:70:c4:73:66:6f:74:a6:e1:b0:84: cf:5f:b9:38:2d:e9:a3:0a:b6:5a:61:94:ee:35:13:6e: 00:3a:22:7c:20:7f:95:79:66:1b:a6:f5:76:84:c6:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:a9:70:e4:d7:6e:9d:2a:8b:5e:a6:ae:69:74:90:f1: 1f:45:8b:63:cb:6a:01:e6:d3:0a:ca:94:25:bb:1f:76: 33:5b:58:64:d9:ff:76:3b:c7:90:66:e2:32:27:14:38: 6b:1b:c3:c9:87:65:c1:53:ef:4e:61:52:f2:c6:74:a3: 5d:21:67:dc:50:79:f2:fb:e0:b8:0d:11:2b:90:ff:54: a4:d6:03:3f:ac:23:91:71:84:ee:b3:8d:0e:e5:da:9f: d4:ec:70:73:b7:e8:f8:46:de:c3:e7:5b:53:81:53:5a: 03:7a:72:1f:2e:49:cc:90:5d:ba:10:53:42:22:87:c4: d7:f1:4c:ac:3d:1f:35:cb:a7:25:03:69:15:c4:72:c0: 46:b0:e8:16:30:fd:c6:28:7c:c9:fc:93:6b:d8:2d:c3: 45:3b:c0:27:a2:3c:47:5a:d7:73:9b:2e:42:b7:f0:46: 17:4a:b9:cc:ac:82:8a:3c:66:78:a3:cd:6e:0d:f0:6e: e1:08:c6:ac:cd:51:cc:e3:22:a7:28:dd:41:85:e3:98: 93:ba:67:89:b3:24:a6:ec:0c:20:4f:ca:d7:5c:7c:3d: b0:58:0e:a9:f2:19:11:0e:81:1c:ea:14:5b:82:e4:13: 05:5c:91:e3:56:65:cd:a0:71:d7:47:cc:fa:b5:94:5c Fingerprint (SHA-256): BB:E5:79:53:54:43:2A:BF:1C:F3:90:C9:DE:24:31:78:F5:29:7A:DD:70:8C:B3:6A:22:D5:97:15:E9:66:2F:8A Fingerprint (SHA1): 31:FD:52:B2:7D:7E:24:E1:C4:04:C0:E1:D5:89:40:32:9E:CD:07:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2760: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2761: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2762: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2763: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191476 (0x433ed5f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:56:49:1d:d8:4e:bf:34:8f:1b:4d:8e:1e:71:a0:03: 34:36:54:db:f5:d6:ac:f7:41:50:35:e9:ca:a5:cf:1f: 26:93:da:bc:37:72:b8:40:78:c6:06:1a:0a:c7:53:aa: 01:84:e5:11:e8:d1:df:97:e8:f0:53:82:bc:cc:55:af: cd:2b:c4:42:eb:cb:c0:29:fb:7f:a7:b5:5c:dc:1a:3e: dd:db:a4:a0:12:73:58:3a:15:c7:50:ed:f6:1e:50:6b: 41:8b:db:09:f1:a2:df:8b:83:6c:a7:54:df:d8:2b:ff: 77:60:01:3b:0f:54:20:d2:ed:0a:ac:f3:2b:19:d3:f3: b5:a1:65:ba:40:3b:dc:38:b1:c4:f0:a4:e1:dc:55:10: 1b:ad:39:d2:cb:db:e1:d7:cb:96:69:51:d2:77:37:d5: ac:e0:29:0d:3b:34:19:67:ff:f2:32:b1:6a:68:73:47: 64:82:1f:54:42:08:df:94:fb:70:20:14:be:64:39:8e: cd:2b:f0:eb:1d:c6:8e:d8:82:e8:8b:61:06:86:ee:7d: 8a:5c:3d:d5:fb:ce:70:c4:73:66:6f:74:a6:e1:b0:84: cf:5f:b9:38:2d:e9:a3:0a:b6:5a:61:94:ee:35:13:6e: 00:3a:22:7c:20:7f:95:79:66:1b:a6:f5:76:84:c6:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:a9:70:e4:d7:6e:9d:2a:8b:5e:a6:ae:69:74:90:f1: 1f:45:8b:63:cb:6a:01:e6:d3:0a:ca:94:25:bb:1f:76: 33:5b:58:64:d9:ff:76:3b:c7:90:66:e2:32:27:14:38: 6b:1b:c3:c9:87:65:c1:53:ef:4e:61:52:f2:c6:74:a3: 5d:21:67:dc:50:79:f2:fb:e0:b8:0d:11:2b:90:ff:54: a4:d6:03:3f:ac:23:91:71:84:ee:b3:8d:0e:e5:da:9f: d4:ec:70:73:b7:e8:f8:46:de:c3:e7:5b:53:81:53:5a: 03:7a:72:1f:2e:49:cc:90:5d:ba:10:53:42:22:87:c4: d7:f1:4c:ac:3d:1f:35:cb:a7:25:03:69:15:c4:72:c0: 46:b0:e8:16:30:fd:c6:28:7c:c9:fc:93:6b:d8:2d:c3: 45:3b:c0:27:a2:3c:47:5a:d7:73:9b:2e:42:b7:f0:46: 17:4a:b9:cc:ac:82:8a:3c:66:78:a3:cd:6e:0d:f0:6e: e1:08:c6:ac:cd:51:cc:e3:22:a7:28:dd:41:85:e3:98: 93:ba:67:89:b3:24:a6:ec:0c:20:4f:ca:d7:5c:7c:3d: b0:58:0e:a9:f2:19:11:0e:81:1c:ea:14:5b:82:e4:13: 05:5c:91:e3:56:65:cd:a0:71:d7:47:cc:fa:b5:94:5c Fingerprint (SHA-256): BB:E5:79:53:54:43:2A:BF:1C:F3:90:C9:DE:24:31:78:F5:29:7A:DD:70:8C:B3:6A:22:D5:97:15:E9:66:2F:8A Fingerprint (SHA1): 31:FD:52:B2:7D:7E:24:E1:C4:04:C0:E1:D5:89:40:32:9E:CD:07:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2764: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191477 (0x433ed5f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ea:c5:3e:57:6e:b2:eb:ea:97:81:3c:71:1e:56:ae: 17:5e:b7:cf:87:0a:71:cb:e9:66:bd:e5:58:b5:b8:39: c1:e7:f7:c3:65:15:58:66:44:d8:cf:11:64:cd:6c:07: 43:4d:39:42:17:e5:46:8b:2f:81:56:54:62:ce:43:4f: 27:a5:b6:ef:1d:2a:1b:12:f1:d7:03:2a:6e:fc:c5:1d: 1b:0e:09:93:1d:08:37:9e:31:95:ad:2a:f8:2e:6b:9a: 6d:7f:ed:79:6e:1d:a9:b0:70:a9:41:54:1a:5d:97:3c: 6b:d3:20:c0:67:56:ee:f7:be:f7:85:1c:25:07:3c:92: 0a:6b:74:12:44:db:92:85:d2:8d:3d:2e:f2:c5:72:ec: 75:2b:57:b3:b7:05:5d:ad:70:cd:06:0e:7e:ef:01:37: 34:35:21:38:a5:a0:ee:4f:5f:5f:c9:86:73:68:e4:93: ad:f7:66:d8:cb:37:56:81:6b:ff:ea:7b:de:99:70:41: cc:3a:65:27:dc:8b:64:b4:41:e9:16:d6:35:4b:fd:1c: 75:73:5c:c7:38:a7:d9:0c:c0:11:04:59:22:5e:65:72: 08:b0:aa:5e:af:17:a2:ed:5c:ae:56:0d:93:6f:b0:d7: 7a:67:9c:2c:c6:c2:4a:92:d1:f8:23:37:23:08:f7:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:58:df:79:ba:0b:81:cd:18:9e:8d:68:f3:68:0b:10: f7:6d:0c:b1:ee:1c:d1:8a:da:94:62:a8:f5:92:ac:ef: 61:5a:ce:be:6c:fc:b2:e6:42:ac:7c:a7:96:32:e3:9a: 1b:42:f8:7d:4e:25:98:9c:78:b3:fb:38:2e:fa:d1:89: 59:48:43:6c:43:63:da:a8:85:b3:00:4d:46:d4:e8:c1: 1f:db:b3:6c:c4:17:27:22:62:13:4f:3c:dc:1e:62:dd: 8b:c9:29:82:3a:6d:7d:5d:6c:44:c9:77:13:41:69:0f: 82:38:e3:9a:74:06:a5:39:e4:38:8c:9c:f4:3d:10:7c: 1b:52:34:53:a7:05:78:b9:67:df:61:8c:b5:54:7a:b6: ee:66:a1:80:ea:c3:be:5d:07:a0:f6:94:39:36:ee:b4: 6b:d8:23:6d:8d:51:96:2d:ff:60:37:a1:bc:2b:39:8d: c7:63:6b:5a:96:7f:b2:73:a5:9f:ab:bd:45:a5:98:88: b8:f9:a1:22:03:24:7d:e0:8b:6c:84:2c:34:39:72:0c: 55:fd:00:8a:3f:6a:08:9f:dc:d0:3b:ee:ce:72:05:21: 3a:92:7d:51:fe:45:5d:2a:58:1e:33:e6:24:57:65:ab: 78:8b:b5:ea:69:ca:56:39:e7:8e:3a:7d:fd:6c:66:98 Fingerprint (SHA-256): B0:ED:99:FE:C9:B1:2C:7D:2F:57:C4:85:35:50:AE:8B:E1:3A:BE:77:E5:8A:9E:1D:14:76:DC:AD:0A:D0:7B:EB Fingerprint (SHA1): 41:B5:90:86:19:E5:F9:EB:76:4E:B3:BC:40:94:0B:B0:7F:A7:BE:3F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2765: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2766: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2767: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2768: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2769: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2770: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191477 (0x433ed5f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ea:c5:3e:57:6e:b2:eb:ea:97:81:3c:71:1e:56:ae: 17:5e:b7:cf:87:0a:71:cb:e9:66:bd:e5:58:b5:b8:39: c1:e7:f7:c3:65:15:58:66:44:d8:cf:11:64:cd:6c:07: 43:4d:39:42:17:e5:46:8b:2f:81:56:54:62:ce:43:4f: 27:a5:b6:ef:1d:2a:1b:12:f1:d7:03:2a:6e:fc:c5:1d: 1b:0e:09:93:1d:08:37:9e:31:95:ad:2a:f8:2e:6b:9a: 6d:7f:ed:79:6e:1d:a9:b0:70:a9:41:54:1a:5d:97:3c: 6b:d3:20:c0:67:56:ee:f7:be:f7:85:1c:25:07:3c:92: 0a:6b:74:12:44:db:92:85:d2:8d:3d:2e:f2:c5:72:ec: 75:2b:57:b3:b7:05:5d:ad:70:cd:06:0e:7e:ef:01:37: 34:35:21:38:a5:a0:ee:4f:5f:5f:c9:86:73:68:e4:93: ad:f7:66:d8:cb:37:56:81:6b:ff:ea:7b:de:99:70:41: cc:3a:65:27:dc:8b:64:b4:41:e9:16:d6:35:4b:fd:1c: 75:73:5c:c7:38:a7:d9:0c:c0:11:04:59:22:5e:65:72: 08:b0:aa:5e:af:17:a2:ed:5c:ae:56:0d:93:6f:b0:d7: 7a:67:9c:2c:c6:c2:4a:92:d1:f8:23:37:23:08:f7:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:58:df:79:ba:0b:81:cd:18:9e:8d:68:f3:68:0b:10: f7:6d:0c:b1:ee:1c:d1:8a:da:94:62:a8:f5:92:ac:ef: 61:5a:ce:be:6c:fc:b2:e6:42:ac:7c:a7:96:32:e3:9a: 1b:42:f8:7d:4e:25:98:9c:78:b3:fb:38:2e:fa:d1:89: 59:48:43:6c:43:63:da:a8:85:b3:00:4d:46:d4:e8:c1: 1f:db:b3:6c:c4:17:27:22:62:13:4f:3c:dc:1e:62:dd: 8b:c9:29:82:3a:6d:7d:5d:6c:44:c9:77:13:41:69:0f: 82:38:e3:9a:74:06:a5:39:e4:38:8c:9c:f4:3d:10:7c: 1b:52:34:53:a7:05:78:b9:67:df:61:8c:b5:54:7a:b6: ee:66:a1:80:ea:c3:be:5d:07:a0:f6:94:39:36:ee:b4: 6b:d8:23:6d:8d:51:96:2d:ff:60:37:a1:bc:2b:39:8d: c7:63:6b:5a:96:7f:b2:73:a5:9f:ab:bd:45:a5:98:88: b8:f9:a1:22:03:24:7d:e0:8b:6c:84:2c:34:39:72:0c: 55:fd:00:8a:3f:6a:08:9f:dc:d0:3b:ee:ce:72:05:21: 3a:92:7d:51:fe:45:5d:2a:58:1e:33:e6:24:57:65:ab: 78:8b:b5:ea:69:ca:56:39:e7:8e:3a:7d:fd:6c:66:98 Fingerprint (SHA-256): B0:ED:99:FE:C9:B1:2C:7D:2F:57:C4:85:35:50:AE:8B:E1:3A:BE:77:E5:8A:9E:1D:14:76:DC:AD:0A:D0:7B:EB Fingerprint (SHA1): 41:B5:90:86:19:E5:F9:EB:76:4E:B3:BC:40:94:0B:B0:7F:A7:BE:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2771: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191477 (0x433ed5f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ea:c5:3e:57:6e:b2:eb:ea:97:81:3c:71:1e:56:ae: 17:5e:b7:cf:87:0a:71:cb:e9:66:bd:e5:58:b5:b8:39: c1:e7:f7:c3:65:15:58:66:44:d8:cf:11:64:cd:6c:07: 43:4d:39:42:17:e5:46:8b:2f:81:56:54:62:ce:43:4f: 27:a5:b6:ef:1d:2a:1b:12:f1:d7:03:2a:6e:fc:c5:1d: 1b:0e:09:93:1d:08:37:9e:31:95:ad:2a:f8:2e:6b:9a: 6d:7f:ed:79:6e:1d:a9:b0:70:a9:41:54:1a:5d:97:3c: 6b:d3:20:c0:67:56:ee:f7:be:f7:85:1c:25:07:3c:92: 0a:6b:74:12:44:db:92:85:d2:8d:3d:2e:f2:c5:72:ec: 75:2b:57:b3:b7:05:5d:ad:70:cd:06:0e:7e:ef:01:37: 34:35:21:38:a5:a0:ee:4f:5f:5f:c9:86:73:68:e4:93: ad:f7:66:d8:cb:37:56:81:6b:ff:ea:7b:de:99:70:41: cc:3a:65:27:dc:8b:64:b4:41:e9:16:d6:35:4b:fd:1c: 75:73:5c:c7:38:a7:d9:0c:c0:11:04:59:22:5e:65:72: 08:b0:aa:5e:af:17:a2:ed:5c:ae:56:0d:93:6f:b0:d7: 7a:67:9c:2c:c6:c2:4a:92:d1:f8:23:37:23:08:f7:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:58:df:79:ba:0b:81:cd:18:9e:8d:68:f3:68:0b:10: f7:6d:0c:b1:ee:1c:d1:8a:da:94:62:a8:f5:92:ac:ef: 61:5a:ce:be:6c:fc:b2:e6:42:ac:7c:a7:96:32:e3:9a: 1b:42:f8:7d:4e:25:98:9c:78:b3:fb:38:2e:fa:d1:89: 59:48:43:6c:43:63:da:a8:85:b3:00:4d:46:d4:e8:c1: 1f:db:b3:6c:c4:17:27:22:62:13:4f:3c:dc:1e:62:dd: 8b:c9:29:82:3a:6d:7d:5d:6c:44:c9:77:13:41:69:0f: 82:38:e3:9a:74:06:a5:39:e4:38:8c:9c:f4:3d:10:7c: 1b:52:34:53:a7:05:78:b9:67:df:61:8c:b5:54:7a:b6: ee:66:a1:80:ea:c3:be:5d:07:a0:f6:94:39:36:ee:b4: 6b:d8:23:6d:8d:51:96:2d:ff:60:37:a1:bc:2b:39:8d: c7:63:6b:5a:96:7f:b2:73:a5:9f:ab:bd:45:a5:98:88: b8:f9:a1:22:03:24:7d:e0:8b:6c:84:2c:34:39:72:0c: 55:fd:00:8a:3f:6a:08:9f:dc:d0:3b:ee:ce:72:05:21: 3a:92:7d:51:fe:45:5d:2a:58:1e:33:e6:24:57:65:ab: 78:8b:b5:ea:69:ca:56:39:e7:8e:3a:7d:fd:6c:66:98 Fingerprint (SHA-256): B0:ED:99:FE:C9:B1:2C:7D:2F:57:C4:85:35:50:AE:8B:E1:3A:BE:77:E5:8A:9E:1D:14:76:DC:AD:0A:D0:7B:EB Fingerprint (SHA1): 41:B5:90:86:19:E5:F9:EB:76:4E:B3:BC:40:94:0B:B0:7F:A7:BE:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2772: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2773: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2774: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2775: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2776: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2777: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191476 (0x433ed5f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:56:49:1d:d8:4e:bf:34:8f:1b:4d:8e:1e:71:a0:03: 34:36:54:db:f5:d6:ac:f7:41:50:35:e9:ca:a5:cf:1f: 26:93:da:bc:37:72:b8:40:78:c6:06:1a:0a:c7:53:aa: 01:84:e5:11:e8:d1:df:97:e8:f0:53:82:bc:cc:55:af: cd:2b:c4:42:eb:cb:c0:29:fb:7f:a7:b5:5c:dc:1a:3e: dd:db:a4:a0:12:73:58:3a:15:c7:50:ed:f6:1e:50:6b: 41:8b:db:09:f1:a2:df:8b:83:6c:a7:54:df:d8:2b:ff: 77:60:01:3b:0f:54:20:d2:ed:0a:ac:f3:2b:19:d3:f3: b5:a1:65:ba:40:3b:dc:38:b1:c4:f0:a4:e1:dc:55:10: 1b:ad:39:d2:cb:db:e1:d7:cb:96:69:51:d2:77:37:d5: ac:e0:29:0d:3b:34:19:67:ff:f2:32:b1:6a:68:73:47: 64:82:1f:54:42:08:df:94:fb:70:20:14:be:64:39:8e: cd:2b:f0:eb:1d:c6:8e:d8:82:e8:8b:61:06:86:ee:7d: 8a:5c:3d:d5:fb:ce:70:c4:73:66:6f:74:a6:e1:b0:84: cf:5f:b9:38:2d:e9:a3:0a:b6:5a:61:94:ee:35:13:6e: 00:3a:22:7c:20:7f:95:79:66:1b:a6:f5:76:84:c6:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:a9:70:e4:d7:6e:9d:2a:8b:5e:a6:ae:69:74:90:f1: 1f:45:8b:63:cb:6a:01:e6:d3:0a:ca:94:25:bb:1f:76: 33:5b:58:64:d9:ff:76:3b:c7:90:66:e2:32:27:14:38: 6b:1b:c3:c9:87:65:c1:53:ef:4e:61:52:f2:c6:74:a3: 5d:21:67:dc:50:79:f2:fb:e0:b8:0d:11:2b:90:ff:54: a4:d6:03:3f:ac:23:91:71:84:ee:b3:8d:0e:e5:da:9f: d4:ec:70:73:b7:e8:f8:46:de:c3:e7:5b:53:81:53:5a: 03:7a:72:1f:2e:49:cc:90:5d:ba:10:53:42:22:87:c4: d7:f1:4c:ac:3d:1f:35:cb:a7:25:03:69:15:c4:72:c0: 46:b0:e8:16:30:fd:c6:28:7c:c9:fc:93:6b:d8:2d:c3: 45:3b:c0:27:a2:3c:47:5a:d7:73:9b:2e:42:b7:f0:46: 17:4a:b9:cc:ac:82:8a:3c:66:78:a3:cd:6e:0d:f0:6e: e1:08:c6:ac:cd:51:cc:e3:22:a7:28:dd:41:85:e3:98: 93:ba:67:89:b3:24:a6:ec:0c:20:4f:ca:d7:5c:7c:3d: b0:58:0e:a9:f2:19:11:0e:81:1c:ea:14:5b:82:e4:13: 05:5c:91:e3:56:65:cd:a0:71:d7:47:cc:fa:b5:94:5c Fingerprint (SHA-256): BB:E5:79:53:54:43:2A:BF:1C:F3:90:C9:DE:24:31:78:F5:29:7A:DD:70:8C:B3:6A:22:D5:97:15:E9:66:2F:8A Fingerprint (SHA1): 31:FD:52:B2:7D:7E:24:E1:C4:04:C0:E1:D5:89:40:32:9E:CD:07:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2778: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191476 (0x433ed5f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:17:40 2025 Not After : Thu Nov 28 11:17:40 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:56:49:1d:d8:4e:bf:34:8f:1b:4d:8e:1e:71:a0:03: 34:36:54:db:f5:d6:ac:f7:41:50:35:e9:ca:a5:cf:1f: 26:93:da:bc:37:72:b8:40:78:c6:06:1a:0a:c7:53:aa: 01:84:e5:11:e8:d1:df:97:e8:f0:53:82:bc:cc:55:af: cd:2b:c4:42:eb:cb:c0:29:fb:7f:a7:b5:5c:dc:1a:3e: dd:db:a4:a0:12:73:58:3a:15:c7:50:ed:f6:1e:50:6b: 41:8b:db:09:f1:a2:df:8b:83:6c:a7:54:df:d8:2b:ff: 77:60:01:3b:0f:54:20:d2:ed:0a:ac:f3:2b:19:d3:f3: b5:a1:65:ba:40:3b:dc:38:b1:c4:f0:a4:e1:dc:55:10: 1b:ad:39:d2:cb:db:e1:d7:cb:96:69:51:d2:77:37:d5: ac:e0:29:0d:3b:34:19:67:ff:f2:32:b1:6a:68:73:47: 64:82:1f:54:42:08:df:94:fb:70:20:14:be:64:39:8e: cd:2b:f0:eb:1d:c6:8e:d8:82:e8:8b:61:06:86:ee:7d: 8a:5c:3d:d5:fb:ce:70:c4:73:66:6f:74:a6:e1:b0:84: cf:5f:b9:38:2d:e9:a3:0a:b6:5a:61:94:ee:35:13:6e: 00:3a:22:7c:20:7f:95:79:66:1b:a6:f5:76:84:c6:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:a9:70:e4:d7:6e:9d:2a:8b:5e:a6:ae:69:74:90:f1: 1f:45:8b:63:cb:6a:01:e6:d3:0a:ca:94:25:bb:1f:76: 33:5b:58:64:d9:ff:76:3b:c7:90:66:e2:32:27:14:38: 6b:1b:c3:c9:87:65:c1:53:ef:4e:61:52:f2:c6:74:a3: 5d:21:67:dc:50:79:f2:fb:e0:b8:0d:11:2b:90:ff:54: a4:d6:03:3f:ac:23:91:71:84:ee:b3:8d:0e:e5:da:9f: d4:ec:70:73:b7:e8:f8:46:de:c3:e7:5b:53:81:53:5a: 03:7a:72:1f:2e:49:cc:90:5d:ba:10:53:42:22:87:c4: d7:f1:4c:ac:3d:1f:35:cb:a7:25:03:69:15:c4:72:c0: 46:b0:e8:16:30:fd:c6:28:7c:c9:fc:93:6b:d8:2d:c3: 45:3b:c0:27:a2:3c:47:5a:d7:73:9b:2e:42:b7:f0:46: 17:4a:b9:cc:ac:82:8a:3c:66:78:a3:cd:6e:0d:f0:6e: e1:08:c6:ac:cd:51:cc:e3:22:a7:28:dd:41:85:e3:98: 93:ba:67:89:b3:24:a6:ec:0c:20:4f:ca:d7:5c:7c:3d: b0:58:0e:a9:f2:19:11:0e:81:1c:ea:14:5b:82:e4:13: 05:5c:91:e3:56:65:cd:a0:71:d7:47:cc:fa:b5:94:5c Fingerprint (SHA-256): BB:E5:79:53:54:43:2A:BF:1C:F3:90:C9:DE:24:31:78:F5:29:7A:DD:70:8C:B3:6A:22:D5:97:15:E9:66:2F:8A Fingerprint (SHA1): 31:FD:52:B2:7D:7E:24:E1:C4:04:C0:E1:D5:89:40:32:9E:CD:07:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2779: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2780: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191481 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2781: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2782: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2783: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191482 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2784: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2785: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2786: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191483 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2787: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2788: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2789: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191484 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2790: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2791: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2792: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191485 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2793: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2794: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2795: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191486 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2796: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2797: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2798: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191487 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2799: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2800: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2801: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191488 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2802: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2803: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2804: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191489 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2805: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2806: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2807: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2808: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128191490 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2809: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2810: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128191491 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2811: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2812: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128191492 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2813: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2814: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2815: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2816: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2817: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128191493 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2818: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2819: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128191494 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2820: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2821: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128191495 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2822: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2823: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #2824: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #2825: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2826: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128191496 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2827: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2828: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128191497 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2829: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2830: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128191498 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2831: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2832: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #2833: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #2834: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2835: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128191499 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2836: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2837: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128191500 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2838: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2839: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128191501 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2840: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2841: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2842: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2843: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2844: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128191502 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2845: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2846: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2847: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2848: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191503 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2849: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2850: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191481 (0x433ed5f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:17:44 2025 Not After : Thu Nov 28 11:17:44 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:71:2c:06:47:1a:a7:98:b1:1f:9c:a4:49:fe:90:90: f0:1f:d9:0e:a9:d5:d3:e2:d7:90:5f:c8:ff:17:ef:65: ce:0a:4d:bf:bc:3e:15:64:ca:5a:36:aa:18:43:fb:78: c0:4e:c1:7b:a7:ab:14:21:42:81:25:98:0d:d8:66:cc: da:90:57:af:82:ea:d8:4a:92:f5:cb:18:e2:ef:61:e4: 03:54:46:67:b0:4d:be:e7:72:1e:18:c1:99:82:9b:c8: 51:c7:a8:f7:ce:34:3c:ae:8a:73:bc:3e:4f:da:8a:8d: 09:49:c3:16:3e:a5:4e:3f:8d:03:d0:1a:c8:8c:40:f9: 15:c3:e8:59:f7:f2:54:53:9e:b5:3a:09:b0:2c:e4:8d: 1c:f6:2f:d5:ed:82:66:51:f2:15:50:7f:91:9f:11:13: 20:f1:04:8b:05:14:be:ad:b9:6b:81:2b:06:f4:f8:07: 9f:81:90:9a:1f:b8:28:04:60:fc:b9:b2:3f:25:c2:f0: 75:23:c2:5d:25:43:94:e9:2a:a8:a0:12:0d:2c:24:13: 20:c1:85:c4:dd:6d:a6:6f:6c:51:7f:bb:5b:9e:a9:2a: 11:79:ce:6b:14:43:01:3d:c4:96:47:d1:60:e3:3d:08: 40:48:6c:78:98:2a:97:a3:12:a3:31:73:d3:6f:76:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:78:8a:c3:84:af:f1:fb:c0:6a:02:e7:ba:6c:10:9b: 35:91:a8:21:08:4a:e8:43:90:95:8e:cc:cd:ed:d3:35: a2:13:b0:1c:87:ac:de:ee:33:7f:54:89:ee:96:dd:4b: 49:6a:26:1f:5b:25:35:1c:62:ff:d0:1a:a7:0b:2c:55: 7f:4a:24:a6:28:80:08:21:5f:95:ee:e1:2e:7a:38:f2: f0:34:0f:fb:c9:1b:3d:38:f2:55:fb:23:16:b3:f1:5c: a5:87:63:96:cb:c3:92:b1:cd:8a:7f:50:98:fc:c7:a3: b1:aa:05:b4:f8:c3:29:de:87:38:a6:dd:77:ed:b2:9f: 1d:b9:1c:0e:19:f4:db:20:03:a4:59:e8:07:55:24:cd: 71:75:9b:5f:cb:4f:22:d8:df:9e:d3:97:7f:8b:2e:1b: 82:23:fa:c8:d5:c3:99:8d:88:93:5d:b8:37:ef:02:09: d8:8b:1b:4d:e3:a6:83:23:9f:fe:2f:54:9d:1d:8e:4d: e8:17:80:3d:99:ed:4b:14:cd:68:4a:cf:fc:7e:fb:52: 5b:ad:cb:99:87:69:b2:f6:b5:cf:ce:41:84:ed:b7:a6: fa:d1:84:de:63:8f:36:09:2e:77:ec:dd:d5:cd:48:db: 01:4f:f3:b1:77:c9:ed:1c:2f:7f:8e:26:25:f0:30:a8 Fingerprint (SHA-256): F9:B7:5C:41:39:3E:F4:37:DE:39:32:C4:9B:10:C6:5B:83:F6:90:D0:99:9D:BE:D7:98:A4:98:4B:EB:9B:55:74 Fingerprint (SHA1): 02:A9:EF:D7:BA:26:8F:5E:2B:0F:39:2F:AB:4B:6F:C7:03:4D:64:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2851: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191482 (0x433ed5fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:17:44 2025 Not After : Thu Nov 28 11:17:44 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:e9:8a:33:03:f0:e1:89:65:47:36:29:aa:4a:89:1d: 9c:c0:a2:5d:77:7b:a0:be:ab:7d:0a:5d:dc:26:a4:d6: 9d:7e:8c:b5:65:44:63:6e:23:81:c0:41:5f:e7:54:a7: 09:a0:66:6e:24:10:0c:21:b1:ac:99:25:c9:f8:eb:93: ce:4b:8c:1d:50:02:bb:7b:80:52:32:cc:0c:60:16:dc: 21:79:87:71:f3:1c:cf:f8:01:8f:34:74:03:08:fb:fc: d1:ef:61:b5:94:58:9e:03:84:0f:e5:ad:08:40:21:cd: 16:b8:24:fb:87:33:e9:09:ff:da:e7:5c:61:54:37:8a: c2:30:7e:b1:9b:f9:0f:02:f5:22:b8:a3:62:77:1f:ae: d0:d8:b8:36:b5:0e:b7:0e:4b:dd:0a:f5:a3:49:5d:98: f6:64:ff:c6:9f:2c:2f:71:1e:dd:b4:45:c0:74:52:30: 79:ad:ff:7c:7b:85:3d:d4:8f:47:af:d9:36:08:00:2d: c8:80:05:e0:f1:51:a2:58:35:a4:c9:c1:b0:ba:96:a6: 76:15:f7:38:e8:d1:c1:1d:11:66:79:88:28:df:99:f8: 87:36:72:50:8e:ee:1e:cc:f7:bd:e9:4a:f6:f5:99:d6: 89:43:79:b1:9f:9c:d1:21:9b:2e:93:7a:5b:15:d0:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:cb:e7:2d:1b:01:59:2e:d1:28:03:67:50:4b:8c:6b: d2:fb:4c:5c:2d:54:ac:f6:11:52:2a:c7:99:ca:be:f9: d7:54:01:13:e4:1f:56:44:ba:64:ec:0d:64:ce:5a:5a: 63:bd:00:36:22:8c:be:3d:d2:76:1c:1a:c5:29:6f:c9: 29:70:9a:2c:f5:33:d0:61:77:9e:9b:07:be:e6:e7:1a: 1d:d0:a5:52:3f:04:26:13:cd:2d:f8:ce:97:fe:f3:b4: a3:f2:0a:d8:58:64:74:25:dd:9b:8b:60:b0:97:f8:49: 9c:10:32:5a:64:a0:8f:e0:36:56:ac:35:5c:45:98:12: 1a:9e:8f:c8:57:82:3c:82:61:c7:97:ff:bd:32:8d:09: b5:c7:5d:42:de:32:90:5f:3f:97:d4:b5:ac:51:b5:36: 34:0b:a7:c7:f9:e9:e4:92:b0:91:40:10:a5:dc:54:b8: 5a:e4:9a:01:0b:a9:dd:28:20:1e:0b:96:3b:e0:2b:80: 60:9c:25:66:82:f9:0e:47:7c:a3:bf:0d:1c:c0:5c:e2: 97:e9:9e:f1:64:71:6c:d1:da:b7:06:8c:42:67:4c:43: c2:97:97:e6:72:c8:85:a3:7e:c2:45:b1:b5:5f:8a:0c: 45:6d:4e:10:32:24:0c:07:41:fc:43:8a:33:87:4a:97 Fingerprint (SHA-256): 5B:6A:F0:59:81:67:A3:AC:56:52:81:C3:75:92:FE:70:1E:BD:67:78:E4:83:66:F5:9D:6D:F6:D7:88:97:7F:58 Fingerprint (SHA1): 88:74:48:25:28:54:A0:A6:DA:09:C7:5E:3E:96:EF:8B:C8:50:C9:06 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2852: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191483 (0x433ed5fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:17:45 2025 Not After : Thu Nov 28 11:17:45 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:ac:11:23:8a:46:fc:9f:4a:d1:8e:8a:de:2a:45:b1: e9:b6:c2:fb:38:2d:c3:f1:db:f6:de:49:ce:aa:d0:ab: e0:e9:05:48:84:38:34:97:04:4c:84:ab:9f:d2:31:cb: f1:00:ce:5a:55:b3:d2:6e:80:0a:88:34:f6:07:94:81: 38:e3:cc:7b:92:bc:62:52:55:c1:7c:56:f0:cb:f5:9b: f8:97:c5:8e:58:fa:ac:2b:38:b9:f2:39:44:bd:7a:0f: cb:b5:18:8f:f3:a8:a8:76:68:01:bb:e8:c6:f9:27:25: 45:92:7c:f8:d2:c4:82:69:da:9b:48:0a:83:2e:69:63: 29:5a:e4:6c:76:ee:1c:00:29:9d:c0:07:a0:4e:5b:1a: 36:cc:e0:03:5e:94:71:f9:72:01:69:b4:b5:a4:ff:85: 1c:ca:e2:a2:1b:9d:44:2c:e4:c8:1c:cc:cc:e9:e8:8d: d4:ee:0f:8b:dd:f4:17:a2:78:55:94:99:8c:6e:b3:c9: 71:62:5f:5a:1a:9b:15:a3:a5:57:4b:18:a1:44:2c:ec: 3d:8f:93:14:89:9b:62:e7:1b:c6:14:bd:21:e8:fc:43: 0e:12:ce:9e:0f:f5:8c:e7:88:f8:89:8d:8b:e5:7b:b6: a3:2f:db:7b:00:67:32:6b:9a:a1:98:c3:67:76:a8:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:a9:ce:d6:48:05:9a:ae:72:3c:31:4a:05:ed:ce:21: a7:89:96:81:ea:ca:a5:a8:d6:18:c4:47:5a:23:c3:7b: d0:67:1e:78:6d:89:62:18:a1:8e:aa:5c:b6:3d:b9:87: 6f:27:af:36:34:7f:46:80:0d:83:1c:d7:2c:e3:7c:a9: 17:67:c6:40:ee:90:d4:7f:5d:bf:33:93:82:df:97:2a: 86:60:74:51:2c:ea:91:2a:6c:a6:a3:e0:0f:31:b4:8c: a9:19:08:73:40:e9:46:49:00:f7:5f:cf:c7:77:9c:99: c1:1e:f2:5b:8c:22:3d:a4:a9:01:36:e8:ff:2a:69:ce: 26:57:8d:40:ab:70:0b:c3:4a:a6:3d:9c:0c:6c:3c:49: 71:ec:51:2f:8f:20:31:61:5b:07:32:28:20:5b:6c:e8: 1d:2c:82:4d:06:cb:99:8f:74:13:11:b0:43:a9:22:9d: 0b:56:13:ff:5a:89:3a:87:0f:f6:7d:f4:64:59:53:a1: 6d:b1:ad:a5:cc:09:67:9b:cc:b9:b3:a1:4f:97:40:1c: 1f:4a:4d:c5:91:d4:3f:8e:1e:ed:be:2b:6b:1b:d8:4b: 45:bc:e5:f0:ad:b6:b9:56:3b:2c:a5:ab:15:c6:57:ed: 09:85:bf:96:45:6d:a2:29:be:c1:5a:b7:84:1a:13:2c Fingerprint (SHA-256): 59:6A:42:7E:87:D4:88:E0:DC:CD:54:75:C4:D4:74:40:3C:C4:31:A2:B4:AB:6D:9B:EA:40:67:95:DA:2C:CD:4B Fingerprint (SHA1): 0B:3E:5F:F9:CC:23:0F:B8:82:30:71:DF:B9:86:09:6D:8A:B7:D2:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2853: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191484 (0x433ed5fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:17:46 2025 Not After : Thu Nov 28 11:17:46 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:1a:71:ae:10:03:62:d7:89:64:39:cd:d7:cb:3f:28: 86:6e:ec:42:7f:f5:99:ce:c5:13:53:d9:9c:72:24:56: f8:65:35:fe:a4:10:bb:a5:ac:a4:ad:76:1c:c5:0f:9b: ff:c6:20:a5:d7:e9:98:02:c7:96:a0:4f:ea:83:12:a0: 41:6a:56:8f:f5:36:65:ee:e8:0d:b9:41:ed:d0:61:2c: be:47:a4:bd:8a:90:62:38:5d:c7:81:8d:c1:e9:f1:c3: 35:0a:bb:55:fd:14:4f:87:f9:c0:86:84:f8:92:30:78: d2:c2:5c:2d:24:18:25:80:71:a4:42:24:06:a1:53:9a: 11:2f:c6:86:f9:07:29:48:07:b8:2e:20:10:1a:64:cc: 54:e6:2c:82:50:5c:86:d3:83:fd:5a:f1:48:9e:26:48: 76:ee:fc:15:4a:e3:2d:31:ac:ef:42:20:25:a6:98:be: b4:25:ff:2a:ff:bc:b6:03:b2:dd:3b:21:18:3f:b3:35: 7b:e8:09:04:86:bc:46:ae:bd:f0:fa:45:82:88:4d:05: 8f:6b:41:4e:3d:01:60:87:ec:16:5d:d8:04:a0:b0:07: 20:2f:6a:f5:77:ce:c1:3c:74:b8:b7:f8:30:59:a6:74: 43:b3:c1:7b:d3:a5:1a:76:50:46:8d:84:a3:9a:be:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:97:86:05:13:32:ab:24:6a:15:02:84:e4:91:26:9d: 5b:57:b9:18:58:50:77:52:3c:9f:6b:d2:5b:39:39:6b: 9a:4a:68:f4:25:7e:0a:2a:96:b2:34:c6:a5:00:d1:e8: 7f:25:66:92:99:a7:5c:e0:b9:fd:97:1e:20:a5:c2:66: 49:50:98:2b:2f:b4:54:92:89:e3:fa:07:6f:f9:f8:06: cb:53:01:55:7c:3f:3d:e9:38:be:9e:fe:29:1d:dd:2e: f4:e2:03:6a:00:3d:dc:3a:30:b6:e4:08:98:3a:77:de: f4:86:16:0d:70:11:63:b5:1b:27:a6:c4:b0:11:8c:be: 4b:58:8d:b4:d3:da:b7:a9:46:c3:17:9a:39:23:09:79: 3a:f9:f0:98:f5:75:21:f5:a5:14:1a:67:3c:0d:41:9f: 56:67:cc:1e:73:5c:aa:36:35:3a:12:78:56:f8:ac:0c: 28:6f:58:a3:60:af:38:fb:1c:2c:b1:87:6b:56:0e:2d: cb:b4:16:5a:06:4a:5b:3c:88:87:6d:4d:b6:29:25:06: 42:8f:42:35:19:3c:bd:c6:c2:ca:bc:5f:c4:ab:de:2f: 94:f6:4f:e7:48:06:e7:e3:35:25:05:04:52:9f:d7:11: e7:2f:1e:28:c4:01:21:5b:7f:6a:31:4f:b5:bc:05:4a Fingerprint (SHA-256): EB:4F:40:6D:AE:44:CD:82:2D:7B:44:6B:39:96:97:F4:2C:4B:80:CE:F8:F1:4F:21:61:89:D2:2C:88:74:44:81 Fingerprint (SHA1): 48:8D:F7:17:3A:38:CF:5B:60:C1:0E:86:07:79:FB:79:EE:B5:1C:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2854: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191485 (0x433ed5fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:17:46 2025 Not After : Thu Nov 28 11:17:46 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:d7:98:cd:9a:19:c8:6e:e9:d2:97:08:0a:9c:78:49: 6b:d9:4e:45:be:3c:7f:d7:39:41:54:ac:37:79:20:3a: 1b:40:d1:66:ed:8e:64:f0:7f:6f:f6:3f:dd:43:67:7a: ca:94:ee:12:ed:fc:b0:fe:15:13:87:b4:5d:7c:5f:60: 9d:f3:2c:b1:fa:89:01:3c:a6:55:6d:b4:b3:e9:4c:06: 06:18:c0:f2:68:86:43:0b:69:42:4e:bb:2e:51:47:8e: 48:9b:dc:48:fe:58:bc:22:63:6e:a1:2c:04:ee:80:8e: 69:49:ff:88:c6:c9:2f:44:e3:d0:39:ff:1b:dd:d5:4c: b8:90:d0:12:e3:d3:40:48:cc:06:7d:a0:8d:04:be:de: be:20:db:ae:b5:64:33:80:52:38:42:8f:a2:11:93:a1: 92:30:7a:a4:93:32:2b:56:53:6c:62:60:f6:5f:76:a0: fe:2e:7e:64:b2:72:3c:25:6b:8d:6e:65:c5:39:29:74: c0:bf:54:e8:63:6c:ea:83:b3:b8:f1:b9:06:74:18:b2: c0:f9:9f:85:81:09:d7:fb:40:5c:ef:cc:ab:7f:19:f3: 2e:0a:0f:48:72:81:1d:ba:48:83:3b:ea:81:49:c7:c6: 7a:9d:34:23:df:ef:fd:76:55:c3:08:33:73:27:a5:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:78:ec:cc:67:a6:e0:dc:09:04:ae:40:c6:ac:2e:dc: fa:fa:3d:a4:4a:fb:5a:61:cc:a5:b4:39:27:05:60:94: 10:1d:1b:d1:bd:a2:7e:69:76:68:a2:dc:44:29:6a:93: a9:9c:6c:86:8c:cd:64:6e:be:2c:24:ed:87:1a:41:d1: 24:11:59:3d:6d:2c:2b:25:df:91:49:cd:23:ba:04:cc: 1f:bf:74:94:90:54:7c:d7:6b:9c:7a:cc:df:ce:a5:b7: c1:1d:26:50:57:e9:20:b2:05:91:f7:d4:f8:b2:aa:fb: 3c:92:9c:89:32:4f:ab:7c:a4:38:25:32:79:80:8a:c4: 87:e2:60:06:37:26:f6:98:36:c3:7b:ae:4e:97:b4:d2: 3e:af:db:59:43:69:ec:87:f2:21:e5:a5:0a:d5:bd:3e: 08:11:dd:95:53:12:22:18:43:b7:24:38:19:56:12:69: c4:01:da:f3:08:c9:a2:6f:e5:72:7f:ec:d9:68:a5:50: 3e:56:35:cb:16:40:ef:f6:36:68:31:4f:f1:31:6c:74: d5:dc:68:c9:88:24:0c:76:f5:08:0c:0c:ea:c2:29:68: 34:f7:60:4e:c4:03:73:c9:06:76:4d:f5:61:09:6c:a3: 4f:89:35:2f:ff:61:08:19:93:f7:00:34:d2:72:69:0d Fingerprint (SHA-256): 43:2C:7E:B9:B9:8D:2D:64:0C:92:53:47:5D:23:D0:F9:EC:A0:F1:A2:60:D1:94:1E:5F:97:EE:F8:12:1F:35:DB Fingerprint (SHA1): 5D:47:6E:BB:F0:89:93:2D:69:26:AB:CB:89:53:66:FD:29:53:17:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2855: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191486 (0x433ed5fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:17:47 2025 Not After : Thu Nov 28 11:17:47 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e5:30:27:cf:1d:db:ca:ee:cf:36:ae:bf:56:56:20: 02:89:c1:b4:4a:4f:8c:d3:e3:6e:cf:4a:72:bc:bf:a0: 51:71:59:70:51:4e:af:ba:98:1d:84:e7:91:f4:c3:7a: 82:d1:15:1f:15:8f:6a:d3:11:b6:cc:fd:96:e5:78:84: 8a:50:bb:81:a8:d5:2b:b8:29:06:d5:de:fa:47:c3:5f: 5a:20:71:c2:2d:7d:4d:c6:cc:eb:92:f8:1c:6e:a2:f8: 7d:6a:04:83:3a:c5:00:6c:b8:77:93:c4:63:8f:f0:03: 25:37:ab:b3:e8:26:19:26:fa:d0:32:cd:a6:14:bf:20: a2:20:33:4b:de:a5:92:6b:7f:e5:30:48:74:8b:0f:6d: 3d:82:c8:be:b5:9b:1c:f9:7c:0b:13:74:16:f3:40:92: 81:a8:a1:94:80:37:51:df:9c:59:13:c1:b0:0c:1b:c1: 57:1c:1d:70:3b:67:62:93:c0:1e:03:36:c7:78:5e:d9: bf:cc:9b:c1:00:25:49:a7:d4:73:54:7a:f9:7b:fb:46: 7a:ad:cb:49:4e:6e:f1:db:4e:9f:4b:7a:e9:36:9b:c6: 3e:52:5a:07:0e:27:e4:cf:1c:39:53:80:42:3e:4b:09: 8d:a1:73:2e:76:0a:00:6a:4e:65:cd:7f:37:1f:90:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:e7:f5:53:10:03:2c:0d:24:49:a5:32:f4:3e:f1:64: 67:06:31:cc:15:8a:bd:cd:b1:29:cd:4c:f5:3e:87:6e: c3:e6:c5:ed:46:3f:0e:73:6b:c0:66:e8:25:11:b8:f1: 65:88:3d:7b:be:4b:fd:57:8d:d7:0e:cc:ef:5b:e1:69: 31:5d:11:63:71:26:6a:bb:88:19:e5:1a:28:9b:e9:9e: a6:09:db:c6:88:0c:d4:92:6b:fe:c2:ed:7a:d6:6b:97: 33:50:1c:dc:59:9b:fd:e6:48:a8:f4:0d:49:8e:16:60: d5:f9:e6:b8:70:64:b1:67:a4:85:0e:19:d0:ef:26:6f: 1e:ef:1b:57:4e:7d:d0:4f:2d:6b:b4:77:20:87:81:fa: 78:09:47:83:c0:f6:ee:2d:17:09:65:f6:ca:64:86:53: e0:b7:72:b6:de:b9:f8:bc:a3:88:c0:b2:9b:45:9f:bc: dc:1e:04:82:f3:9f:72:99:35:35:b1:f7:7d:68:3d:4f: 0f:c3:5a:2b:73:a1:44:70:04:57:57:9c:af:03:85:80: fc:02:99:0b:d6:5f:3c:ac:20:0c:25:37:4c:7a:f2:f6: 14:6c:c7:21:27:56:63:a0:0d:01:da:2b:a4:9e:c4:0a: 1a:68:bd:42:db:84:d1:5e:69:0c:e2:55:29:12:b6:cb Fingerprint (SHA-256): FD:DA:88:F8:A3:16:F7:5D:A2:5C:24:30:19:B3:7E:92:70:11:8A:59:D4:34:EB:AB:4B:FE:0F:09:02:30:12:FB Fingerprint (SHA1): 5C:C0:31:35:F4:CC:65:BA:D0:84:48:10:EF:8C:72:07:65:B0:35:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2856: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191487 (0x433ed5ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:17:48 2025 Not After : Thu Nov 28 11:17:48 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:35:19:b8:26:a5:d4:7f:f8:31:23:d4:ce:a3:c0:6b: 85:50:46:01:d2:f4:d8:77:2f:c2:fa:26:c6:1c:88:51: a1:5e:10:b2:86:31:32:34:29:2a:df:0a:1b:62:2b:7b: 93:83:0d:c7:e7:6e:3c:de:9b:35:25:05:2e:77:b2:6e: 67:7c:4c:f4:71:35:13:b3:38:22:8d:3e:b1:a5:62:2d: 96:e8:ba:04:91:bc:8d:b9:ca:72:06:a6:20:95:73:23: dd:89:88:68:71:58:12:90:b4:f8:3c:e3:d3:d7:11:22: d0:21:f9:b0:e2:f9:8e:ef:6c:c9:9f:72:1b:03:6a:a3: 96:2b:b7:3c:a0:cd:4d:49:53:93:b2:5c:26:87:1e:14: 42:c6:49:f0:9d:2a:f8:9c:ae:d4:8f:0c:40:a8:26:ed: b2:87:49:b7:96:99:bb:e4:44:36:30:f6:25:fe:a0:17: ac:74:40:c7:37:bb:46:a2:43:46:a7:75:0d:e0:3d:12: 3b:85:ab:ca:11:75:6c:cd:52:3a:22:b9:0a:f8:92:ca: ae:b8:c6:1f:f4:1e:49:26:c4:79:8e:06:13:4f:74:a8: fc:e1:10:89:92:dd:07:57:fd:95:b1:99:88:3f:97:93: be:04:6f:9b:e3:0b:06:ac:48:89:79:13:31:98:a0:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:a9:48:84:ed:ac:ff:88:a3:66:c9:0a:84:17:19:c3: 70:be:a5:f0:9d:e0:fb:1c:97:74:7a:d3:d6:2c:47:5d: 3c:5f:38:ce:7f:2e:24:4d:23:b2:19:08:0a:61:77:0c: 6c:1d:86:9f:9a:31:e8:34:32:4d:a4:90:57:db:b6:17: db:67:08:ed:80:0c:ce:63:d4:ff:ec:07:89:15:45:58: f1:3e:44:2b:33:51:0b:bd:ca:8c:e7:6f:49:84:d4:51: 1c:35:cd:51:ab:f7:78:7d:c4:5d:81:93:cb:6e:30:51: ce:f9:6b:42:3a:0d:26:b0:98:92:16:cd:b9:1f:dc:48: e4:4a:54:71:f9:8d:e9:b5:a2:45:b4:4a:3f:13:0b:08: 8e:46:23:28:b3:dc:fb:74:7e:3d:b2:7b:1e:84:c9:52: 86:6d:68:16:ff:57:83:30:a5:95:5b:d3:bc:f6:90:a3: e4:94:15:8b:c2:f2:51:8c:b5:55:93:cb:3e:df:96:77: 12:4b:27:eb:5d:49:23:d3:f0:63:ef:a3:b2:83:d1:3f: c6:b9:07:ad:ae:98:98:22:bc:e0:f7:7c:1b:95:e5:91: cb:3c:57:dd:2d:a9:79:09:0f:de:c0:3d:fa:b8:cf:ad: 45:b8:4e:a3:4d:f0:ed:50:dc:0a:6b:ef:69:a4:eb:db Fingerprint (SHA-256): 14:AF:3A:91:43:F6:67:95:AC:CC:0F:FB:9D:26:05:18:BF:8F:5D:48:F0:47:37:18:FF:6F:0A:4F:5D:6D:78:5F Fingerprint (SHA1): CF:5B:AA:8E:B9:BC:55:58:38:CF:43:61:6F:1A:06:68:6E:97:7A:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2857: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191488 (0x433ed600) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:17:48 2025 Not After : Thu Nov 28 11:17:48 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:da:33:b3:b9:ec:d6:85:09:9d:a9:ce:25:ac:ff:b5: 87:f9:2e:4d:9e:8f:4f:49:98:45:a5:a4:4c:08:8f:ea: 6c:63:75:59:6b:e3:2d:b8:b0:ae:78:35:32:00:50:2d: 13:7f:5f:5a:ad:c2:0b:a4:d1:57:e9:c4:63:2d:b9:30: 31:c7:30:bf:2f:bc:9e:7b:8f:c5:ab:ba:bf:23:36:b0: bd:60:e0:a7:2c:07:18:3c:35:c1:6f:3c:cc:d8:77:57: 18:0c:8a:78:44:0a:66:ef:5e:9b:47:de:e3:68:51:85: 3d:23:a1:26:a5:a1:3b:83:91:16:0d:9b:1a:c3:03:8e: 00:0b:24:9c:d9:7b:04:47:d0:47:ee:8a:95:0a:ef:e4: e7:f3:e1:01:81:5d:21:31:b2:13:0b:a8:b2:87:3d:43: 89:26:07:01:5c:b1:19:ff:6b:b0:aa:4e:a9:9e:43:b5: 3c:a6:5b:eb:e6:a0:7b:77:ad:07:59:54:37:8f:0d:7c: eb:cf:c1:43:34:a3:0f:07:59:ea:0e:2e:33:8b:e9:45: 7b:e7:be:98:bc:1b:53:12:84:63:4f:c0:64:61:6b:79: 16:2a:14:73:5c:f1:03:10:1c:8f:a4:d1:0e:32:70:40: 27:89:b1:99:c0:c2:18:63:d4:98:6e:48:2a:4a:44:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:da:0a:d3:cf:0a:62:bf:73:50:53:b7:ff:63:7d:0d: 69:74:12:52:81:40:d1:40:5e:04:08:96:7a:c2:7a:3b: 00:45:eb:f7:9f:4d:69:f1:73:ed:a1:1f:4d:d2:d4:56: da:ae:d4:a1:6b:1a:96:df:a8:fa:08:81:13:01:4c:e3: eb:7c:6d:e9:74:79:b0:a2:97:da:db:79:f5:fc:48:d8: 23:87:b1:5f:88:86:3b:a2:ba:a2:11:74:12:1f:09:b9: c4:91:8f:ac:8d:e8:3a:f8:09:5a:ee:27:42:2e:25:01: 6c:5d:0f:b5:57:52:6d:71:2e:4a:c7:6f:5a:8c:9c:5b: dd:c7:46:5a:b5:fa:c2:ef:c5:09:5b:96:df:46:1f:73: 8e:be:eb:84:3d:9b:b9:48:5d:a3:45:63:fb:86:0c:fe: a0:9b:a8:c0:3f:0e:0b:f9:5c:37:ca:fb:73:5f:ab:3e: a7:1c:78:5d:62:7f:4a:db:60:03:d6:76:19:f5:dd:13: 9a:a7:d1:66:f6:89:a4:88:c3:ac:48:a9:68:55:22:9c: 80:7c:8c:9d:cb:f1:24:2a:87:0e:97:0b:fd:9e:46:20: d8:35:b8:4a:b6:08:e6:2d:de:de:50:b8:df:18:ae:52: 5a:3e:84:8f:35:56:d6:52:a7:f3:6e:80:86:43:b2:f7 Fingerprint (SHA-256): 9D:BF:D5:CE:06:1B:0D:E2:CC:18:ED:F0:97:81:3E:1C:8D:40:A2:72:15:6D:8F:8B:27:B3:3B:4A:E4:2F:57:0A Fingerprint (SHA1): 92:5D:2D:6B:D0:EB:07:F5:53:E3:78:FC:C5:CE:A8:9E:CA:6F:A8:7B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2858: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191489 (0x433ed601) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:17:48 2025 Not After : Thu Nov 28 11:17:48 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c8:3b:5e:b7:dd:06:9d:bf:7e:d2:37:75:d7:00:f3: 3e:4e:51:31:f4:c1:9b:02:b0:90:fe:d9:de:c2:f8:32: 32:e1:46:dc:bf:e9:2e:76:df:11:f7:39:57:07:8f:c8: cc:14:34:59:19:10:45:48:23:3d:b7:84:ae:fe:d9:fd: cd:cb:52:1d:81:b7:29:05:6b:c3:d8:6b:f5:09:67:6c: f8:47:6d:98:82:01:70:d7:4f:07:0b:bd:8b:59:da:aa: 50:9b:ed:3c:4c:83:fe:61:0b:78:97:9b:a7:5a:dd:5e: 1c:7b:70:0e:3c:6d:22:99:13:b2:bf:e0:ef:2d:ef:d2: ad:94:1d:f0:73:95:60:75:a0:d6:58:2c:09:c7:17:99: 92:a2:8b:97:e7:22:33:85:d9:b1:a9:f7:df:1f:a7:ae: bc:28:af:82:16:e2:f9:2b:54:ab:c3:a1:11:81:39:4b: ae:49:59:31:b4:a7:0b:6b:fd:1b:e1:e3:41:f2:a7:6a: 9d:ba:55:a3:51:cd:b1:3c:35:62:4d:4b:1c:5f:f7:03: 0d:e9:d7:57:53:61:9b:28:d5:d7:7d:cb:c7:bf:50:d0: 32:e9:4e:d1:5f:ba:94:e6:ac:13:9c:65:6c:80:a0:8c: 62:3c:8c:c7:f1:dd:07:6d:6c:6c:70:ee:46:dd:49:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:80:04:0c:a4:91:51:b5:ad:cb:70:53:51:b5:ef:4d: c9:06:4e:4a:c4:b1:a5:a9:41:19:e3:69:09:57:85:44: 07:65:ff:de:2c:b8:74:da:4f:0a:ad:90:7b:20:a5:a1: 94:c1:1b:2a:89:c6:db:e1:68:e4:ea:34:b8:bc:10:c6: 98:74:1b:17:ac:45:1f:0e:fa:83:e2:88:ae:7e:a5:a8: cc:b0:cd:e5:12:76:67:7c:f2:5a:46:49:86:26:3e:83: 24:11:2d:de:8e:27:a9:31:44:ab:8a:c2:82:f9:25:14: 70:a6:be:ff:e2:7b:8c:9b:90:ad:57:89:15:95:2c:ea: 0a:93:bb:77:00:7f:31:e2:cf:74:60:94:13:ef:fe:bf: 53:4c:d8:8b:bb:88:44:cf:ec:ef:57:d1:2d:fa:28:6c: 3b:5c:d2:5a:55:93:a8:a4:84:91:27:79:d2:d8:b4:c0: c3:9b:94:7e:a1:45:ef:da:cb:ed:13:10:74:82:59:68: e0:05:23:51:ad:24:1f:7e:c5:19:6b:63:f6:6c:32:87: 72:d2:ef:88:c8:64:b4:4e:f1:fb:79:b5:8b:bc:45:fd: 9d:88:bb:b5:ca:bf:f5:fe:92:84:67:72:af:d2:e8:98: a0:00:33:80:cd:84:0a:4b:29:c0:2a:87:5b:b9:1d:be Fingerprint (SHA-256): 7A:3E:74:17:6B:CD:7C:2F:4F:BB:BE:18:82:2C:51:86:67:5D:36:61:22:EE:39:C0:74:DC:2D:49:97:AC:B0:57 Fingerprint (SHA1): 4F:DA:83:5D:B6:C3:70:76:50:37:66:F3:71:41:B2:2B:D6:73:EA:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2859: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2860: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191504 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2861: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2862: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2863: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2864: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191505 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2865: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2866: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2867: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2868: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191506 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2869: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2870: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2871: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2872: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191507 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2873: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2874: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2875: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191504 (0x433ed610) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:56 2025 Not After : Thu Nov 28 11:17:56 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:2a:8c:4d:da:c6:e4:e7:08:da:f6:3d:02:32:31:f8: 60:c3:2d:77:0b:b8:d0:bb:18:4b:ee:1d:4c:26:9c:f8: 30:81:94:41:e6:eb:42:f3:a5:63:ff:84:50:81:da:42: 43:3e:0a:c8:a9:41:b6:08:30:97:b8:0f:ac:62:28:c9: 86:96:9e:1a:40:68:ec:1d:5a:5b:86:8f:c6:6e:a3:b6: dc:4b:aa:94:24:1a:b1:fa:6f:4b:45:1f:fe:74:e8:3e: ef:76:1a:14:d8:cf:b5:88:40:d2:ac:90:15:79:b4:aa: a5:1a:4d:28:55:95:b7:01:b9:cb:61:53:d0:06:56:ca: c9:02:ba:ae:d8:37:48:c4:cc:be:64:b3:bf:52:fe:70: c1:09:16:b2:08:e6:4c:24:6b:0e:ff:3c:dd:d9:12:c6: b4:d7:53:ad:fa:d2:79:38:9b:b6:a9:c1:9f:78:c2:d7: b3:66:0f:b3:e7:90:7c:76:44:b9:65:cf:41:74:3f:d6: f4:71:44:51:fb:8c:a4:bd:38:98:71:01:2f:d0:29:46: 1f:25:53:72:fc:35:15:e6:09:86:13:3e:da:20:77:72: e5:e6:c2:9e:8f:ba:26:0e:dc:50:5c:e2:5c:83:bd:00: 59:2a:1a:57:2b:71:53:53:ce:27:1a:12:ab:8d:d2:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:a3:f8:46:51:ce:a0:0e:9b:98:ae:b1:73:2b:9d:c0: 53:88:59:31:64:d2:6b:79:18:5c:8b:a1:fd:2c:f3:41: 41:71:14:a4:c3:ae:97:9f:bb:be:e3:9b:e8:23:b7:90: 57:df:2e:42:f8:1a:9c:45:59:84:58:1a:9e:19:4e:28: 55:1d:06:dd:e5:5a:6f:fe:c9:42:21:fd:50:f9:cc:92: 16:c9:52:16:a9:cc:2c:1f:67:1c:d4:d4:56:c5:0e:dd: 25:7d:40:06:6b:00:76:14:c2:15:93:0e:cb:7a:be:c4: e7:fc:c3:67:cb:84:9f:95:b9:95:3c:f8:e6:e4:fd:e1: 35:0b:f5:0f:76:00:96:7b:51:b1:3c:f9:1e:e9:12:83: 2a:f7:45:05:77:93:af:fc:9e:dd:14:46:26:1b:cf:b4: ad:d5:da:a2:cc:9c:00:4b:f5:5e:06:bf:d8:21:c2:c4: 9b:c4:d1:94:05:79:e2:50:2a:90:69:f9:97:9f:a2:b7: f4:f5:da:41:86:21:d4:be:a8:0d:0e:0d:f5:d5:a6:db: b1:f1:fd:02:45:d7:08:27:26:d1:69:46:7a:25:b4:62: ae:e6:df:77:9c:18:6a:6a:d8:5e:12:c2:1f:09:9e:fc: 9e:ae:f4:51:56:af:00:c1:19:5f:bb:31:3c:1b:c2:81 Fingerprint (SHA-256): D5:1B:10:D6:B2:16:F8:F1:24:01:5B:34:BC:44:1B:DF:F5:EB:2F:C0:F8:F3:D7:2E:10:FC:01:71:49:80:22:02 Fingerprint (SHA1): A3:73:D8:56:97:FF:82:F3:38:23:BB:6C:F0:23:C1:99:3D:41:64:1F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2876: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2877: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191505 (0x433ed611) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:57 2025 Not After : Thu Nov 28 11:17:57 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:c8:4b:68:f6:4f:d4:fc:25:db:13:fd:90:25:08:ab: 5e:29:79:8c:e0:6d:40:ad:c8:63:2a:db:1c:7c:b4:0b: 14:f4:71:2e:b3:8e:6f:5c:8b:21:61:de:14:98:23:17: 7b:f6:9d:09:e3:2d:53:f9:45:18:a3:c1:12:c8:49:27: 6c:3c:ad:f7:51:81:2b:8b:2d:e4:cf:3f:c4:aa:f1:ff: bb:6e:e3:c6:c8:11:19:35:4f:10:c0:0b:3f:d6:56:a3: 2c:fd:cd:88:0a:04:58:00:2c:8c:68:68:db:67:a9:00: 7e:42:2c:f1:02:72:9e:ae:06:e6:15:36:df:37:2a:42: d9:b1:93:0c:42:bc:ab:73:4e:a2:04:5a:7b:f5:b1:45: 65:ae:9b:15:28:8c:ea:bf:f3:9f:7e:de:af:64:76:e8: 53:17:e1:fa:46:df:76:2a:00:e7:ea:3a:c5:46:44:7e: 83:43:46:91:bc:4a:a1:bc:0e:56:3a:4d:6c:46:b2:de: 0d:ac:3f:4e:d1:27:12:ca:ca:d6:29:79:12:61:ea:eb: cb:78:25:27:be:31:f1:21:c1:3d:af:03:2c:be:65:bc: 6f:6b:9d:bb:be:e2:19:ad:a1:6d:c6:50:33:22:90:00: d8:b7:16:03:5f:1b:d7:d1:cb:70:2a:2d:e2:ef:10:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:71:10:21:4e:99:39:04:f0:fe:9f:dc:bc:1e:c2:6d: ee:9f:e3:f4:ba:c1:33:b9:37:30:72:5a:88:90:cb:61: 31:1d:f3:51:dc:fc:cb:0e:24:72:61:26:36:65:8f:19: d0:14:ab:ce:99:e0:83:40:48:f7:0d:37:92:7e:7d:76: 7f:55:ad:66:f0:42:3c:ea:37:07:c6:60:be:1d:e0:e1: 38:b4:33:bb:80:f5:46:58:19:0e:57:44:95:bc:67:5c: ad:dd:11:04:ca:3a:5c:e7:0d:04:83:95:60:84:f4:74: 0c:a5:fc:b6:59:8f:11:a5:b2:1c:bb:da:7e:85:04:3f: a0:2f:1f:a1:d4:f9:41:4b:af:6d:3b:ec:06:25:2d:d5: 44:9d:6e:fb:c6:94:a8:d6:c7:cc:da:cf:fa:7b:92:47: c6:61:f3:3e:54:4d:04:5f:e7:50:a7:71:09:7b:8d:be: 07:a5:54:4b:bb:a5:85:ae:e6:c1:e8:0d:07:d6:13:a7: af:4c:5a:98:6f:2f:5c:1e:87:bd:9e:c5:d9:35:75:a4: d7:e5:12:47:4b:5d:c2:b3:f9:1b:3f:2e:55:2e:2c:13: 6f:1d:ec:0d:cf:a5:e2:fd:76:fc:54:6d:1a:e1:e4:b0: 6c:f7:7b:c9:b7:88:a1:c4:2e:5d:69:50:4c:2f:fc:56 Fingerprint (SHA-256): 22:37:16:D7:0C:EE:9B:2B:0A:E0:86:45:EF:CC:EC:AB:65:35:62:CD:28:C9:30:E1:9F:91:94:A2:DB:B8:9E:63 Fingerprint (SHA1): 59:BF:A4:D6:85:BA:F6:35:95:ED:6C:C0:DD:6D:0E:28:1B:3D:53:23 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2878: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2879: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191506 (0x433ed612) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:17:57 2025 Not After : Thu Nov 28 11:17:57 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:55:b6:11:29:1d:67:ee:4c:27:32:0e:e6:26:a0:57: ac:88:4c:38:1b:4d:0e:ef:50:cd:8c:ce:a2:70:28:bf: ab:69:44:22:9e:29:ab:c2:3d:fd:9c:5d:62:c3:97:95: 5d:e3:8d:c2:de:6a:85:93:20:ef:f5:87:2c:15:de:a5: 1f:d5:54:1c:41:68:29:53:79:e5:fa:f5:36:9a:d9:b5: a1:7d:8a:4c:df:08:43:01:9e:ad:e9:cb:eb:72:21:62: 4a:61:0c:d9:f4:e6:20:70:ce:49:30:15:65:02:da:dc: 7d:4d:9a:3a:5a:04:33:33:05:f0:5b:36:b1:85:c2:a8: 50:5d:64:9e:f0:20:4c:06:7a:92:ca:82:6d:68:75:e5: 11:2d:bd:4d:15:6e:2c:15:60:ee:b6:68:f6:44:68:bc: bd:9f:ac:e5:ab:2e:58:cf:dc:a7:98:08:cb:14:14:bd: c3:5b:7b:03:26:d9:41:97:9e:bb:14:2e:9e:42:15:50: ba:a5:0c:c3:cb:b9:2b:d8:80:21:23:5b:42:a7:59:19: 00:95:52:81:87:a3:d7:bc:ed:3d:bf:51:45:f7:4e:6f: dc:0a:39:46:38:e4:7a:2b:31:f5:17:f3:73:5a:4e:c4: ca:94:89:7e:85:65:83:94:02:34:35:7f:1b:3f:d8:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:2a:bb:9b:52:e7:b1:1c:36:e9:9c:a3:b8:73:f0:32: fe:8f:28:d4:2a:8a:64:b5:65:02:bb:30:f8:77:43:64: 7d:3e:4d:21:0f:05:04:a3:c8:21:7a:43:cd:fb:3b:1d: 69:cf:f0:06:4c:7c:fc:70:ce:54:ba:7c:14:b2:b4:05: 2d:10:f2:72:54:00:3e:aa:d5:c2:48:b2:8a:e2:97:8c: 20:43:31:85:9f:30:f2:01:93:8a:81:09:5a:50:fc:0f: be:44:c1:5a:87:25:18:d5:55:cc:62:3a:66:74:85:68: a9:3f:66:5b:79:c2:8c:7f:26:dc:10:4e:a1:83:55:8a: 25:ee:d8:3c:ac:c6:4b:93:6f:54:c7:ff:b3:ff:2b:b4: ee:80:54:d2:5d:56:2e:39:fd:bc:66:e3:ca:50:fa:c8: 4f:cb:7e:39:e4:23:4a:1b:d3:60:85:f4:c3:9f:a7:c2: d0:a7:18:07:87:f8:a8:20:ca:2d:58:67:32:86:e4:47: 35:6c:90:72:b2:8c:fb:ba:ee:d3:c2:1f:08:54:96:ab: 81:05:f3:f1:eb:08:0b:35:6f:1f:0e:c8:20:a3:1e:fe: d3:25:01:05:94:de:d4:86:25:43:1b:7e:52:27:ac:26: ce:3d:29:62:5a:5a:31:bd:d3:ee:2e:20:67:fe:c8:ba Fingerprint (SHA-256): 77:0A:92:D8:21:36:00:D1:89:95:7F:0D:7E:43:E7:AE:25:61:52:25:96:7E:71:DC:0C:7C:07:26:9E:4D:12:40 Fingerprint (SHA1): 02:93:14:73:03:77:88:E1:CC:50:F8:98:78:F6:48:CF:F5:97:12:69 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2880: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2881: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2882: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2883: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2884: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191504 (0x433ed610) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:56 2025 Not After : Thu Nov 28 11:17:56 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:2a:8c:4d:da:c6:e4:e7:08:da:f6:3d:02:32:31:f8: 60:c3:2d:77:0b:b8:d0:bb:18:4b:ee:1d:4c:26:9c:f8: 30:81:94:41:e6:eb:42:f3:a5:63:ff:84:50:81:da:42: 43:3e:0a:c8:a9:41:b6:08:30:97:b8:0f:ac:62:28:c9: 86:96:9e:1a:40:68:ec:1d:5a:5b:86:8f:c6:6e:a3:b6: dc:4b:aa:94:24:1a:b1:fa:6f:4b:45:1f:fe:74:e8:3e: ef:76:1a:14:d8:cf:b5:88:40:d2:ac:90:15:79:b4:aa: a5:1a:4d:28:55:95:b7:01:b9:cb:61:53:d0:06:56:ca: c9:02:ba:ae:d8:37:48:c4:cc:be:64:b3:bf:52:fe:70: c1:09:16:b2:08:e6:4c:24:6b:0e:ff:3c:dd:d9:12:c6: b4:d7:53:ad:fa:d2:79:38:9b:b6:a9:c1:9f:78:c2:d7: b3:66:0f:b3:e7:90:7c:76:44:b9:65:cf:41:74:3f:d6: f4:71:44:51:fb:8c:a4:bd:38:98:71:01:2f:d0:29:46: 1f:25:53:72:fc:35:15:e6:09:86:13:3e:da:20:77:72: e5:e6:c2:9e:8f:ba:26:0e:dc:50:5c:e2:5c:83:bd:00: 59:2a:1a:57:2b:71:53:53:ce:27:1a:12:ab:8d:d2:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:a3:f8:46:51:ce:a0:0e:9b:98:ae:b1:73:2b:9d:c0: 53:88:59:31:64:d2:6b:79:18:5c:8b:a1:fd:2c:f3:41: 41:71:14:a4:c3:ae:97:9f:bb:be:e3:9b:e8:23:b7:90: 57:df:2e:42:f8:1a:9c:45:59:84:58:1a:9e:19:4e:28: 55:1d:06:dd:e5:5a:6f:fe:c9:42:21:fd:50:f9:cc:92: 16:c9:52:16:a9:cc:2c:1f:67:1c:d4:d4:56:c5:0e:dd: 25:7d:40:06:6b:00:76:14:c2:15:93:0e:cb:7a:be:c4: e7:fc:c3:67:cb:84:9f:95:b9:95:3c:f8:e6:e4:fd:e1: 35:0b:f5:0f:76:00:96:7b:51:b1:3c:f9:1e:e9:12:83: 2a:f7:45:05:77:93:af:fc:9e:dd:14:46:26:1b:cf:b4: ad:d5:da:a2:cc:9c:00:4b:f5:5e:06:bf:d8:21:c2:c4: 9b:c4:d1:94:05:79:e2:50:2a:90:69:f9:97:9f:a2:b7: f4:f5:da:41:86:21:d4:be:a8:0d:0e:0d:f5:d5:a6:db: b1:f1:fd:02:45:d7:08:27:26:d1:69:46:7a:25:b4:62: ae:e6:df:77:9c:18:6a:6a:d8:5e:12:c2:1f:09:9e:fc: 9e:ae:f4:51:56:af:00:c1:19:5f:bb:31:3c:1b:c2:81 Fingerprint (SHA-256): D5:1B:10:D6:B2:16:F8:F1:24:01:5B:34:BC:44:1B:DF:F5:EB:2F:C0:F8:F3:D7:2E:10:FC:01:71:49:80:22:02 Fingerprint (SHA1): A3:73:D8:56:97:FF:82:F3:38:23:BB:6C:F0:23:C1:99:3D:41:64:1F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2885: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2886: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191505 (0x433ed611) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:57 2025 Not After : Thu Nov 28 11:17:57 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:c8:4b:68:f6:4f:d4:fc:25:db:13:fd:90:25:08:ab: 5e:29:79:8c:e0:6d:40:ad:c8:63:2a:db:1c:7c:b4:0b: 14:f4:71:2e:b3:8e:6f:5c:8b:21:61:de:14:98:23:17: 7b:f6:9d:09:e3:2d:53:f9:45:18:a3:c1:12:c8:49:27: 6c:3c:ad:f7:51:81:2b:8b:2d:e4:cf:3f:c4:aa:f1:ff: bb:6e:e3:c6:c8:11:19:35:4f:10:c0:0b:3f:d6:56:a3: 2c:fd:cd:88:0a:04:58:00:2c:8c:68:68:db:67:a9:00: 7e:42:2c:f1:02:72:9e:ae:06:e6:15:36:df:37:2a:42: d9:b1:93:0c:42:bc:ab:73:4e:a2:04:5a:7b:f5:b1:45: 65:ae:9b:15:28:8c:ea:bf:f3:9f:7e:de:af:64:76:e8: 53:17:e1:fa:46:df:76:2a:00:e7:ea:3a:c5:46:44:7e: 83:43:46:91:bc:4a:a1:bc:0e:56:3a:4d:6c:46:b2:de: 0d:ac:3f:4e:d1:27:12:ca:ca:d6:29:79:12:61:ea:eb: cb:78:25:27:be:31:f1:21:c1:3d:af:03:2c:be:65:bc: 6f:6b:9d:bb:be:e2:19:ad:a1:6d:c6:50:33:22:90:00: d8:b7:16:03:5f:1b:d7:d1:cb:70:2a:2d:e2:ef:10:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:71:10:21:4e:99:39:04:f0:fe:9f:dc:bc:1e:c2:6d: ee:9f:e3:f4:ba:c1:33:b9:37:30:72:5a:88:90:cb:61: 31:1d:f3:51:dc:fc:cb:0e:24:72:61:26:36:65:8f:19: d0:14:ab:ce:99:e0:83:40:48:f7:0d:37:92:7e:7d:76: 7f:55:ad:66:f0:42:3c:ea:37:07:c6:60:be:1d:e0:e1: 38:b4:33:bb:80:f5:46:58:19:0e:57:44:95:bc:67:5c: ad:dd:11:04:ca:3a:5c:e7:0d:04:83:95:60:84:f4:74: 0c:a5:fc:b6:59:8f:11:a5:b2:1c:bb:da:7e:85:04:3f: a0:2f:1f:a1:d4:f9:41:4b:af:6d:3b:ec:06:25:2d:d5: 44:9d:6e:fb:c6:94:a8:d6:c7:cc:da:cf:fa:7b:92:47: c6:61:f3:3e:54:4d:04:5f:e7:50:a7:71:09:7b:8d:be: 07:a5:54:4b:bb:a5:85:ae:e6:c1:e8:0d:07:d6:13:a7: af:4c:5a:98:6f:2f:5c:1e:87:bd:9e:c5:d9:35:75:a4: d7:e5:12:47:4b:5d:c2:b3:f9:1b:3f:2e:55:2e:2c:13: 6f:1d:ec:0d:cf:a5:e2:fd:76:fc:54:6d:1a:e1:e4:b0: 6c:f7:7b:c9:b7:88:a1:c4:2e:5d:69:50:4c:2f:fc:56 Fingerprint (SHA-256): 22:37:16:D7:0C:EE:9B:2B:0A:E0:86:45:EF:CC:EC:AB:65:35:62:CD:28:C9:30:E1:9F:91:94:A2:DB:B8:9E:63 Fingerprint (SHA1): 59:BF:A4:D6:85:BA:F6:35:95:ED:6C:C0:DD:6D:0E:28:1B:3D:53:23 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2887: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2888: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191506 (0x433ed612) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:17:57 2025 Not After : Thu Nov 28 11:17:57 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:55:b6:11:29:1d:67:ee:4c:27:32:0e:e6:26:a0:57: ac:88:4c:38:1b:4d:0e:ef:50:cd:8c:ce:a2:70:28:bf: ab:69:44:22:9e:29:ab:c2:3d:fd:9c:5d:62:c3:97:95: 5d:e3:8d:c2:de:6a:85:93:20:ef:f5:87:2c:15:de:a5: 1f:d5:54:1c:41:68:29:53:79:e5:fa:f5:36:9a:d9:b5: a1:7d:8a:4c:df:08:43:01:9e:ad:e9:cb:eb:72:21:62: 4a:61:0c:d9:f4:e6:20:70:ce:49:30:15:65:02:da:dc: 7d:4d:9a:3a:5a:04:33:33:05:f0:5b:36:b1:85:c2:a8: 50:5d:64:9e:f0:20:4c:06:7a:92:ca:82:6d:68:75:e5: 11:2d:bd:4d:15:6e:2c:15:60:ee:b6:68:f6:44:68:bc: bd:9f:ac:e5:ab:2e:58:cf:dc:a7:98:08:cb:14:14:bd: c3:5b:7b:03:26:d9:41:97:9e:bb:14:2e:9e:42:15:50: ba:a5:0c:c3:cb:b9:2b:d8:80:21:23:5b:42:a7:59:19: 00:95:52:81:87:a3:d7:bc:ed:3d:bf:51:45:f7:4e:6f: dc:0a:39:46:38:e4:7a:2b:31:f5:17:f3:73:5a:4e:c4: ca:94:89:7e:85:65:83:94:02:34:35:7f:1b:3f:d8:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:2a:bb:9b:52:e7:b1:1c:36:e9:9c:a3:b8:73:f0:32: fe:8f:28:d4:2a:8a:64:b5:65:02:bb:30:f8:77:43:64: 7d:3e:4d:21:0f:05:04:a3:c8:21:7a:43:cd:fb:3b:1d: 69:cf:f0:06:4c:7c:fc:70:ce:54:ba:7c:14:b2:b4:05: 2d:10:f2:72:54:00:3e:aa:d5:c2:48:b2:8a:e2:97:8c: 20:43:31:85:9f:30:f2:01:93:8a:81:09:5a:50:fc:0f: be:44:c1:5a:87:25:18:d5:55:cc:62:3a:66:74:85:68: a9:3f:66:5b:79:c2:8c:7f:26:dc:10:4e:a1:83:55:8a: 25:ee:d8:3c:ac:c6:4b:93:6f:54:c7:ff:b3:ff:2b:b4: ee:80:54:d2:5d:56:2e:39:fd:bc:66:e3:ca:50:fa:c8: 4f:cb:7e:39:e4:23:4a:1b:d3:60:85:f4:c3:9f:a7:c2: d0:a7:18:07:87:f8:a8:20:ca:2d:58:67:32:86:e4:47: 35:6c:90:72:b2:8c:fb:ba:ee:d3:c2:1f:08:54:96:ab: 81:05:f3:f1:eb:08:0b:35:6f:1f:0e:c8:20:a3:1e:fe: d3:25:01:05:94:de:d4:86:25:43:1b:7e:52:27:ac:26: ce:3d:29:62:5a:5a:31:bd:d3:ee:2e:20:67:fe:c8:ba Fingerprint (SHA-256): 77:0A:92:D8:21:36:00:D1:89:95:7F:0D:7E:43:E7:AE:25:61:52:25:96:7E:71:DC:0C:7C:07:26:9E:4D:12:40 Fingerprint (SHA1): 02:93:14:73:03:77:88:E1:CC:50:F8:98:78:F6:48:CF:F5:97:12:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2889: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2890: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2891: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191508 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2892: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2893: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2894: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2895: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191509 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2896: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2897: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2898: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2899: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191510 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2900: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2901: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2902: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2903: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191511 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2904: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2905: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2906: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2907: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191512 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2908: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2909: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2910: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191508 (0x433ed614) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:59 2025 Not After : Thu Nov 28 11:17:59 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a3:e8:d2:de:99:bc:77:43:42:93:c8:94:5d:51:70: 80:ea:9d:b7:9a:d5:61:95:82:7d:a3:6a:6b:4f:79:6a: 31:24:bb:4a:ed:d0:79:a9:f4:4d:4f:da:cc:2f:15:38: bd:4c:e8:97:78:51:88:5e:05:37:83:45:a5:13:67:bd: 43:7b:43:87:fc:32:f8:ec:c7:af:02:a0:ab:4b:e5:57: 15:dd:03:ac:0e:36:43:50:0e:c5:2f:d1:05:0b:2c:96: 0d:eb:e2:65:35:7f:93:b5:13:cf:0c:f4:bd:e9:eb:8f: e4:a7:62:93:2c:c4:51:0f:94:1b:d7:42:17:25:13:c7: c8:00:bc:be:e4:46:a7:5e:78:58:6e:1f:4e:98:70:96: d3:51:65:ff:87:a0:a7:64:d9:8d:f0:c9:77:62:d3:23: a3:c7:5d:e1:b0:ee:cb:65:49:4d:18:c7:ac:4c:2d:5d: 31:28:da:5d:67:5c:fc:3f:0e:e9:35:04:bf:4c:19:5b: 36:33:52:95:d0:5d:4d:b8:c3:03:b4:d9:ef:00:ba:e0: de:53:4c:fe:6e:3c:1b:2c:af:cc:3b:32:58:dd:4b:e2: ed:5a:c3:39:b9:3d:38:ab:fa:4e:a2:fe:b8:1c:9b:08: 32:62:37:e1:2c:40:4b:24:58:9c:8c:9b:d9:7f:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:d1:72:0a:e0:4d:0a:91:b6:21:cc:cd:4a:09:e3:d9: 96:e1:55:cf:40:87:a1:c8:72:7a:b6:03:74:32:2d:f5: f7:65:3a:ab:9a:be:a7:6c:8a:12:61:3d:c5:2c:f6:e2: d4:ca:bd:b3:52:65:04:b8:97:f4:79:93:4f:a1:61:b6: 4a:77:80:d9:dc:50:d0:87:66:c8:84:c8:b4:d1:ee:8c: 7d:a6:25:01:93:19:d4:cd:0e:fa:f0:6c:41:f3:e8:91: 3a:fe:b5:06:23:0c:39:66:b1:72:d7:62:f8:8e:24:e8: 1f:9f:c5:87:57:5e:11:3b:4f:c8:89:95:b8:cc:57:dd: 25:23:ea:3f:09:cf:9d:69:e8:15:b9:e5:aa:19:13:83: 46:b1:d9:f9:34:3a:7a:3c:d3:5f:77:e9:6f:91:ae:fe: e3:ac:d6:60:79:37:00:06:e9:b2:c5:bd:cb:cf:17:99: b0:72:fc:9c:4e:dd:29:1d:8b:ef:d2:ad:f4:e4:9d:0c: 9f:59:6b:32:fb:32:b4:50:3b:b7:03:1f:09:06:57:75: 4b:96:62:3d:68:23:d4:ca:7a:24:59:a7:3f:43:e1:32: 45:01:0c:bf:ae:e0:37:66:9f:a3:5f:bb:67:40:a6:02: 5c:e4:e4:d1:da:63:0a:b0:c8:68:07:a7:ab:e9:7f:9a Fingerprint (SHA-256): 1C:6F:B1:40:ED:85:1B:1B:93:09:D4:5D:96:31:5F:E8:04:00:03:64:0E:E3:EB:C2:36:81:D8:E8:6E:39:0F:01 Fingerprint (SHA1): B6:01:FA:E1:80:30:F5:B5:CD:E2:6C:41:F0:E7:2E:E6:C5:3D:C5:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2911: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2912: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191509 (0x433ed615) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:aa:a0:e8:2b:02:e4:fe:10:c8:c7:49:81:e7:ad:6c: 2a:b1:ab:f1:da:36:b0:50:13:3d:3f:ac:73:06:09:23: 3d:9c:39:01:fd:1a:f5:cb:fb:79:9f:ad:1e:4f:99:c7: 20:09:d3:ab:7d:5a:82:85:4c:05:3a:e4:40:1f:2e:b9: bd:a7:fd:63:0c:ed:c3:5c:66:b4:2f:08:62:81:69:66: 80:3f:48:ca:9c:2b:05:e1:8f:9c:01:f7:33:0a:3f:fb: 3b:4c:3f:d6:da:2e:d6:d1:47:33:4e:26:8b:1a:c7:cf: de:72:14:58:2e:de:27:54:69:ae:55:3b:1a:10:97:c5: 8d:29:31:89:80:9f:4c:a0:ec:db:7a:f9:1a:75:11:81: 2d:ee:a7:3d:0a:34:85:ef:e3:e8:08:c4:13:0d:57:df: 1f:57:83:f5:57:60:2a:b0:07:50:24:b4:59:f0:40:68: 7d:a4:ac:c7:28:74:50:2f:ba:5c:bb:15:54:f4:d5:aa: 4b:19:62:cb:ee:90:26:58:5a:99:98:4c:c3:48:ad:ee: 78:b6:24:c9:2d:76:2f:4d:26:fa:e7:bc:0a:6b:a0:fa: eb:3c:ec:28:3d:98:82:62:3f:6a:d3:2b:e9:aa:08:d1: c7:be:0d:41:de:4b:40:04:43:f5:ae:94:cd:89:e3:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:3d:83:e6:da:d6:b3:aa:bd:d4:7b:6b:f2:5f:ef:22: 70:b8:d5:c3:06:70:49:4a:92:b1:10:37:c5:fc:94:32: 64:95:d6:12:80:2e:cd:01:3d:a8:3e:d5:e6:a6:0b:90: d1:9f:0d:4a:09:9b:42:e5:b0:a1:b2:3d:08:09:ca:c1: 5c:83:03:c3:a9:80:c9:12:01:50:82:8c:57:5e:a8:2b: c7:b7:85:3a:21:4f:df:d5:46:cb:af:77:0a:0d:91:c2: 90:4b:a0:4a:9a:ed:5d:50:38:0c:a5:bd:f1:23:db:d8: a9:aa:14:f7:e7:b9:fd:ed:f5:db:0b:93:a8:52:c9:35: 17:06:34:c5:b6:68:22:67:8e:b7:e0:ba:06:38:59:09: 22:4f:68:0e:9c:21:13:57:a0:dd:71:de:99:d3:b6:62: 93:e5:6e:31:db:56:a1:60:53:df:d0:f2:4f:5d:ef:37: 0c:2c:06:f9:60:51:82:a4:be:15:85:a6:1d:d6:77:3c: 47:34:58:c4:f2:21:a8:8f:a5:ea:fe:53:54:94:06:f2: a3:ca:61:b1:13:30:e5:10:ba:c1:dd:5a:5c:fe:64:96: bf:c9:c9:b9:4e:e8:a8:11:1d:c5:17:12:72:5a:ec:ee: d3:24:7d:5c:3d:ca:4e:a5:2e:0e:24:08:4e:3f:00:b0 Fingerprint (SHA-256): B1:03:B0:55:79:24:32:47:7E:97:46:F9:8F:5D:1E:66:52:00:09:A7:E7:C0:00:BC:DE:21:ED:69:7D:1D:BC:94 Fingerprint (SHA1): 08:25:21:3F:EA:2C:EA:86:A8:B2:CA:39:7B:5D:46:34:E4:12:95:29 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2913: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2914: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191510 (0x433ed616) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:52:e8:4c:5b:fa:9b:4e:a2:9f:57:ce:44:dd:74:b2: fd:26:7d:c2:47:31:45:3b:84:34:d5:c1:1e:78:14:e3: 93:bc:6e:27:61:3e:ae:a7:29:b5:7f:c6:01:39:e3:d6: e1:14:92:e7:b9:5d:7b:a9:e1:35:4f:a7:ff:15:d4:53: 93:7a:34:6b:c5:85:17:30:58:3a:11:2a:17:d8:74:2e: da:7f:61:ed:92:5d:e3:68:04:56:07:02:7d:e9:23:5c: fd:8c:47:84:7e:72:f4:a8:7c:bd:f8:73:0b:7a:ab:91: b5:bc:a8:7a:4c:62:bf:e2:98:43:99:7b:fc:cd:54:07: c9:93:05:12:5e:39:f8:cf:5d:76:b8:39:ff:7e:2c:dc: 8c:ea:7d:10:56:2d:e1:80:35:fb:6a:da:3e:9d:ff:6e: 30:a5:1f:98:fa:c2:62:4c:9e:11:f9:1e:bf:bd:cc:a2: 71:51:b9:e5:70:a9:c6:1b:a1:48:47:87:c7:29:db:0c: bc:3c:db:0b:d0:d8:1b:cf:a4:4a:a7:9c:ea:41:8e:f6: 45:ee:07:ef:ef:e2:55:17:e9:89:36:ba:d6:d2:cc:60: 6a:a3:11:67:c6:aa:e1:5c:8b:f4:eb:9c:7d:1e:38:25: 47:d0:63:ef:0f:f7:31:79:d6:83:11:86:8d:b1:a4:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0d:be:9a:67:d0:f9:15:5e:4d:04:2b:7b:4f:82:27: 2d:96:01:c7:e6:c4:34:de:ce:3c:8d:a0:71:58:09:b7: 68:d9:64:63:a6:1a:7b:85:5e:dd:b5:16:d6:d9:38:f3: 6e:4a:23:6c:56:90:26:fa:c8:01:a9:64:3d:f8:d3:b0: 2d:a7:88:ff:e5:bf:ff:b0:aa:44:fb:6b:d1:45:45:b0: 5a:be:c0:2d:5e:78:b3:0b:42:eb:8d:7f:21:4e:5c:fe: b7:be:d2:9d:35:2d:5f:08:4f:52:fa:35:06:a8:d9:01: 4c:57:3b:41:d7:69:eb:16:11:ed:7c:ad:6d:47:4a:27: 50:23:93:53:d0:2d:8e:4a:f0:41:c7:e8:7c:04:dc:eb: 39:ae:b6:92:bf:b6:97:e2:ba:13:3f:19:00:76:af:ab: 9b:d9:7a:c7:68:54:cc:ec:e1:3d:53:58:22:2f:bd:67: ef:56:53:12:d0:5b:df:85:dd:c5:eb:67:42:32:d3:00: 87:eb:69:80:1d:97:5b:c8:12:aa:bf:79:b1:12:c6:da: 3b:30:1c:08:d0:e5:77:c4:fd:8b:61:7c:ec:c9:72:5a: a3:1c:3a:0a:1f:0d:f6:03:61:8d:7c:58:87:98:fc:04: 3f:02:c0:f8:c2:0b:01:94:0e:83:f0:89:ae:09:09:ac Fingerprint (SHA-256): 24:C7:92:14:3E:2F:26:3B:7F:72:C3:92:91:08:64:DA:CE:FD:71:3D:D0:FE:98:D0:61:A4:81:F5:4D:4E:2C:F9 Fingerprint (SHA1): 7C:03:F7:C5:A5:0B:CA:45:04:CE:A7:7F:9D:09:55:AF:3E:75:CC:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2915: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2916: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2917: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2918: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2919: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191508 (0x433ed614) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:59 2025 Not After : Thu Nov 28 11:17:59 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a3:e8:d2:de:99:bc:77:43:42:93:c8:94:5d:51:70: 80:ea:9d:b7:9a:d5:61:95:82:7d:a3:6a:6b:4f:79:6a: 31:24:bb:4a:ed:d0:79:a9:f4:4d:4f:da:cc:2f:15:38: bd:4c:e8:97:78:51:88:5e:05:37:83:45:a5:13:67:bd: 43:7b:43:87:fc:32:f8:ec:c7:af:02:a0:ab:4b:e5:57: 15:dd:03:ac:0e:36:43:50:0e:c5:2f:d1:05:0b:2c:96: 0d:eb:e2:65:35:7f:93:b5:13:cf:0c:f4:bd:e9:eb:8f: e4:a7:62:93:2c:c4:51:0f:94:1b:d7:42:17:25:13:c7: c8:00:bc:be:e4:46:a7:5e:78:58:6e:1f:4e:98:70:96: d3:51:65:ff:87:a0:a7:64:d9:8d:f0:c9:77:62:d3:23: a3:c7:5d:e1:b0:ee:cb:65:49:4d:18:c7:ac:4c:2d:5d: 31:28:da:5d:67:5c:fc:3f:0e:e9:35:04:bf:4c:19:5b: 36:33:52:95:d0:5d:4d:b8:c3:03:b4:d9:ef:00:ba:e0: de:53:4c:fe:6e:3c:1b:2c:af:cc:3b:32:58:dd:4b:e2: ed:5a:c3:39:b9:3d:38:ab:fa:4e:a2:fe:b8:1c:9b:08: 32:62:37:e1:2c:40:4b:24:58:9c:8c:9b:d9:7f:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:d1:72:0a:e0:4d:0a:91:b6:21:cc:cd:4a:09:e3:d9: 96:e1:55:cf:40:87:a1:c8:72:7a:b6:03:74:32:2d:f5: f7:65:3a:ab:9a:be:a7:6c:8a:12:61:3d:c5:2c:f6:e2: d4:ca:bd:b3:52:65:04:b8:97:f4:79:93:4f:a1:61:b6: 4a:77:80:d9:dc:50:d0:87:66:c8:84:c8:b4:d1:ee:8c: 7d:a6:25:01:93:19:d4:cd:0e:fa:f0:6c:41:f3:e8:91: 3a:fe:b5:06:23:0c:39:66:b1:72:d7:62:f8:8e:24:e8: 1f:9f:c5:87:57:5e:11:3b:4f:c8:89:95:b8:cc:57:dd: 25:23:ea:3f:09:cf:9d:69:e8:15:b9:e5:aa:19:13:83: 46:b1:d9:f9:34:3a:7a:3c:d3:5f:77:e9:6f:91:ae:fe: e3:ac:d6:60:79:37:00:06:e9:b2:c5:bd:cb:cf:17:99: b0:72:fc:9c:4e:dd:29:1d:8b:ef:d2:ad:f4:e4:9d:0c: 9f:59:6b:32:fb:32:b4:50:3b:b7:03:1f:09:06:57:75: 4b:96:62:3d:68:23:d4:ca:7a:24:59:a7:3f:43:e1:32: 45:01:0c:bf:ae:e0:37:66:9f:a3:5f:bb:67:40:a6:02: 5c:e4:e4:d1:da:63:0a:b0:c8:68:07:a7:ab:e9:7f:9a Fingerprint (SHA-256): 1C:6F:B1:40:ED:85:1B:1B:93:09:D4:5D:96:31:5F:E8:04:00:03:64:0E:E3:EB:C2:36:81:D8:E8:6E:39:0F:01 Fingerprint (SHA1): B6:01:FA:E1:80:30:F5:B5:CD:E2:6C:41:F0:E7:2E:E6:C5:3D:C5:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2920: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2921: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191509 (0x433ed615) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:aa:a0:e8:2b:02:e4:fe:10:c8:c7:49:81:e7:ad:6c: 2a:b1:ab:f1:da:36:b0:50:13:3d:3f:ac:73:06:09:23: 3d:9c:39:01:fd:1a:f5:cb:fb:79:9f:ad:1e:4f:99:c7: 20:09:d3:ab:7d:5a:82:85:4c:05:3a:e4:40:1f:2e:b9: bd:a7:fd:63:0c:ed:c3:5c:66:b4:2f:08:62:81:69:66: 80:3f:48:ca:9c:2b:05:e1:8f:9c:01:f7:33:0a:3f:fb: 3b:4c:3f:d6:da:2e:d6:d1:47:33:4e:26:8b:1a:c7:cf: de:72:14:58:2e:de:27:54:69:ae:55:3b:1a:10:97:c5: 8d:29:31:89:80:9f:4c:a0:ec:db:7a:f9:1a:75:11:81: 2d:ee:a7:3d:0a:34:85:ef:e3:e8:08:c4:13:0d:57:df: 1f:57:83:f5:57:60:2a:b0:07:50:24:b4:59:f0:40:68: 7d:a4:ac:c7:28:74:50:2f:ba:5c:bb:15:54:f4:d5:aa: 4b:19:62:cb:ee:90:26:58:5a:99:98:4c:c3:48:ad:ee: 78:b6:24:c9:2d:76:2f:4d:26:fa:e7:bc:0a:6b:a0:fa: eb:3c:ec:28:3d:98:82:62:3f:6a:d3:2b:e9:aa:08:d1: c7:be:0d:41:de:4b:40:04:43:f5:ae:94:cd:89:e3:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:3d:83:e6:da:d6:b3:aa:bd:d4:7b:6b:f2:5f:ef:22: 70:b8:d5:c3:06:70:49:4a:92:b1:10:37:c5:fc:94:32: 64:95:d6:12:80:2e:cd:01:3d:a8:3e:d5:e6:a6:0b:90: d1:9f:0d:4a:09:9b:42:e5:b0:a1:b2:3d:08:09:ca:c1: 5c:83:03:c3:a9:80:c9:12:01:50:82:8c:57:5e:a8:2b: c7:b7:85:3a:21:4f:df:d5:46:cb:af:77:0a:0d:91:c2: 90:4b:a0:4a:9a:ed:5d:50:38:0c:a5:bd:f1:23:db:d8: a9:aa:14:f7:e7:b9:fd:ed:f5:db:0b:93:a8:52:c9:35: 17:06:34:c5:b6:68:22:67:8e:b7:e0:ba:06:38:59:09: 22:4f:68:0e:9c:21:13:57:a0:dd:71:de:99:d3:b6:62: 93:e5:6e:31:db:56:a1:60:53:df:d0:f2:4f:5d:ef:37: 0c:2c:06:f9:60:51:82:a4:be:15:85:a6:1d:d6:77:3c: 47:34:58:c4:f2:21:a8:8f:a5:ea:fe:53:54:94:06:f2: a3:ca:61:b1:13:30:e5:10:ba:c1:dd:5a:5c:fe:64:96: bf:c9:c9:b9:4e:e8:a8:11:1d:c5:17:12:72:5a:ec:ee: d3:24:7d:5c:3d:ca:4e:a5:2e:0e:24:08:4e:3f:00:b0 Fingerprint (SHA-256): B1:03:B0:55:79:24:32:47:7E:97:46:F9:8F:5D:1E:66:52:00:09:A7:E7:C0:00:BC:DE:21:ED:69:7D:1D:BC:94 Fingerprint (SHA1): 08:25:21:3F:EA:2C:EA:86:A8:B2:CA:39:7B:5D:46:34:E4:12:95:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2922: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2923: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191510 (0x433ed616) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:52:e8:4c:5b:fa:9b:4e:a2:9f:57:ce:44:dd:74:b2: fd:26:7d:c2:47:31:45:3b:84:34:d5:c1:1e:78:14:e3: 93:bc:6e:27:61:3e:ae:a7:29:b5:7f:c6:01:39:e3:d6: e1:14:92:e7:b9:5d:7b:a9:e1:35:4f:a7:ff:15:d4:53: 93:7a:34:6b:c5:85:17:30:58:3a:11:2a:17:d8:74:2e: da:7f:61:ed:92:5d:e3:68:04:56:07:02:7d:e9:23:5c: fd:8c:47:84:7e:72:f4:a8:7c:bd:f8:73:0b:7a:ab:91: b5:bc:a8:7a:4c:62:bf:e2:98:43:99:7b:fc:cd:54:07: c9:93:05:12:5e:39:f8:cf:5d:76:b8:39:ff:7e:2c:dc: 8c:ea:7d:10:56:2d:e1:80:35:fb:6a:da:3e:9d:ff:6e: 30:a5:1f:98:fa:c2:62:4c:9e:11:f9:1e:bf:bd:cc:a2: 71:51:b9:e5:70:a9:c6:1b:a1:48:47:87:c7:29:db:0c: bc:3c:db:0b:d0:d8:1b:cf:a4:4a:a7:9c:ea:41:8e:f6: 45:ee:07:ef:ef:e2:55:17:e9:89:36:ba:d6:d2:cc:60: 6a:a3:11:67:c6:aa:e1:5c:8b:f4:eb:9c:7d:1e:38:25: 47:d0:63:ef:0f:f7:31:79:d6:83:11:86:8d:b1:a4:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0d:be:9a:67:d0:f9:15:5e:4d:04:2b:7b:4f:82:27: 2d:96:01:c7:e6:c4:34:de:ce:3c:8d:a0:71:58:09:b7: 68:d9:64:63:a6:1a:7b:85:5e:dd:b5:16:d6:d9:38:f3: 6e:4a:23:6c:56:90:26:fa:c8:01:a9:64:3d:f8:d3:b0: 2d:a7:88:ff:e5:bf:ff:b0:aa:44:fb:6b:d1:45:45:b0: 5a:be:c0:2d:5e:78:b3:0b:42:eb:8d:7f:21:4e:5c:fe: b7:be:d2:9d:35:2d:5f:08:4f:52:fa:35:06:a8:d9:01: 4c:57:3b:41:d7:69:eb:16:11:ed:7c:ad:6d:47:4a:27: 50:23:93:53:d0:2d:8e:4a:f0:41:c7:e8:7c:04:dc:eb: 39:ae:b6:92:bf:b6:97:e2:ba:13:3f:19:00:76:af:ab: 9b:d9:7a:c7:68:54:cc:ec:e1:3d:53:58:22:2f:bd:67: ef:56:53:12:d0:5b:df:85:dd:c5:eb:67:42:32:d3:00: 87:eb:69:80:1d:97:5b:c8:12:aa:bf:79:b1:12:c6:da: 3b:30:1c:08:d0:e5:77:c4:fd:8b:61:7c:ec:c9:72:5a: a3:1c:3a:0a:1f:0d:f6:03:61:8d:7c:58:87:98:fc:04: 3f:02:c0:f8:c2:0b:01:94:0e:83:f0:89:ae:09:09:ac Fingerprint (SHA-256): 24:C7:92:14:3E:2F:26:3B:7F:72:C3:92:91:08:64:DA:CE:FD:71:3D:D0:FE:98:D0:61:A4:81:F5:4D:4E:2C:F9 Fingerprint (SHA1): 7C:03:F7:C5:A5:0B:CA:45:04:CE:A7:7F:9D:09:55:AF:3E:75:CC:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2924: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2925: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191508 (0x433ed614) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:59 2025 Not After : Thu Nov 28 11:17:59 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a3:e8:d2:de:99:bc:77:43:42:93:c8:94:5d:51:70: 80:ea:9d:b7:9a:d5:61:95:82:7d:a3:6a:6b:4f:79:6a: 31:24:bb:4a:ed:d0:79:a9:f4:4d:4f:da:cc:2f:15:38: bd:4c:e8:97:78:51:88:5e:05:37:83:45:a5:13:67:bd: 43:7b:43:87:fc:32:f8:ec:c7:af:02:a0:ab:4b:e5:57: 15:dd:03:ac:0e:36:43:50:0e:c5:2f:d1:05:0b:2c:96: 0d:eb:e2:65:35:7f:93:b5:13:cf:0c:f4:bd:e9:eb:8f: e4:a7:62:93:2c:c4:51:0f:94:1b:d7:42:17:25:13:c7: c8:00:bc:be:e4:46:a7:5e:78:58:6e:1f:4e:98:70:96: d3:51:65:ff:87:a0:a7:64:d9:8d:f0:c9:77:62:d3:23: a3:c7:5d:e1:b0:ee:cb:65:49:4d:18:c7:ac:4c:2d:5d: 31:28:da:5d:67:5c:fc:3f:0e:e9:35:04:bf:4c:19:5b: 36:33:52:95:d0:5d:4d:b8:c3:03:b4:d9:ef:00:ba:e0: de:53:4c:fe:6e:3c:1b:2c:af:cc:3b:32:58:dd:4b:e2: ed:5a:c3:39:b9:3d:38:ab:fa:4e:a2:fe:b8:1c:9b:08: 32:62:37:e1:2c:40:4b:24:58:9c:8c:9b:d9:7f:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:d1:72:0a:e0:4d:0a:91:b6:21:cc:cd:4a:09:e3:d9: 96:e1:55:cf:40:87:a1:c8:72:7a:b6:03:74:32:2d:f5: f7:65:3a:ab:9a:be:a7:6c:8a:12:61:3d:c5:2c:f6:e2: d4:ca:bd:b3:52:65:04:b8:97:f4:79:93:4f:a1:61:b6: 4a:77:80:d9:dc:50:d0:87:66:c8:84:c8:b4:d1:ee:8c: 7d:a6:25:01:93:19:d4:cd:0e:fa:f0:6c:41:f3:e8:91: 3a:fe:b5:06:23:0c:39:66:b1:72:d7:62:f8:8e:24:e8: 1f:9f:c5:87:57:5e:11:3b:4f:c8:89:95:b8:cc:57:dd: 25:23:ea:3f:09:cf:9d:69:e8:15:b9:e5:aa:19:13:83: 46:b1:d9:f9:34:3a:7a:3c:d3:5f:77:e9:6f:91:ae:fe: e3:ac:d6:60:79:37:00:06:e9:b2:c5:bd:cb:cf:17:99: b0:72:fc:9c:4e:dd:29:1d:8b:ef:d2:ad:f4:e4:9d:0c: 9f:59:6b:32:fb:32:b4:50:3b:b7:03:1f:09:06:57:75: 4b:96:62:3d:68:23:d4:ca:7a:24:59:a7:3f:43:e1:32: 45:01:0c:bf:ae:e0:37:66:9f:a3:5f:bb:67:40:a6:02: 5c:e4:e4:d1:da:63:0a:b0:c8:68:07:a7:ab:e9:7f:9a Fingerprint (SHA-256): 1C:6F:B1:40:ED:85:1B:1B:93:09:D4:5D:96:31:5F:E8:04:00:03:64:0E:E3:EB:C2:36:81:D8:E8:6E:39:0F:01 Fingerprint (SHA1): B6:01:FA:E1:80:30:F5:B5:CD:E2:6C:41:F0:E7:2E:E6:C5:3D:C5:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2926: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191508 (0x433ed614) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:17:59 2025 Not After : Thu Nov 28 11:17:59 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a3:e8:d2:de:99:bc:77:43:42:93:c8:94:5d:51:70: 80:ea:9d:b7:9a:d5:61:95:82:7d:a3:6a:6b:4f:79:6a: 31:24:bb:4a:ed:d0:79:a9:f4:4d:4f:da:cc:2f:15:38: bd:4c:e8:97:78:51:88:5e:05:37:83:45:a5:13:67:bd: 43:7b:43:87:fc:32:f8:ec:c7:af:02:a0:ab:4b:e5:57: 15:dd:03:ac:0e:36:43:50:0e:c5:2f:d1:05:0b:2c:96: 0d:eb:e2:65:35:7f:93:b5:13:cf:0c:f4:bd:e9:eb:8f: e4:a7:62:93:2c:c4:51:0f:94:1b:d7:42:17:25:13:c7: c8:00:bc:be:e4:46:a7:5e:78:58:6e:1f:4e:98:70:96: d3:51:65:ff:87:a0:a7:64:d9:8d:f0:c9:77:62:d3:23: a3:c7:5d:e1:b0:ee:cb:65:49:4d:18:c7:ac:4c:2d:5d: 31:28:da:5d:67:5c:fc:3f:0e:e9:35:04:bf:4c:19:5b: 36:33:52:95:d0:5d:4d:b8:c3:03:b4:d9:ef:00:ba:e0: de:53:4c:fe:6e:3c:1b:2c:af:cc:3b:32:58:dd:4b:e2: ed:5a:c3:39:b9:3d:38:ab:fa:4e:a2:fe:b8:1c:9b:08: 32:62:37:e1:2c:40:4b:24:58:9c:8c:9b:d9:7f:4c:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:d1:72:0a:e0:4d:0a:91:b6:21:cc:cd:4a:09:e3:d9: 96:e1:55:cf:40:87:a1:c8:72:7a:b6:03:74:32:2d:f5: f7:65:3a:ab:9a:be:a7:6c:8a:12:61:3d:c5:2c:f6:e2: d4:ca:bd:b3:52:65:04:b8:97:f4:79:93:4f:a1:61:b6: 4a:77:80:d9:dc:50:d0:87:66:c8:84:c8:b4:d1:ee:8c: 7d:a6:25:01:93:19:d4:cd:0e:fa:f0:6c:41:f3:e8:91: 3a:fe:b5:06:23:0c:39:66:b1:72:d7:62:f8:8e:24:e8: 1f:9f:c5:87:57:5e:11:3b:4f:c8:89:95:b8:cc:57:dd: 25:23:ea:3f:09:cf:9d:69:e8:15:b9:e5:aa:19:13:83: 46:b1:d9:f9:34:3a:7a:3c:d3:5f:77:e9:6f:91:ae:fe: e3:ac:d6:60:79:37:00:06:e9:b2:c5:bd:cb:cf:17:99: b0:72:fc:9c:4e:dd:29:1d:8b:ef:d2:ad:f4:e4:9d:0c: 9f:59:6b:32:fb:32:b4:50:3b:b7:03:1f:09:06:57:75: 4b:96:62:3d:68:23:d4:ca:7a:24:59:a7:3f:43:e1:32: 45:01:0c:bf:ae:e0:37:66:9f:a3:5f:bb:67:40:a6:02: 5c:e4:e4:d1:da:63:0a:b0:c8:68:07:a7:ab:e9:7f:9a Fingerprint (SHA-256): 1C:6F:B1:40:ED:85:1B:1B:93:09:D4:5D:96:31:5F:E8:04:00:03:64:0E:E3:EB:C2:36:81:D8:E8:6E:39:0F:01 Fingerprint (SHA1): B6:01:FA:E1:80:30:F5:B5:CD:E2:6C:41:F0:E7:2E:E6:C5:3D:C5:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2927: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191509 (0x433ed615) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:aa:a0:e8:2b:02:e4:fe:10:c8:c7:49:81:e7:ad:6c: 2a:b1:ab:f1:da:36:b0:50:13:3d:3f:ac:73:06:09:23: 3d:9c:39:01:fd:1a:f5:cb:fb:79:9f:ad:1e:4f:99:c7: 20:09:d3:ab:7d:5a:82:85:4c:05:3a:e4:40:1f:2e:b9: bd:a7:fd:63:0c:ed:c3:5c:66:b4:2f:08:62:81:69:66: 80:3f:48:ca:9c:2b:05:e1:8f:9c:01:f7:33:0a:3f:fb: 3b:4c:3f:d6:da:2e:d6:d1:47:33:4e:26:8b:1a:c7:cf: de:72:14:58:2e:de:27:54:69:ae:55:3b:1a:10:97:c5: 8d:29:31:89:80:9f:4c:a0:ec:db:7a:f9:1a:75:11:81: 2d:ee:a7:3d:0a:34:85:ef:e3:e8:08:c4:13:0d:57:df: 1f:57:83:f5:57:60:2a:b0:07:50:24:b4:59:f0:40:68: 7d:a4:ac:c7:28:74:50:2f:ba:5c:bb:15:54:f4:d5:aa: 4b:19:62:cb:ee:90:26:58:5a:99:98:4c:c3:48:ad:ee: 78:b6:24:c9:2d:76:2f:4d:26:fa:e7:bc:0a:6b:a0:fa: eb:3c:ec:28:3d:98:82:62:3f:6a:d3:2b:e9:aa:08:d1: c7:be:0d:41:de:4b:40:04:43:f5:ae:94:cd:89:e3:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:3d:83:e6:da:d6:b3:aa:bd:d4:7b:6b:f2:5f:ef:22: 70:b8:d5:c3:06:70:49:4a:92:b1:10:37:c5:fc:94:32: 64:95:d6:12:80:2e:cd:01:3d:a8:3e:d5:e6:a6:0b:90: d1:9f:0d:4a:09:9b:42:e5:b0:a1:b2:3d:08:09:ca:c1: 5c:83:03:c3:a9:80:c9:12:01:50:82:8c:57:5e:a8:2b: c7:b7:85:3a:21:4f:df:d5:46:cb:af:77:0a:0d:91:c2: 90:4b:a0:4a:9a:ed:5d:50:38:0c:a5:bd:f1:23:db:d8: a9:aa:14:f7:e7:b9:fd:ed:f5:db:0b:93:a8:52:c9:35: 17:06:34:c5:b6:68:22:67:8e:b7:e0:ba:06:38:59:09: 22:4f:68:0e:9c:21:13:57:a0:dd:71:de:99:d3:b6:62: 93:e5:6e:31:db:56:a1:60:53:df:d0:f2:4f:5d:ef:37: 0c:2c:06:f9:60:51:82:a4:be:15:85:a6:1d:d6:77:3c: 47:34:58:c4:f2:21:a8:8f:a5:ea:fe:53:54:94:06:f2: a3:ca:61:b1:13:30:e5:10:ba:c1:dd:5a:5c:fe:64:96: bf:c9:c9:b9:4e:e8:a8:11:1d:c5:17:12:72:5a:ec:ee: d3:24:7d:5c:3d:ca:4e:a5:2e:0e:24:08:4e:3f:00:b0 Fingerprint (SHA-256): B1:03:B0:55:79:24:32:47:7E:97:46:F9:8F:5D:1E:66:52:00:09:A7:E7:C0:00:BC:DE:21:ED:69:7D:1D:BC:94 Fingerprint (SHA1): 08:25:21:3F:EA:2C:EA:86:A8:B2:CA:39:7B:5D:46:34:E4:12:95:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2928: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191509 (0x433ed615) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:aa:a0:e8:2b:02:e4:fe:10:c8:c7:49:81:e7:ad:6c: 2a:b1:ab:f1:da:36:b0:50:13:3d:3f:ac:73:06:09:23: 3d:9c:39:01:fd:1a:f5:cb:fb:79:9f:ad:1e:4f:99:c7: 20:09:d3:ab:7d:5a:82:85:4c:05:3a:e4:40:1f:2e:b9: bd:a7:fd:63:0c:ed:c3:5c:66:b4:2f:08:62:81:69:66: 80:3f:48:ca:9c:2b:05:e1:8f:9c:01:f7:33:0a:3f:fb: 3b:4c:3f:d6:da:2e:d6:d1:47:33:4e:26:8b:1a:c7:cf: de:72:14:58:2e:de:27:54:69:ae:55:3b:1a:10:97:c5: 8d:29:31:89:80:9f:4c:a0:ec:db:7a:f9:1a:75:11:81: 2d:ee:a7:3d:0a:34:85:ef:e3:e8:08:c4:13:0d:57:df: 1f:57:83:f5:57:60:2a:b0:07:50:24:b4:59:f0:40:68: 7d:a4:ac:c7:28:74:50:2f:ba:5c:bb:15:54:f4:d5:aa: 4b:19:62:cb:ee:90:26:58:5a:99:98:4c:c3:48:ad:ee: 78:b6:24:c9:2d:76:2f:4d:26:fa:e7:bc:0a:6b:a0:fa: eb:3c:ec:28:3d:98:82:62:3f:6a:d3:2b:e9:aa:08:d1: c7:be:0d:41:de:4b:40:04:43:f5:ae:94:cd:89:e3:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:3d:83:e6:da:d6:b3:aa:bd:d4:7b:6b:f2:5f:ef:22: 70:b8:d5:c3:06:70:49:4a:92:b1:10:37:c5:fc:94:32: 64:95:d6:12:80:2e:cd:01:3d:a8:3e:d5:e6:a6:0b:90: d1:9f:0d:4a:09:9b:42:e5:b0:a1:b2:3d:08:09:ca:c1: 5c:83:03:c3:a9:80:c9:12:01:50:82:8c:57:5e:a8:2b: c7:b7:85:3a:21:4f:df:d5:46:cb:af:77:0a:0d:91:c2: 90:4b:a0:4a:9a:ed:5d:50:38:0c:a5:bd:f1:23:db:d8: a9:aa:14:f7:e7:b9:fd:ed:f5:db:0b:93:a8:52:c9:35: 17:06:34:c5:b6:68:22:67:8e:b7:e0:ba:06:38:59:09: 22:4f:68:0e:9c:21:13:57:a0:dd:71:de:99:d3:b6:62: 93:e5:6e:31:db:56:a1:60:53:df:d0:f2:4f:5d:ef:37: 0c:2c:06:f9:60:51:82:a4:be:15:85:a6:1d:d6:77:3c: 47:34:58:c4:f2:21:a8:8f:a5:ea:fe:53:54:94:06:f2: a3:ca:61:b1:13:30:e5:10:ba:c1:dd:5a:5c:fe:64:96: bf:c9:c9:b9:4e:e8:a8:11:1d:c5:17:12:72:5a:ec:ee: d3:24:7d:5c:3d:ca:4e:a5:2e:0e:24:08:4e:3f:00:b0 Fingerprint (SHA-256): B1:03:B0:55:79:24:32:47:7E:97:46:F9:8F:5D:1E:66:52:00:09:A7:E7:C0:00:BC:DE:21:ED:69:7D:1D:BC:94 Fingerprint (SHA1): 08:25:21:3F:EA:2C:EA:86:A8:B2:CA:39:7B:5D:46:34:E4:12:95:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2929: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191510 (0x433ed616) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:52:e8:4c:5b:fa:9b:4e:a2:9f:57:ce:44:dd:74:b2: fd:26:7d:c2:47:31:45:3b:84:34:d5:c1:1e:78:14:e3: 93:bc:6e:27:61:3e:ae:a7:29:b5:7f:c6:01:39:e3:d6: e1:14:92:e7:b9:5d:7b:a9:e1:35:4f:a7:ff:15:d4:53: 93:7a:34:6b:c5:85:17:30:58:3a:11:2a:17:d8:74:2e: da:7f:61:ed:92:5d:e3:68:04:56:07:02:7d:e9:23:5c: fd:8c:47:84:7e:72:f4:a8:7c:bd:f8:73:0b:7a:ab:91: b5:bc:a8:7a:4c:62:bf:e2:98:43:99:7b:fc:cd:54:07: c9:93:05:12:5e:39:f8:cf:5d:76:b8:39:ff:7e:2c:dc: 8c:ea:7d:10:56:2d:e1:80:35:fb:6a:da:3e:9d:ff:6e: 30:a5:1f:98:fa:c2:62:4c:9e:11:f9:1e:bf:bd:cc:a2: 71:51:b9:e5:70:a9:c6:1b:a1:48:47:87:c7:29:db:0c: bc:3c:db:0b:d0:d8:1b:cf:a4:4a:a7:9c:ea:41:8e:f6: 45:ee:07:ef:ef:e2:55:17:e9:89:36:ba:d6:d2:cc:60: 6a:a3:11:67:c6:aa:e1:5c:8b:f4:eb:9c:7d:1e:38:25: 47:d0:63:ef:0f:f7:31:79:d6:83:11:86:8d:b1:a4:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0d:be:9a:67:d0:f9:15:5e:4d:04:2b:7b:4f:82:27: 2d:96:01:c7:e6:c4:34:de:ce:3c:8d:a0:71:58:09:b7: 68:d9:64:63:a6:1a:7b:85:5e:dd:b5:16:d6:d9:38:f3: 6e:4a:23:6c:56:90:26:fa:c8:01:a9:64:3d:f8:d3:b0: 2d:a7:88:ff:e5:bf:ff:b0:aa:44:fb:6b:d1:45:45:b0: 5a:be:c0:2d:5e:78:b3:0b:42:eb:8d:7f:21:4e:5c:fe: b7:be:d2:9d:35:2d:5f:08:4f:52:fa:35:06:a8:d9:01: 4c:57:3b:41:d7:69:eb:16:11:ed:7c:ad:6d:47:4a:27: 50:23:93:53:d0:2d:8e:4a:f0:41:c7:e8:7c:04:dc:eb: 39:ae:b6:92:bf:b6:97:e2:ba:13:3f:19:00:76:af:ab: 9b:d9:7a:c7:68:54:cc:ec:e1:3d:53:58:22:2f:bd:67: ef:56:53:12:d0:5b:df:85:dd:c5:eb:67:42:32:d3:00: 87:eb:69:80:1d:97:5b:c8:12:aa:bf:79:b1:12:c6:da: 3b:30:1c:08:d0:e5:77:c4:fd:8b:61:7c:ec:c9:72:5a: a3:1c:3a:0a:1f:0d:f6:03:61:8d:7c:58:87:98:fc:04: 3f:02:c0:f8:c2:0b:01:94:0e:83:f0:89:ae:09:09:ac Fingerprint (SHA-256): 24:C7:92:14:3E:2F:26:3B:7F:72:C3:92:91:08:64:DA:CE:FD:71:3D:D0:FE:98:D0:61:A4:81:F5:4D:4E:2C:F9 Fingerprint (SHA1): 7C:03:F7:C5:A5:0B:CA:45:04:CE:A7:7F:9D:09:55:AF:3E:75:CC:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2930: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191510 (0x433ed616) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:18:00 2025 Not After : Thu Nov 28 11:18:00 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:52:e8:4c:5b:fa:9b:4e:a2:9f:57:ce:44:dd:74:b2: fd:26:7d:c2:47:31:45:3b:84:34:d5:c1:1e:78:14:e3: 93:bc:6e:27:61:3e:ae:a7:29:b5:7f:c6:01:39:e3:d6: e1:14:92:e7:b9:5d:7b:a9:e1:35:4f:a7:ff:15:d4:53: 93:7a:34:6b:c5:85:17:30:58:3a:11:2a:17:d8:74:2e: da:7f:61:ed:92:5d:e3:68:04:56:07:02:7d:e9:23:5c: fd:8c:47:84:7e:72:f4:a8:7c:bd:f8:73:0b:7a:ab:91: b5:bc:a8:7a:4c:62:bf:e2:98:43:99:7b:fc:cd:54:07: c9:93:05:12:5e:39:f8:cf:5d:76:b8:39:ff:7e:2c:dc: 8c:ea:7d:10:56:2d:e1:80:35:fb:6a:da:3e:9d:ff:6e: 30:a5:1f:98:fa:c2:62:4c:9e:11:f9:1e:bf:bd:cc:a2: 71:51:b9:e5:70:a9:c6:1b:a1:48:47:87:c7:29:db:0c: bc:3c:db:0b:d0:d8:1b:cf:a4:4a:a7:9c:ea:41:8e:f6: 45:ee:07:ef:ef:e2:55:17:e9:89:36:ba:d6:d2:cc:60: 6a:a3:11:67:c6:aa:e1:5c:8b:f4:eb:9c:7d:1e:38:25: 47:d0:63:ef:0f:f7:31:79:d6:83:11:86:8d:b1:a4:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:0d:be:9a:67:d0:f9:15:5e:4d:04:2b:7b:4f:82:27: 2d:96:01:c7:e6:c4:34:de:ce:3c:8d:a0:71:58:09:b7: 68:d9:64:63:a6:1a:7b:85:5e:dd:b5:16:d6:d9:38:f3: 6e:4a:23:6c:56:90:26:fa:c8:01:a9:64:3d:f8:d3:b0: 2d:a7:88:ff:e5:bf:ff:b0:aa:44:fb:6b:d1:45:45:b0: 5a:be:c0:2d:5e:78:b3:0b:42:eb:8d:7f:21:4e:5c:fe: b7:be:d2:9d:35:2d:5f:08:4f:52:fa:35:06:a8:d9:01: 4c:57:3b:41:d7:69:eb:16:11:ed:7c:ad:6d:47:4a:27: 50:23:93:53:d0:2d:8e:4a:f0:41:c7:e8:7c:04:dc:eb: 39:ae:b6:92:bf:b6:97:e2:ba:13:3f:19:00:76:af:ab: 9b:d9:7a:c7:68:54:cc:ec:e1:3d:53:58:22:2f:bd:67: ef:56:53:12:d0:5b:df:85:dd:c5:eb:67:42:32:d3:00: 87:eb:69:80:1d:97:5b:c8:12:aa:bf:79:b1:12:c6:da: 3b:30:1c:08:d0:e5:77:c4:fd:8b:61:7c:ec:c9:72:5a: a3:1c:3a:0a:1f:0d:f6:03:61:8d:7c:58:87:98:fc:04: 3f:02:c0:f8:c2:0b:01:94:0e:83:f0:89:ae:09:09:ac Fingerprint (SHA-256): 24:C7:92:14:3E:2F:26:3B:7F:72:C3:92:91:08:64:DA:CE:FD:71:3D:D0:FE:98:D0:61:A4:81:F5:4D:4E:2C:F9 Fingerprint (SHA1): 7C:03:F7:C5:A5:0B:CA:45:04:CE:A7:7F:9D:09:55:AF:3E:75:CC:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2931: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2932: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191513 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2933: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2934: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2935: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2936: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191514 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2937: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2938: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2939: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2940: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191515 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2941: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2942: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2943: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2944: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128191516 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2945: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2946: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2947: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2948: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128191517 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2949: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2950: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2951: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2952: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128191518 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2953: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2954: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2955: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2956: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128191519 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2957: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2958: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2959: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2960: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2961: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2962: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2963: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191513 (0x433ed619) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:04 2025 Not After : Thu Nov 28 11:18:04 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:6d:45:59:a0:91:7d:66:7f:dc:e0:28:34:bd:8a:fd: cc:a4:4f:1e:83:3e:b9:d8:0c:a2:ca:d6:30:9b:63:97: b5:6a:ac:29:be:3c:87:b9:c9:91:34:27:72:18:f5:47: 4a:e7:60:d3:26:fe:5f:50:ea:cd:ff:29:84:8a:00:fb: 0c:73:69:15:d8:e0:d7:1a:82:39:0a:82:3c:b1:fe:00: 64:e0:5d:bc:8c:2c:65:5e:00:46:e9:99:53:5f:f4:b1: f0:d4:d2:99:71:43:46:6b:c2:43:be:5e:34:3c:64:6e: 13:49:fd:dc:9e:30:45:95:24:36:fb:39:5e:37:76:26: 6b:02:92:e6:59:df:4d:30:28:20:f5:e0:ae:18:38:e8: d3:00:22:b4:7f:6b:0e:a7:1e:89:a0:29:3f:8e:4a:ce: 65:d0:0c:68:1d:f9:3a:c6:2d:39:dd:74:9f:38:21:df: cf:79:e2:4c:d5:7c:d0:59:8c:74:f3:e2:52:50:96:71: f0:84:38:c2:ea:f2:09:69:3e:7b:f6:32:01:e3:00:47: 53:8e:c1:0a:23:cb:90:e9:75:d2:c4:af:d6:51:5b:9c: ef:15:b0:93:c9:70:b2:a5:1d:bc:89:0f:ba:d8:be:b4: 70:4c:b9:98:b3:63:55:7f:dc:4e:b0:ca:65:07:d2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:e0:82:f7:27:5e:dc:b6:ac:1c:ff:f2:89:c8:b7:66: 65:a8:bf:42:63:bd:54:40:4a:6b:cb:b7:1e:27:f0:f4: 2f:10:fd:9e:6d:f1:d4:22:48:be:4f:68:4c:93:93:af: cc:d8:53:10:49:df:25:95:ae:3d:33:33:3e:65:a7:87: 62:6c:3a:15:f2:e8:2e:91:da:1e:ad:f1:2d:bf:24:c2: f9:f5:7a:5d:f2:10:5b:21:66:39:1d:c8:77:1a:5f:a9: fb:d7:ff:de:1e:c6:a2:eb:0b:22:75:16:3b:f6:af:da: f2:74:67:ae:58:c7:fe:e0:42:66:e5:16:7a:27:30:db: 00:f7:c5:e1:4a:eb:16:10:98:00:f5:d1:18:e3:33:90: 7c:2d:4f:af:b5:75:fc:8d:4d:51:0f:9b:ba:40:7d:43: 92:ef:29:93:1a:57:8f:f0:42:86:17:11:3d:6f:51:43: 3c:9b:4f:77:5c:7a:6e:2a:ce:f0:fb:a5:12:37:ac:a3: b0:3c:2b:e3:48:ed:9d:2c:fc:80:d4:2a:35:95:51:a0: d7:4c:a6:16:14:75:1a:70:09:76:38:c6:49:e5:64:7c: 38:5b:ff:80:9e:2f:ef:58:b5:8c:98:bd:e7:58:fe:01: 9b:6a:3a:7a:2d:6c:13:4a:ce:8c:54:d4:61:9d:a8:a3 Fingerprint (SHA-256): 53:AD:AD:F7:D8:CD:C1:59:B4:E6:68:8C:06:F6:70:B4:63:69:D4:BF:2E:4D:2A:D7:95:B4:D8:F1:DF:CE:F2:8A Fingerprint (SHA1): 4A:EA:CB:15:59:02:15:7B:A8:9C:94:8C:19:B3:92:29:D5:47:63:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2964: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2965: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2966: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2967: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191513 (0x433ed619) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:04 2025 Not After : Thu Nov 28 11:18:04 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:6d:45:59:a0:91:7d:66:7f:dc:e0:28:34:bd:8a:fd: cc:a4:4f:1e:83:3e:b9:d8:0c:a2:ca:d6:30:9b:63:97: b5:6a:ac:29:be:3c:87:b9:c9:91:34:27:72:18:f5:47: 4a:e7:60:d3:26:fe:5f:50:ea:cd:ff:29:84:8a:00:fb: 0c:73:69:15:d8:e0:d7:1a:82:39:0a:82:3c:b1:fe:00: 64:e0:5d:bc:8c:2c:65:5e:00:46:e9:99:53:5f:f4:b1: f0:d4:d2:99:71:43:46:6b:c2:43:be:5e:34:3c:64:6e: 13:49:fd:dc:9e:30:45:95:24:36:fb:39:5e:37:76:26: 6b:02:92:e6:59:df:4d:30:28:20:f5:e0:ae:18:38:e8: d3:00:22:b4:7f:6b:0e:a7:1e:89:a0:29:3f:8e:4a:ce: 65:d0:0c:68:1d:f9:3a:c6:2d:39:dd:74:9f:38:21:df: cf:79:e2:4c:d5:7c:d0:59:8c:74:f3:e2:52:50:96:71: f0:84:38:c2:ea:f2:09:69:3e:7b:f6:32:01:e3:00:47: 53:8e:c1:0a:23:cb:90:e9:75:d2:c4:af:d6:51:5b:9c: ef:15:b0:93:c9:70:b2:a5:1d:bc:89:0f:ba:d8:be:b4: 70:4c:b9:98:b3:63:55:7f:dc:4e:b0:ca:65:07:d2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:e0:82:f7:27:5e:dc:b6:ac:1c:ff:f2:89:c8:b7:66: 65:a8:bf:42:63:bd:54:40:4a:6b:cb:b7:1e:27:f0:f4: 2f:10:fd:9e:6d:f1:d4:22:48:be:4f:68:4c:93:93:af: cc:d8:53:10:49:df:25:95:ae:3d:33:33:3e:65:a7:87: 62:6c:3a:15:f2:e8:2e:91:da:1e:ad:f1:2d:bf:24:c2: f9:f5:7a:5d:f2:10:5b:21:66:39:1d:c8:77:1a:5f:a9: fb:d7:ff:de:1e:c6:a2:eb:0b:22:75:16:3b:f6:af:da: f2:74:67:ae:58:c7:fe:e0:42:66:e5:16:7a:27:30:db: 00:f7:c5:e1:4a:eb:16:10:98:00:f5:d1:18:e3:33:90: 7c:2d:4f:af:b5:75:fc:8d:4d:51:0f:9b:ba:40:7d:43: 92:ef:29:93:1a:57:8f:f0:42:86:17:11:3d:6f:51:43: 3c:9b:4f:77:5c:7a:6e:2a:ce:f0:fb:a5:12:37:ac:a3: b0:3c:2b:e3:48:ed:9d:2c:fc:80:d4:2a:35:95:51:a0: d7:4c:a6:16:14:75:1a:70:09:76:38:c6:49:e5:64:7c: 38:5b:ff:80:9e:2f:ef:58:b5:8c:98:bd:e7:58:fe:01: 9b:6a:3a:7a:2d:6c:13:4a:ce:8c:54:d4:61:9d:a8:a3 Fingerprint (SHA-256): 53:AD:AD:F7:D8:CD:C1:59:B4:E6:68:8C:06:F6:70:B4:63:69:D4:BF:2E:4D:2A:D7:95:B4:D8:F1:DF:CE:F2:8A Fingerprint (SHA1): 4A:EA:CB:15:59:02:15:7B:A8:9C:94:8C:19:B3:92:29:D5:47:63:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2968: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2969: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2970: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191520 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2971: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2972: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2973: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2974: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191521 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2975: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2976: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2977: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2978: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128191522 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2979: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2980: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2981: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2982: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128191523 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2983: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2984: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2985: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2986: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128191524 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2987: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2988: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2989: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2990: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128191525 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2991: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2992: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2993: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2994: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128191526 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2995: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2996: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2997: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2998: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128191527 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2999: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3000: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3001: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3002: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128191528 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3003: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3004: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3005: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3006: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128191529 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3007: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3008: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3009: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3010: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128191530 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3011: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3012: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3013: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3014: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128191531 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3015: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3016: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3017: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3018: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128191532 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3019: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3020: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3021: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3022: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128191533 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3023: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3024: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3025: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3026: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128191534 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3027: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3028: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3029: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3030: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128191535 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3031: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3032: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3033: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3034: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128191536 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3035: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3036: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3037: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3038: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128191537 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3039: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3040: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3041: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3042: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128191538 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3043: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3044: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3045: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3046: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128191539 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3047: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3048: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3049: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3050: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128191540 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3051: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3052: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3053: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3054: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128191541 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3055: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3056: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3057: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3058: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128191542 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3059: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3060: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3061: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3062: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128191543 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3063: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3064: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3065: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3066: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128191544 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3067: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3068: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3069: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3070: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128191545 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3071: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3072: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3073: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3074: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128191546 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3075: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3076: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3077: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3078: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128191547 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3079: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3080: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3081: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3082: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128191548 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3083: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3084: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3085: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3086: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128191549 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3087: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3088: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3089: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3090: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3091: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3094: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3095: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3096: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3097: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3098: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3099: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3100: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3101: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3102: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3103: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3104: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3105: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3106: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3107: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3108: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3109: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3110: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3111: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191520 (0x433ed620) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:18:10 2025 Not After : Thu Nov 28 11:18:10 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:2a:d9:8c:28:b0:09:f1:db:aa:cc:eb:53:23:b2:8e: 0d:24:8a:54:f3:6f:fd:1e:a4:bb:05:60:a0:52:7e:37: 40:84:83:ed:9f:52:ca:46:39:b8:e1:5f:df:d7:84:02: c4:b0:e6:d5:7b:f1:bd:27:20:b0:0f:41:7e:31:f8:97: cd:10:8c:c7:ce:a6:97:89:f2:16:88:e4:a4:c8:6a:60: b7:9c:9b:85:e9:e5:cc:aa:0c:9e:e1:fe:f8:61:54:e5: be:67:cf:a1:1f:cb:23:bd:93:a0:1a:a5:bb:d9:ef:b3: e3:2c:5b:71:dc:f7:ec:43:fe:d4:d6:5d:0a:47:e0:c2: 75:5d:72:76:13:54:e9:42:7b:a2:a1:93:d7:c5:1d:34: dd:c7:55:b8:98:0e:e1:9e:e3:cc:1d:1f:6d:50:c5:63: dd:30:2f:94:de:b5:de:14:bf:21:0a:e8:d2:3f:a2:bc: af:7e:1d:db:3f:0a:15:89:f6:4f:2b:e7:c3:9d:84:4d: 2e:e9:93:07:8e:a4:2b:90:b0:6d:8d:d4:da:3b:59:5c: 4d:d9:ec:01:a6:d0:e8:25:36:cb:31:da:92:d5:81:f5: ce:57:1e:bc:1d:b2:ad:cc:1c:c8:13:0b:4e:3d:ca:98: fc:70:f5:47:ab:35:ef:77:a0:82:4d:30:15:77:df:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:65:4c:30:79:96:ca:e3:95:b6:de:00:10:9c:71:31: 9e:f9:83:91:07:6f:aa:72:bc:cc:90:6f:46:37:c1:24: 98:82:ea:0a:ea:b5:a0:7f:50:6f:09:47:05:30:e5:62: 43:64:c0:b7:ad:71:bb:a0:b1:51:fd:3e:02:21:4f:fd: 0f:cf:5f:f6:49:33:4b:fb:3b:33:97:38:1e:fb:83:48: 8b:d0:fc:15:b0:4b:57:10:80:62:9c:d0:e6:83:01:36: 5c:fa:81:8d:1f:e8:0f:8d:eb:be:1a:ba:86:76:b6:73: 42:fe:cd:ac:22:d7:2a:2f:10:6b:3d:0e:56:42:3c:6a: 40:b4:55:79:5f:ee:0d:59:f8:22:af:4f:29:ed:98:a5: d6:94:47:c3:32:a8:c8:83:b3:f3:41:1a:a2:c3:10:f7: bb:10:37:af:ec:c5:f1:56:7e:dc:5f:36:5b:1c:bb:0d: d7:3e:eb:04:15:04:af:16:0b:82:22:53:1a:d4:49:32: 73:59:7b:0a:a0:91:ae:9d:fc:de:b8:9a:e0:98:95:4e: e2:ad:ca:5c:90:69:e9:12:ae:8e:c1:bb:87:d8:c1:33: 0b:81:d1:5b:b8:8f:fa:e9:1d:86:9d:4a:21:d2:c6:18: 16:ea:a8:4a:2e:69:9b:fe:06:08:e8:08:27:c9:19:b7 Fingerprint (SHA-256): 47:57:31:94:48:7C:14:CD:EE:7D:1F:0C:46:27:08:10:90:2C:57:79:F8:6A:02:08:51:4D:54:EB:67:8D:E7:48 Fingerprint (SHA1): 9E:F2:C1:67:86:97:82:E3:DA:DE:DF:30:90:9E:BF:51:F2:E3:AB:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3112: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3113: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3114: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191550 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3115: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3116: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3117: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3118: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128191551 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3119: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3120: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3121: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3122: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128191552 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3123: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3124: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3125: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3126: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128191553 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3127: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3128: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3129: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3130: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128191554 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3131: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3132: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3133: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3134: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128191555 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3135: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3136: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3137: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3138: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128191556 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3139: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3140: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3141: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191550 (0x433ed63e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:33 2025 Not After : Thu Nov 28 11:18:33 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:f6:5c:89:09:97:91:34:46:d7:5c:2f:51:d8:f8:a1: e6:bd:a7:3c:62:54:6d:ac:56:2c:64:18:72:f2:5b:0c: 51:82:2a:fd:2d:ca:11:66:ec:79:dd:7b:55:85:74:7a: 65:13:7e:b9:64:b0:53:c5:ed:84:85:de:b7:71:2b:e6: 8c:eb:e9:f7:3d:7e:3b:9c:c6:c3:2a:16:31:36:a2:a6: 62:21:dd:ce:0f:65:74:8e:2c:be:d8:b7:0b:c9:1d:5a: 8c:d8:ab:4a:f6:0e:71:80:bd:10:1e:ff:45:57:cc:a8: 86:db:c9:69:4f:9f:3c:cd:4c:09:a1:ef:78:14:c5:88: cb:93:6c:cf:3d:ed:d3:49:5c:06:0e:a1:ea:87:4e:7a: cb:d2:ec:4b:3b:9c:97:03:f3:f9:98:74:06:a2:22:55: 00:d9:a7:dd:18:9f:ef:ce:19:dc:89:a7:7d:79:5a:75: 08:30:31:12:19:16:8b:54:1e:e3:2f:91:34:74:71:aa: 96:95:72:04:3a:ea:91:7c:33:6d:0b:18:51:43:1b:30: b7:ba:f9:44:b4:9d:b5:10:59:c9:ed:2f:58:36:cc:59: f3:78:b1:fe:22:52:6b:77:f2:04:c1:de:34:45:90:5f: 11:9d:ed:7c:ea:c7:53:c2:cd:c4:6d:f0:3c:64:d1:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:fa:86:7b:63:88:03:cb:ad:8e:11:57:20:bb:d7:01: 8d:8b:89:fe:8d:67:a1:da:39:86:16:bb:91:3b:2f:94: fb:2c:08:a0:c3:89:65:95:ac:8c:62:4b:cf:30:8f:32: 8e:34:59:e6:6b:c7:ed:88:a2:ff:e3:aa:2a:33:e4:43: bf:cf:5a:4a:25:9b:15:50:a5:e8:4b:9c:b7:15:c3:ff: c0:cb:41:0f:44:28:bd:e3:7d:d8:1b:48:eb:cb:4a:c3: b4:97:92:7f:44:e5:10:c2:7e:e8:24:2c:33:01:7c:bc: f1:90:ee:0d:55:7b:73:9c:a2:f8:bf:fe:3f:be:eb:6d: 49:10:28:15:3a:42:08:e6:a1:ad:24:be:be:be:cf:de: c7:59:98:aa:7a:0b:73:3e:f4:cf:45:76:76:0e:64:14: a4:e0:68:02:1b:b9:54:3c:7f:cf:de:a3:97:06:98:09: fb:6a:7a:55:4d:b4:cb:14:75:d6:29:19:de:11:b8:f1: e0:ed:57:e1:56:e2:3c:02:6d:b6:bc:ad:21:ec:80:c3: 4c:fa:b1:96:0f:61:8a:d3:90:6e:d8:1e:4e:6c:e1:7d: 2d:4d:68:3d:8f:ed:7f:55:58:e6:28:c3:c7:e4:23:dc: 2b:81:52:77:64:0a:d0:2d:c7:7a:2f:16:02:38:d3:ae Fingerprint (SHA-256): 47:94:C4:AB:F5:19:8B:39:2A:39:6F:E7:FA:AA:14:7D:2A:00:5C:98:49:EE:68:B8:53:58:DA:7A:92:2C:D6:3C Fingerprint (SHA1): 7C:BD:A8:95:72:8D:C0:03:B4:0A:E6:94:57:31:0B:E5:21:00:21:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3142: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3143: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3144: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3145: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191550 (0x433ed63e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:33 2025 Not After : Thu Nov 28 11:18:33 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:f6:5c:89:09:97:91:34:46:d7:5c:2f:51:d8:f8:a1: e6:bd:a7:3c:62:54:6d:ac:56:2c:64:18:72:f2:5b:0c: 51:82:2a:fd:2d:ca:11:66:ec:79:dd:7b:55:85:74:7a: 65:13:7e:b9:64:b0:53:c5:ed:84:85:de:b7:71:2b:e6: 8c:eb:e9:f7:3d:7e:3b:9c:c6:c3:2a:16:31:36:a2:a6: 62:21:dd:ce:0f:65:74:8e:2c:be:d8:b7:0b:c9:1d:5a: 8c:d8:ab:4a:f6:0e:71:80:bd:10:1e:ff:45:57:cc:a8: 86:db:c9:69:4f:9f:3c:cd:4c:09:a1:ef:78:14:c5:88: cb:93:6c:cf:3d:ed:d3:49:5c:06:0e:a1:ea:87:4e:7a: cb:d2:ec:4b:3b:9c:97:03:f3:f9:98:74:06:a2:22:55: 00:d9:a7:dd:18:9f:ef:ce:19:dc:89:a7:7d:79:5a:75: 08:30:31:12:19:16:8b:54:1e:e3:2f:91:34:74:71:aa: 96:95:72:04:3a:ea:91:7c:33:6d:0b:18:51:43:1b:30: b7:ba:f9:44:b4:9d:b5:10:59:c9:ed:2f:58:36:cc:59: f3:78:b1:fe:22:52:6b:77:f2:04:c1:de:34:45:90:5f: 11:9d:ed:7c:ea:c7:53:c2:cd:c4:6d:f0:3c:64:d1:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:fa:86:7b:63:88:03:cb:ad:8e:11:57:20:bb:d7:01: 8d:8b:89:fe:8d:67:a1:da:39:86:16:bb:91:3b:2f:94: fb:2c:08:a0:c3:89:65:95:ac:8c:62:4b:cf:30:8f:32: 8e:34:59:e6:6b:c7:ed:88:a2:ff:e3:aa:2a:33:e4:43: bf:cf:5a:4a:25:9b:15:50:a5:e8:4b:9c:b7:15:c3:ff: c0:cb:41:0f:44:28:bd:e3:7d:d8:1b:48:eb:cb:4a:c3: b4:97:92:7f:44:e5:10:c2:7e:e8:24:2c:33:01:7c:bc: f1:90:ee:0d:55:7b:73:9c:a2:f8:bf:fe:3f:be:eb:6d: 49:10:28:15:3a:42:08:e6:a1:ad:24:be:be:be:cf:de: c7:59:98:aa:7a:0b:73:3e:f4:cf:45:76:76:0e:64:14: a4:e0:68:02:1b:b9:54:3c:7f:cf:de:a3:97:06:98:09: fb:6a:7a:55:4d:b4:cb:14:75:d6:29:19:de:11:b8:f1: e0:ed:57:e1:56:e2:3c:02:6d:b6:bc:ad:21:ec:80:c3: 4c:fa:b1:96:0f:61:8a:d3:90:6e:d8:1e:4e:6c:e1:7d: 2d:4d:68:3d:8f:ed:7f:55:58:e6:28:c3:c7:e4:23:dc: 2b:81:52:77:64:0a:d0:2d:c7:7a:2f:16:02:38:d3:ae Fingerprint (SHA-256): 47:94:C4:AB:F5:19:8B:39:2A:39:6F:E7:FA:AA:14:7D:2A:00:5C:98:49:EE:68:B8:53:58:DA:7A:92:2C:D6:3C Fingerprint (SHA1): 7C:BD:A8:95:72:8D:C0:03:B4:0A:E6:94:57:31:0B:E5:21:00:21:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3146: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3147: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3148: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3149: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191557 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3150: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3151: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3152: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3153: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191558 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3154: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3155: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3156: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3157: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191559 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3158: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3159: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3160: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3161: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191560 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3162: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3163: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3164: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3165: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3166: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3167: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191557 (0x433ed645) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:38 2025 Not After : Thu Nov 28 11:18:38 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:0d:bf:4a:be:64:f6:82:5f:fa:14:83:bd:2d:c4:58: ac:38:4e:74:3f:ba:b1:a6:a0:e8:78:32:48:25:b0:dd: 42:fe:50:74:24:2a:8b:c2:7c:51:67:14:dd:fc:1f:ef: 10:bb:84:c2:69:c0:8c:2a:8f:5c:c0:fe:2e:0b:d8:e5: c9:6d:04:8a:93:14:03:de:1f:50:1a:ad:bb:ba:6b:d4: c1:82:d6:20:38:2b:c4:a0:64:08:99:59:81:12:d1:ad: 05:be:19:13:86:93:13:c6:ea:62:87:ba:92:2b:08:85: 27:1c:43:1a:69:9d:3b:a6:e5:7e:7b:b0:54:07:83:53: ed:fe:25:28:e8:6d:cd:53:70:43:4f:08:83:d8:7a:a7: 92:22:9a:21:ad:7c:e3:92:88:6b:d5:5d:04:c3:3f:81: e5:94:a8:a2:45:9d:b9:b4:c2:52:87:f1:a1:1d:33:2e: 16:54:45:ad:ca:a8:f7:db:e4:94:07:98:2b:bd:a5:37: a0:13:71:ab:a8:d0:31:ca:a7:33:5d:b1:d2:cc:25:54: 5a:e9:b5:88:c3:a6:2d:1b:bb:e2:36:d3:b6:cd:24:43: e0:fd:b5:fa:18:76:6b:5e:02:9d:a1:1d:45:ed:a0:0c: e5:6d:ea:f7:49:51:70:9a:3e:4d:c7:f2:9c:b0:0b:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:ba:72:98:aa:36:8f:88:c8:f1:be:34:2d:8d:fd:90: 1d:a7:68:42:2b:97:22:f1:b2:37:56:bd:51:98:7f:12: b6:43:8c:1a:02:f8:28:a4:e8:3c:23:52:b8:6b:75:49: 0c:0e:5c:76:0f:ba:e5:3c:b1:5c:04:27:ff:b6:86:61: fb:3a:37:a4:d1:6b:98:f6:92:39:f6:d4:cc:ed:da:22: 8d:bc:e7:41:6e:92:73:fe:0f:9b:f1:14:fa:07:6f:3d: 22:72:35:e7:cf:25:bf:32:55:83:ae:54:30:3d:e3:1f: 58:34:c7:9b:2b:2e:3e:4d:70:f3:83:15:50:e3:7a:76: f3:85:22:00:47:9d:a1:64:38:01:5e:64:44:e7:6e:31: ba:1d:97:2e:1a:6e:57:9c:bb:5d:af:b2:b4:23:90:02: bd:e8:a7:58:23:60:ab:57:75:09:6f:df:92:c9:0f:25: 45:32:d1:0a:f9:f4:b0:aa:3a:b7:d0:f8:14:08:a9:6e: ed:a3:b6:77:9b:4d:b9:eb:7e:65:78:5f:d7:8b:cf:63: 53:2a:39:21:7c:5b:74:a3:d3:09:57:51:85:75:e4:43: a7:d3:5d:a2:c3:a9:75:4f:2e:41:36:55:2a:6d:ee:2c: 83:ce:83:06:73:ec:6c:e5:f7:ac:63:9d:28:f7:9a:fc Fingerprint (SHA-256): 49:28:C7:A7:FC:75:60:2F:44:D7:35:C2:20:02:2E:36:52:ED:19:01:EA:6A:28:DC:A2:6A:AA:1C:53:67:5E:AB Fingerprint (SHA1): 3E:C1:11:0D:30:88:C8:BB:D1:0C:58:91:3E:13:B8:A7:22:A7:AF:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3168: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3169: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3170: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191558 (0x433ed646) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:39 2025 Not After : Thu Nov 28 11:18:39 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:b4:44:24:0c:6e:44:dc:4e:31:eb:f6:e7:78:e4:70: e9:a0:49:31:d8:67:d6:c5:4c:c9:17:ac:21:94:50:70: 8e:fa:42:f3:a7:9f:19:d1:5e:15:ca:2a:4a:be:3f:1f: e5:be:34:ef:d1:9d:c8:8f:60:3b:13:e5:36:8d:7b:08: 39:be:03:68:15:ac:03:ef:61:0e:43:ff:fb:a3:2a:bc: 97:29:d8:60:10:a0:84:f4:cb:57:1b:c7:0f:bb:25:80: aa:f4:52:33:0d:f4:ce:22:0d:54:8d:5d:97:87:95:c0: 97:4f:a4:62:38:1e:54:14:80:bc:e6:1b:d1:85:22:cf: 7c:44:ed:e0:d9:64:2f:8e:07:7c:92:5e:71:76:72:5b: 9d:14:3e:81:32:69:cc:fe:93:2e:58:b0:a7:36:93:7a: bc:5e:a7:7f:62:16:24:26:ea:89:ab:97:00:ef:6a:6b: 7e:00:5b:07:9a:81:4c:bd:b6:c9:e1:81:64:39:2e:0f: 4a:48:77:29:b7:c7:90:03:2d:f1:12:bf:0c:55:c2:fd: 58:80:a1:42:71:93:bd:9b:6b:02:9a:cb:9a:e7:43:f3: 7a:7e:c7:63:7a:1b:62:77:8c:18:05:52:33:d1:99:26: e5:54:ae:12:d4:4e:55:a1:fe:4f:7a:63:e5:3d:77:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:29:df:45:87:07:24:58:20:5f:19:f2:f1:71:7b:01: eb:38:5a:fb:69:51:af:5c:a7:5f:dd:db:a6:31:d2:9d: 2b:73:73:18:d9:2f:e2:7a:fe:1e:3e:54:8e:85:8a:4d: 53:57:b8:a8:69:c6:e9:bc:a3:5f:37:c3:e6:04:3d:05: aa:26:af:e2:ef:7b:bc:aa:d4:da:6d:e4:72:d3:61:86: 46:a5:4f:47:f2:26:68:9d:b6:fd:d1:99:9d:d2:2f:b7: 2f:81:94:20:f4:4a:3b:52:da:5e:33:81:9c:f9:ee:d5: 7c:59:53:59:db:70:00:7f:e6:64:b5:f6:55:ca:6f:6e: 36:1f:89:50:d9:14:58:ca:2f:9b:ca:37:00:5e:19:52: 6b:0b:f8:8c:6f:b9:ee:38:38:70:01:a9:e1:bf:a1:e2: af:23:92:b1:40:db:ee:ba:af:17:ab:df:2d:99:8b:c9: 42:37:b1:28:d9:54:49:af:02:93:5f:44:e2:00:c3:ae: be:77:0e:2e:6a:fe:b4:bb:1c:01:d5:68:d0:b7:ef:9c: 3a:9f:4e:3f:5e:f3:0f:64:67:e2:b2:a4:ef:b6:6d:83: 8b:a4:b1:98:c0:33:f6:af:20:e5:5f:cf:67:69:51:d5: e4:cb:04:37:d7:ce:38:6a:70:2b:94:5a:09:51:92:38 Fingerprint (SHA-256): 05:44:0F:BC:1D:1A:2E:38:C1:71:91:83:51:93:0E:6D:E6:BD:CA:66:98:29:87:A3:2C:0E:B5:25:7E:E7:E8:51 Fingerprint (SHA1): CF:7B:D0:0B:4F:10:78:FF:9A:4C:31:BC:9B:BE:97:CF:A2:D4:D6:8F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3171: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3172: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191559 (0x433ed647) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:18:39 2025 Not After : Thu Nov 28 11:18:39 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:45:27:b6:7e:cf:2e:ea:fb:c8:b9:de:5b:77:83:33: 5e:bd:59:4b:c5:24:1c:9b:ac:e1:20:a6:9b:45:74:22: df:6c:de:78:40:5c:03:da:ce:c1:4d:e3:d1:cb:8e:81: 5d:c6:c7:29:81:56:7e:51:f5:6b:92:21:69:1b:b3:6a: ee:2f:c1:e6:60:cb:ce:6b:02:2c:65:58:5f:47:dc:e3: c8:d2:22:ce:44:df:11:ac:37:b1:76:1a:8b:21:f0:7e: 00:97:06:1f:2f:fd:28:e4:87:0b:a7:ae:be:19:27:e7: 7d:e9:aa:ad:9d:d5:9f:1e:a3:1b:ed:e5:69:01:7a:f6: a5:a2:6d:36:81:9a:42:55:cd:6a:23:df:52:06:d1:d7: 32:32:a9:85:cf:c9:34:6d:9c:ff:db:a9:53:3a:a4:94: 44:64:3f:e7:df:e9:3d:9c:e0:22:f7:29:a8:36:4e:6e: ee:4d:b4:d9:b3:3c:c6:9e:0c:88:32:cf:a9:06:55:4b: 41:8f:0a:bc:73:cb:ce:f7:07:2a:e3:75:c3:3a:94:68: d3:2e:34:1f:87:8d:7a:08:2f:83:da:7e:34:13:5e:e3: d8:21:3c:bd:20:9c:33:05:2b:41:48:26:93:2f:20:99: 97:0d:9f:7b:17:d7:75:85:99:3e:63:70:61:66:5c:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:cf:86:4e:b3:f4:5d:59:7b:5a:9f:6d:fc:c2:e9:ad: b3:d3:e0:f1:b8:ec:d6:6f:b0:00:61:91:7e:1d:29:6c: 0c:d3:c2:75:13:e7:01:42:98:7a:c6:47:d9:f2:87:04: 72:45:4c:d8:ed:aa:f3:5d:42:83:3e:7e:db:1d:b7:68: e4:28:1c:ab:4f:77:93:19:e7:e6:44:aa:a4:de:83:72: 5f:26:e1:a8:06:b4:17:7d:a4:e1:65:b1:49:bc:93:dd: 65:18:d1:64:b7:df:53:89:1e:7b:60:b7:36:12:61:11: 8e:46:ff:83:04:4b:5f:bc:ba:50:b3:0f:45:31:e3:18: ef:db:d7:26:28:a2:23:40:85:22:63:95:92:60:75:b0: f7:03:ea:6c:5d:d0:41:a7:6a:4c:32:b6:86:d4:07:33: e6:19:cc:bb:41:54:c3:26:41:53:27:ea:fb:65:87:38: 1d:52:15:2e:09:46:c7:1d:e9:cc:97:41:e8:4a:10:bb: 76:0c:0a:14:28:e3:73:f8:39:5a:db:d0:a3:fc:89:df: 99:23:9f:ef:48:82:c1:0d:fe:9f:80:54:11:9d:3e:b8: fc:46:cf:11:57:69:c6:4f:20:7d:cb:4b:6a:51:4d:0c: b7:b8:a6:de:c0:fb:c2:90:3f:54:a1:e6:43:33:61:8b Fingerprint (SHA-256): 81:EF:E2:98:70:EB:CF:AE:F5:DF:2D:5B:89:08:38:51:28:BE:6C:48:B9:1D:E2:F4:1D:9C:81:24:53:2A:BA:76 Fingerprint (SHA1): DD:C6:CF:AC:EB:47:16:A8:75:9F:94:27:B6:73:4B:CD:E2:A0:08:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3173: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3174: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191561 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3175: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3176: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3177: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3178: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191562 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3179: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3180: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3181: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3182: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191563 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3183: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3184: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3185: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3186: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128191564 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3187: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3188: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3189: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3190: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128191565 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3191: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3192: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3193: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3194: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3195: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3196: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3197: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191561 (0x433ed649) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:42 2025 Not After : Thu Nov 28 11:18:42 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:c1:0a:7b:fd:1b:94:46:26:d7:99:0a:5b:ad:6d:b5: 48:5e:21:75:96:df:75:54:7c:b3:06:56:a4:de:49:3c: c9:40:60:72:97:73:ae:a5:73:46:94:16:fb:bd:ee:8f: 85:96:9c:e3:95:33:a3:34:1a:ef:46:d2:55:38:e8:b9: 02:bd:bf:79:c4:83:82:25:5b:52:36:74:32:df:76:0e: 35:7d:b0:7d:d0:3c:e3:d7:0d:91:10:f2:e3:23:13:0f: 79:73:a0:1c:0d:a0:53:4f:9e:9c:bf:68:a5:1c:8a:0e: 10:55:08:56:58:df:b9:a7:7e:f5:93:ed:3a:12:f9:42: b0:ab:7d:8e:e9:a5:53:ed:58:d4:8d:12:d7:25:84:1a: a0:76:bc:64:0c:c8:b7:5f:03:4b:91:87:7f:23:6d:18: a1:33:3a:d7:16:0b:9e:e1:e8:84:f4:00:94:11:18:95: 2b:65:2b:b3:95:10:16:c7:95:b9:47:5c:25:12:bc:31: 6c:3e:ac:21:ba:b0:77:11:f2:70:ff:c9:8d:28:c3:23: 51:0d:a9:e5:f1:03:e0:eb:73:67:26:a7:c4:0c:5b:f3: f8:73:7c:72:55:b7:1f:d9:ab:80:3d:b5:c3:83:92:cd: 07:44:d8:84:f6:d7:18:32:f7:0a:9c:03:9e:ef:9b:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:27:7e:13:80:bb:cb:fa:6e:64:77:42:08:a5:6d:51: 25:30:65:42:d0:53:99:7a:4f:7d:93:f2:bb:4d:47:06: a9:2c:9b:00:04:8b:f0:7a:61:d6:61:ab:e7:9d:38:4f: fb:a0:ee:83:8a:76:dc:4a:5b:3a:e3:8b:63:cb:70:67: f4:51:31:7a:d6:7d:0c:73:c7:8b:d3:55:0a:41:7e:3e: f5:89:8c:b4:fc:f3:44:75:2f:15:92:78:44:ce:ae:82: 53:10:9d:23:c2:57:3e:25:4f:ae:1c:3b:e1:b7:f1:cd: 2d:e3:90:26:36:e5:da:d9:a2:c6:40:10:59:21:96:eb: 8c:0e:c1:63:ab:11:13:8d:3b:5a:23:61:4d:64:c7:f1: 7e:8a:a2:5b:13:f8:cf:f6:d6:28:1f:30:c3:a1:fe:f0: 29:c9:de:76:fa:73:0b:74:fa:08:f7:30:41:12:2c:69: 5f:30:7e:34:c9:53:80:16:8c:6e:dc:a3:6c:b5:6e:b8: 9f:09:cc:0f:5c:89:d2:05:05:b8:73:40:42:e5:60:25: 82:65:f0:0d:67:47:38:64:54:56:00:3e:95:9a:b0:dd: 57:73:6b:20:6e:7c:03:2f:4f:5a:0b:78:0a:7f:4b:dc: 9b:e7:2b:f4:ac:4f:8b:7d:f3:e8:00:8e:4f:46:b0:6e Fingerprint (SHA-256): 84:C1:15:E8:A1:7E:96:51:D7:7C:4F:94:77:13:74:E3:5F:CD:28:DF:B8:E0:3E:81:90:E0:6F:3C:35:2E:83:06 Fingerprint (SHA1): 21:F0:FC:E9:3D:EE:52:B5:B4:4C:A5:E1:29:B3:1D:52:E8:B3:BB:4E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3198: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3199: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191562 (0x433ed64a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:42 2025 Not After : Thu Nov 28 11:18:42 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:05:85:a2:ab:48:a5:de:5c:a8:eb:41:28:48:f5:e5: 52:cd:3b:f2:b6:ed:c3:62:93:b1:36:56:ae:36:f3:91: 6c:41:3a:df:98:ec:ec:c0:0c:ae:eb:7b:45:50:f1:88: ae:f2:8d:87:d3:3c:04:3d:ff:1c:b1:d7:c5:6c:ff:e3: 7d:61:6c:c3:12:3e:50:4b:ef:2e:80:1a:0a:94:bd:40: 2a:ac:4c:7b:9e:a4:47:df:24:46:e1:21:56:ba:8b:10: 6e:23:d8:38:21:f8:d8:6c:47:20:7c:66:3c:3c:a3:67: c9:05:e3:4e:c8:d3:5f:c6:ea:c1:d5:13:0c:4d:85:b8: f3:2e:62:fc:55:7c:b2:18:a3:9b:e7:59:0c:08:d5:78: 4c:df:a4:ca:f3:9f:87:e9:71:aa:e0:62:df:42:7d:b1: f4:22:3d:91:bf:04:35:46:bf:0b:60:7a:41:82:bb:1d: db:84:1a:d0:e3:97:c5:01:f6:7a:3a:19:95:97:f7:0a: 04:9a:7f:5f:ed:52:47:3b:d6:a7:c5:ac:eb:3b:56:c8: 89:77:2f:be:8e:4f:52:d8:58:c3:35:80:71:12:0d:87: 8f:99:51:68:df:d0:66:5e:0b:a8:17:9e:72:cf:fa:b6: 9b:68:64:33:6c:92:b9:92:d3:30:e7:df:84:9f:cf:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:db:7d:76:29:fd:3a:40:95:1e:52:20:a7:46:2d:c4: 95:29:2b:9d:c1:54:38:94:3a:01:50:a1:1d:8e:97:21: 3b:8f:21:44:81:fb:d6:e3:42:a5:65:3a:94:73:5e:2d: 69:d8:b8:a7:cf:d9:42:e9:b1:f7:0b:3f:f9:54:4f:c1: 86:07:19:18:f4:5b:31:5d:26:2d:02:45:65:7c:89:61: 49:a0:a4:81:0d:2a:f7:ea:96:59:fd:12:67:b9:ac:c7: 3b:6e:0c:1e:4b:e6:9c:13:8a:43:12:48:23:72:23:7a: 8c:dd:1e:32:c0:df:5f:61:d0:06:7c:57:b4:12:95:eb: c0:59:ce:40:bf:c0:34:52:40:c4:83:e7:69:d6:e9:1b: 04:8e:55:64:ad:a0:22:8e:7a:6f:45:ac:94:48:14:5d: bd:f2:2b:62:19:69:0a:f8:1b:b4:48:f8:e2:11:45:dc: 23:ab:ee:f2:87:ae:3c:45:ce:18:bb:d3:b6:6d:60:26: a9:d1:c0:b2:56:0b:59:d4:23:72:ca:f4:a5:43:f2:8e: 1a:07:f8:62:4e:a0:f7:67:f4:1c:33:36:af:5f:da:37: f3:1b:b7:ee:dd:8e:cd:04:33:65:e8:ab:54:93:33:07: c9:d2:2f:20:8f:45:ab:99:8d:c0:67:61:a8:b4:34:22 Fingerprint (SHA-256): EB:F1:CE:99:CC:63:ED:84:1E:9D:D4:D4:8C:40:84:2D:4C:95:0C:BD:58:96:40:29:76:B9:E4:C3:D5:1D:79:1C Fingerprint (SHA1): ED:B3:EE:34:A9:C3:BA:00:F8:41:5D:B8:20:EF:18:E6:E9:DD:D1:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3200: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3201: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3202: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191563 (0x433ed64b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:18:43 2025 Not After : Thu Nov 28 11:18:43 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:36:9b:81:46:8f:a6:cd:56:a6:d3:f8:1b:7d:d8:bf: a4:b5:fb:b3:3f:75:6e:51:c1:52:90:d0:2e:06:28:ae: a4:e8:c7:c1:d3:a6:ee:d0:61:e0:f8:bd:23:b8:1b:bb: e6:8f:96:0c:26:32:0a:88:2c:8a:0a:03:ea:cf:54:ec: 95:a9:1f:49:1f:f2:de:80:13:68:0f:7e:95:78:fd:0e: e2:dd:d4:45:a7:2e:fd:64:0c:fe:56:6a:14:8e:46:cb: 43:38:69:2b:ec:a8:4e:4f:31:71:70:37:f0:35:5e:21: da:16:92:df:03:c5:92:61:46:5f:30:90:5e:1b:df:05: 5c:22:c7:6a:a4:1b:4c:2b:1a:da:6f:63:00:a7:fa:5a: 34:08:3c:c0:e0:2c:b6:e0:cb:10:88:fc:37:1e:12:c1: 6d:dc:b1:a6:31:f8:3a:f8:4a:76:2e:80:f2:b1:e5:aa: 74:d2:3d:70:3d:eb:7c:f2:57:d1:bd:44:82:2b:9d:d8: 16:9b:2e:68:36:bc:6f:83:1e:af:b1:37:9b:7f:8f:e9: b5:bb:94:e2:5e:c3:d6:aa:7c:89:4a:92:72:e8:71:c1: 1f:89:b5:15:f9:32:0a:26:c7:e9:64:51:c5:35:ca:17: 23:ee:4c:79:f2:fb:aa:f6:6f:55:cd:d5:0e:dd:ae:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:b1:7b:77:08:66:6d:3f:dd:ca:0c:88:a9:7a:3d:10: c1:2e:18:7b:2e:ab:a0:29:db:c4:7f:91:65:9a:68:ff: 46:87:0a:79:a5:49:ab:49:bd:c3:04:ed:21:94:42:ec: c8:25:8d:9d:d9:92:19:45:14:44:41:44:ca:ab:e1:39: 90:11:89:1e:2a:29:72:36:db:88:a0:bb:6b:f1:38:f1: fe:cd:12:2d:e1:b5:92:eb:85:b5:e7:2b:22:4f:71:ec: 8f:21:d5:56:6c:0f:51:2c:04:48:df:9f:a4:ee:9c:bd: 74:ec:af:c0:18:9d:c5:7a:83:4a:d6:72:bc:14:45:3b: be:04:45:14:b9:dd:94:c0:4a:72:62:7a:6f:87:50:40: 80:ec:b4:93:34:3d:05:9e:c1:27:4f:80:7d:1c:69:3b: 7d:4d:ed:b4:e5:34:ff:a0:09:fc:16:54:62:d2:01:9d: 0a:11:1d:84:62:30:35:d7:1b:4d:43:8b:1e:77:58:03: 20:7a:6b:ad:b8:20:37:9a:03:c7:61:c5:2d:a6:4a:46: 26:da:0a:af:db:32:0b:d9:54:13:7a:17:cf:2c:64:53: 51:ab:d9:59:af:1c:cb:ca:79:d1:b8:42:f5:14:69:9c: 6f:6f:f0:f6:84:c7:76:bd:c1:b6:62:95:a7:1c:19:24 Fingerprint (SHA-256): 43:F1:2F:CC:06:73:3D:D2:C7:8F:B9:CF:C9:D3:34:D1:8A:6C:71:02:98:C1:63:F7:7D:C4:A7:C6:79:EA:31:39 Fingerprint (SHA1): 51:DB:AE:42:49:00:FB:0F:70:CE:CB:69:75:20:CD:B9:B2:B4:B0:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3203: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3204: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191566 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3205: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3206: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3207: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3208: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191567 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3209: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3210: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3211: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3212: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191568 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128191069.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3213: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3214: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3215: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3216: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128191569 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3217: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3218: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3219: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191566 (0x433ed64e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:18:46 2025 Not After : Thu Nov 28 11:18:46 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:72:69:03:f0:1c:f4:d2:78:d9:b5:cc:84:c5:68:a6: 11:cf:de:1a:72:74:0a:b8:79:07:c8:b0:34:e1:2c:ed: 22:ab:d5:95:65:98:e1:9c:11:e1:c8:23:9f:82:d1:f0: 85:45:65:84:1d:14:d5:c7:83:c7:7c:86:7b:f9:c4:3f: bd:7b:2a:6f:de:27:ca:38:49:b2:23:2a:0b:84:52:5a: 4e:57:f8:d1:2b:2e:18:d1:a4:1e:a2:07:98:fb:4a:d2: 28:3c:40:e4:a2:ae:e1:aa:32:4e:d5:f2:33:a4:7b:29: 47:19:64:ae:d8:1d:07:4b:35:ad:b5:a7:76:b7:ce:15: fa:0f:a9:18:b6:1c:a6:99:b7:91:fe:2f:69:53:12:22: f6:9f:e0:f0:b5:a7:d2:6a:18:59:ab:11:20:4d:54:2e: 8f:0b:56:30:92:1e:85:be:a2:5c:1d:81:cc:cf:47:cd: e4:aa:6f:ca:1c:10:cf:48:36:5b:c4:ef:a3:ff:13:41: b4:9c:9c:c5:21:00:53:20:e1:e3:b0:27:4c:3e:08:f9: 4f:75:d8:1b:1f:88:c3:48:ed:92:3f:e9:55:e8:1d:b6: 85:48:58:eb:50:4a:b3:ff:ef:36:f6:72:ef:f8:59:5c: a4:3f:16:f5:5f:6e:f7:8a:23:fe:eb:ef:69:d0:3a:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:eb:11:a5:71:10:fb:b3:64:44:a8:fe:12:4f:5c:d6: b5:f5:22:2b:e4:1f:54:bd:6b:c7:9b:bf:96:03:ed:3d: b8:98:3e:32:5d:05:67:60:40:01:9a:ee:bb:4d:99:fa: 9f:79:d1:99:50:3d:91:44:2a:03:25:41:a4:d3:de:e0: e9:fd:61:3e:b1:41:a8:b0:9b:e2:59:93:05:a8:32:0a: a7:18:36:51:39:4d:32:73:6a:74:42:a6:b1:0b:69:5d: 26:24:05:53:68:4a:31:28:5c:59:1e:b1:a6:0a:95:ad: af:cf:48:5c:22:f4:8d:63:d9:22:64:86:de:fc:17:e8: 0e:b6:19:cc:d8:49:d2:db:ff:e8:9c:5c:a6:e7:c0:87: 9c:c7:ea:5e:c8:d6:ad:73:3f:e0:c8:d1:76:1b:7d:d9: 62:5b:6c:34:a6:85:3c:ed:89:34:09:3f:59:ec:c2:24: ec:54:d8:28:95:ff:28:e8:1a:64:d3:1e:f1:42:df:59: 79:a6:33:9c:e6:69:23:7f:b3:77:f5:63:6c:47:f6:df: 00:be:c0:56:36:eb:56:d7:e9:e8:02:ac:a4:5d:ff:a0: 60:7a:f9:a9:ed:a6:f9:0e:56:7e:ab:69:8c:76:2c:e3: 02:ed:f0:f4:20:43:f9:d1:6b:72:87:56:ad:73:db:77 Fingerprint (SHA-256): 8A:BB:49:90:47:D1:E5:12:24:EC:B3:C6:DB:A5:8A:9E:35:14:56:45:61:F3:71:9C:63:2D:E7:0E:1A:5C:01:D3 Fingerprint (SHA1): 61:FE:F8:4B:C3:17:E7:7A:85:E9:5F:73:7E:54:4E:BF:41:22:01:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3220: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3221: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191570 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3222: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3223: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3224: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191571 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3225: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3226: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3227: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3228: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191572 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3229: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3230: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191573 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3231: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3232: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3233: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3234: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3235: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191574 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191070.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3236: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3237: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3238: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3239: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191575 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3240: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3241: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3242: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191570 (0x433ed652) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:18:49 2025 Not After : Thu Nov 28 11:18:49 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:3f:42:dd:81:13:04:51:56:f8:e4:50:7e:c9:79:24: 06:9e:00:45:a4:bb:f9:37:81:c5:e5:b9:42:c2:c5:6c: 75:d7:6d:d8:e4:36:09:b6:c9:2d:dc:82:a4:41:26:99: b1:26:de:ad:40:47:8f:72:50:9d:c6:53:f5:ef:5d:6d: cd:8e:fe:ff:57:5c:ed:2c:d8:e3:33:f0:e6:bd:36:64: 80:e8:45:29:db:04:c1:44:1c:5d:98:ae:ef:51:f8:74: f7:4e:cd:45:43:44:7a:a6:e1:bb:1d:ea:41:b5:ad:45: f2:b8:4a:17:b5:80:71:f1:2b:5e:cb:f9:cd:03:9d:32: 8a:9b:44:ed:cf:a3:35:1b:65:25:5c:04:46:1c:7f:10: c8:69:47:dc:17:d1:81:0c:f4:06:21:ce:87:e3:af:8c: 97:5a:67:34:64:2e:07:e2:08:db:8d:3c:e5:7e:2d:e1: d3:d6:23:81:4c:9c:af:0d:3d:11:34:ae:66:c9:74:79: 9b:5c:d2:b2:05:b1:c8:ea:f8:67:ba:07:bd:c9:e9:93: 8a:a0:6e:e8:7a:b7:26:be:78:16:8c:73:41:7f:61:c0: 24:c6:e1:65:bb:eb:3d:81:fd:fa:22:93:57:40:72:02: d2:7f:da:a1:48:2b:2b:2f:b9:29:14:0e:69:76:a7:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:e2:f0:04:30:47:37:19:57:ba:eb:8e:9f:de:b4:3c: 1c:30:68:86:33:1b:c6:d3:3b:a2:6f:19:cd:d2:28:5e: af:31:29:e0:ea:99:dc:13:c2:c3:28:08:75:e0:35:6d: fd:d7:db:f7:23:ff:99:3e:15:88:9d:3a:b3:7c:8d:26: 43:77:87:67:87:1c:ea:ff:24:fb:d4:ed:5a:b4:8f:e5: ec:d4:4c:fe:d4:29:99:96:4f:9a:5a:4b:1e:66:4e:63: c4:88:06:eb:0e:43:3f:a0:86:71:f7:dc:d3:fe:af:eb: f8:e3:56:a4:13:ad:e4:ba:66:99:25:ef:85:99:8b:b8: 4f:64:6d:6d:c8:4d:11:e5:3c:bc:ab:2c:ad:9f:58:e6: 9a:de:50:7d:1a:3f:62:59:eb:79:45:e4:51:fa:82:92: 5b:24:9e:e7:e5:0e:b8:52:cf:0c:8f:a1:51:6c:43:33: fb:46:b9:a3:5b:8c:5c:46:ff:d3:27:3d:6c:e1:e3:00: 86:4b:c4:98:9f:15:4a:53:9c:88:cf:d4:ba:5a:7d:4e: a6:00:55:61:ff:e7:ed:55:ef:6b:e2:ae:16:8c:ac:31: 57:d1:99:fe:44:23:a7:9c:c8:61:4a:46:52:5c:48:74: d9:41:c8:47:0c:11:90:e5:63:ef:86:31:04:24:fb:2b Fingerprint (SHA-256): 7F:3A:E9:62:BB:93:9B:FB:C1:A5:00:62:17:D8:84:49:9A:85:D0:F8:76:0A:EE:44:23:B4:AA:92:6E:51:C4:61 Fingerprint (SHA1): 93:AD:47:4D:D8:88:F8:35:26:3E:EF:4E:24:6B:52:7A:59:AF:4E:B9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3243: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191571 (0x433ed653) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:49 2025 Not After : Thu Nov 28 11:18:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:53:73:8b:63:88:74:b8:72:d7:eb:97:ba:f9:39:93: 7a:8b:b0:fb:94:15:07:70:65:02:f9:a4:df:13:36:aa: 8b:a0:6b:d8:a7:9d:1b:cd:6c:99:d1:46:a8:93:f2:c9: 79:08:31:ad:71:8b:6d:80:a2:4d:45:d4:2b:df:88:e1: 0b:d3:91:16:28:77:a0:da:3a:de:5b:fb:b2:3a:86:39: 91:f4:cb:d5:7b:96:80:b4:39:40:1b:0c:34:08:c1:19: b3:1c:d6:b8:54:02:e7:69:3c:96:28:76:77:55:e1:24: 8b:c1:bb:2c:ee:c6:da:3f:b8:28:73:6c:03:04:72:23: 20:93:2a:2e:c9:07:bb:fa:83:cc:b2:5a:e7:39:dd:e2: da:d9:f3:fc:c8:92:4e:93:84:90:31:67:f8:73:6e:87: 4b:44:d4:c4:d1:c9:68:e0:a8:a5:cd:68:41:2a:23:58: 5c:7d:86:40:8b:f1:5d:81:ee:e3:a0:bf:58:a0:de:a9: cc:b5:34:d6:98:03:60:05:c4:57:75:a9:51:65:d6:72: a8:43:ba:85:63:f0:a6:2f:90:c5:d4:e1:70:3f:a1:73: f8:c9:44:05:1c:10:b3:8a:7e:cd:fe:0d:3a:3c:84:3e: 09:3f:d6:0a:02:c5:f7:55:b6:e2:b7:10:a6:ad:c9:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:96:96:b5:3e:d9:c3:56:5e:4b:84:b5:aa:f7:5e:e0: c7:4b:2e:ee:e8:58:a7:f1:e9:61:ac:c7:52:d8:90:75: 5a:c8:fc:25:97:5a:16:8d:f2:7a:dc:2f:44:c8:c3:29: 3b:23:2f:a2:4d:11:e0:66:3f:fa:fd:70:3a:bd:ea:72: 41:15:e6:e7:8d:62:ee:9c:3a:d8:a9:4b:7c:f0:8d:f8: c4:e1:ac:21:c5:fd:78:8c:5a:70:90:2d:19:2d:f3:d7: f9:5a:13:9f:54:69:85:12:fe:e1:a6:1f:71:00:f7:92: 0c:93:dd:36:22:39:34:21:77:9c:fc:b5:af:26:d9:f6: ee:b3:5e:3e:66:b0:10:26:f7:36:38:ad:5f:ad:1b:48: c9:6b:1b:2c:0f:6e:a5:55:3a:c6:bd:28:a7:4c:a2:8e: eb:14:10:a8:10:f9:f2:4e:74:45:b1:1a:2c:d3:b3:0c: d6:92:49:ca:f3:17:11:e6:4c:29:e3:0f:36:62:b1:06: 9c:ff:fb:fa:46:ae:fc:07:02:cb:29:ec:e2:f1:55:a4: 4f:9d:f4:88:b4:e6:90:db:33:96:b2:94:28:e4:6a:2b: 38:ce:ae:42:f4:12:fb:9f:4a:62:a0:84:9d:4e:a2:54: 24:45:7d:1b:32:71:8a:33:e5:a9:0e:24:35:61:61:09 Fingerprint (SHA-256): 82:27:F5:BD:59:B1:3A:CA:D5:81:82:E6:30:70:F0:93:B1:62:BE:4F:AD:68:62:82:3E:A7:61:11:52:15:34:72 Fingerprint (SHA1): B1:7F:75:36:D4:74:93:47:5A:43:FA:69:38:E7:AF:A3:0A:84:4A:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3244: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191571 (0x433ed653) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:49 2025 Not After : Thu Nov 28 11:18:49 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:53:73:8b:63:88:74:b8:72:d7:eb:97:ba:f9:39:93: 7a:8b:b0:fb:94:15:07:70:65:02:f9:a4:df:13:36:aa: 8b:a0:6b:d8:a7:9d:1b:cd:6c:99:d1:46:a8:93:f2:c9: 79:08:31:ad:71:8b:6d:80:a2:4d:45:d4:2b:df:88:e1: 0b:d3:91:16:28:77:a0:da:3a:de:5b:fb:b2:3a:86:39: 91:f4:cb:d5:7b:96:80:b4:39:40:1b:0c:34:08:c1:19: b3:1c:d6:b8:54:02:e7:69:3c:96:28:76:77:55:e1:24: 8b:c1:bb:2c:ee:c6:da:3f:b8:28:73:6c:03:04:72:23: 20:93:2a:2e:c9:07:bb:fa:83:cc:b2:5a:e7:39:dd:e2: da:d9:f3:fc:c8:92:4e:93:84:90:31:67:f8:73:6e:87: 4b:44:d4:c4:d1:c9:68:e0:a8:a5:cd:68:41:2a:23:58: 5c:7d:86:40:8b:f1:5d:81:ee:e3:a0:bf:58:a0:de:a9: cc:b5:34:d6:98:03:60:05:c4:57:75:a9:51:65:d6:72: a8:43:ba:85:63:f0:a6:2f:90:c5:d4:e1:70:3f:a1:73: f8:c9:44:05:1c:10:b3:8a:7e:cd:fe:0d:3a:3c:84:3e: 09:3f:d6:0a:02:c5:f7:55:b6:e2:b7:10:a6:ad:c9:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:96:96:b5:3e:d9:c3:56:5e:4b:84:b5:aa:f7:5e:e0: c7:4b:2e:ee:e8:58:a7:f1:e9:61:ac:c7:52:d8:90:75: 5a:c8:fc:25:97:5a:16:8d:f2:7a:dc:2f:44:c8:c3:29: 3b:23:2f:a2:4d:11:e0:66:3f:fa:fd:70:3a:bd:ea:72: 41:15:e6:e7:8d:62:ee:9c:3a:d8:a9:4b:7c:f0:8d:f8: c4:e1:ac:21:c5:fd:78:8c:5a:70:90:2d:19:2d:f3:d7: f9:5a:13:9f:54:69:85:12:fe:e1:a6:1f:71:00:f7:92: 0c:93:dd:36:22:39:34:21:77:9c:fc:b5:af:26:d9:f6: ee:b3:5e:3e:66:b0:10:26:f7:36:38:ad:5f:ad:1b:48: c9:6b:1b:2c:0f:6e:a5:55:3a:c6:bd:28:a7:4c:a2:8e: eb:14:10:a8:10:f9:f2:4e:74:45:b1:1a:2c:d3:b3:0c: d6:92:49:ca:f3:17:11:e6:4c:29:e3:0f:36:62:b1:06: 9c:ff:fb:fa:46:ae:fc:07:02:cb:29:ec:e2:f1:55:a4: 4f:9d:f4:88:b4:e6:90:db:33:96:b2:94:28:e4:6a:2b: 38:ce:ae:42:f4:12:fb:9f:4a:62:a0:84:9d:4e:a2:54: 24:45:7d:1b:32:71:8a:33:e5:a9:0e:24:35:61:61:09 Fingerprint (SHA-256): 82:27:F5:BD:59:B1:3A:CA:D5:81:82:E6:30:70:F0:93:B1:62:BE:4F:AD:68:62:82:3E:A7:61:11:52:15:34:72 Fingerprint (SHA1): B1:7F:75:36:D4:74:93:47:5A:43:FA:69:38:E7:AF:A3:0A:84:4A:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3245: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3246: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191576 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3247: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3248: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3249: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191577 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3250: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3251: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3252: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3253: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128191578 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3254: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3255: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128191579 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3256: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3257: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3258: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3259: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3260: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191580 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128191071.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3261: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3262: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3263: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3264: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191581 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3265: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3266: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3267: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3268: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191582 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128191072.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3269: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3270: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3271: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3272: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191583 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3273: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3274: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3275: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191576 (0x433ed658) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:18:52 2025 Not After : Thu Nov 28 11:18:52 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:7d:b1:c7:cb:7b:35:40:e6:17:f1:b6:5b:53:c7:6e: 93:4a:67:b3:b4:f4:6d:12:fc:b0:5d:76:b7:5c:39:a7: f6:06:7d:62:82:e2:23:9b:e0:8e:ab:28:1f:12:4c:bc: b1:df:ec:d3:67:26:ae:b3:f6:cd:0b:8f:3a:bb:4c:94: ae:f1:4c:bd:70:5d:92:46:85:39:e0:c1:8c:5e:68:a8: 19:a7:94:5a:05:56:d8:9d:5f:38:d0:5e:20:88:55:ed: e1:cf:63:44:97:8e:92:e9:95:39:84:24:fc:f0:01:2f: 79:fe:e8:2d:da:b4:33:a1:03:be:9b:37:67:98:61:87: 43:65:3e:41:54:c9:ba:48:ca:a3:14:e5:59:bc:b8:d6: 43:7f:0b:01:8d:e9:93:48:16:27:8e:81:43:87:bc:79: 41:19:8f:2d:76:72:6e:68:ea:9e:ee:44:f2:1f:da:1d: 02:d5:67:33:76:e8:43:c2:0d:d2:41:62:ae:69:b3:c3: 2e:80:47:98:79:62:57:cb:9b:a9:46:66:ab:b6:1a:1c: 41:88:f2:5f:55:ef:23:ae:c3:55:a5:7d:87:b3:42:db: 2e:33:01:50:1e:bd:7a:e8:d6:14:61:73:b7:f8:01:23: d2:22:f4:43:b7:1d:75:0b:20:a6:f0:a8:08:4c:ae:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:96:90:82:dd:43:25:82:06:b3:74:1c:93:50:82:49: bc:f0:c4:e0:28:7c:b9:19:18:4f:40:7d:6a:b6:95:9f: 98:0b:5d:1a:b2:4b:58:95:8a:0c:82:23:ff:c5:cd:83: a6:cd:3c:ca:eb:a9:6b:d6:da:88:71:0c:b7:73:68:3a: 55:3b:7b:76:50:de:18:82:d9:5f:f6:0a:97:98:f6:06: 93:06:5a:c4:b5:a0:5e:94:39:ec:ba:ff:93:97:d6:b6: 7f:69:97:66:84:4b:39:90:70:68:37:8a:a8:61:21:84: ce:89:23:93:a7:63:b8:7f:ca:d3:d3:6d:f0:de:9a:37: 00:31:4e:6a:9c:7d:71:f2:de:a8:dd:52:f2:9f:b8:64: 76:1b:6f:76:c4:ea:c8:33:9e:10:22:e2:05:15:74:24: 76:3d:33:e5:96:5d:bf:cd:4c:81:be:c0:77:08:11:14: 7c:5c:70:4e:86:66:b2:48:f7:f0:76:e6:ef:bc:41:27: 7f:ec:b0:e9:9a:80:a7:4b:69:65:a5:46:d3:70:6e:83: 05:7d:50:26:c7:c8:27:7d:ad:97:97:80:3d:ac:f2:1d: ea:15:da:6a:f0:91:8f:43:09:ca:6c:88:e4:1d:8c:8f: c6:8f:ec:34:75:42:92:3c:bb:3a:25:6d:73:bb:ee:39 Fingerprint (SHA-256): 3B:EC:11:F8:F0:34:86:12:39:E3:22:5D:5A:0D:F5:62:43:24:1C:D6:4F:40:B6:04:3D:C5:B4:09:29:38:01:BB Fingerprint (SHA1): 79:93:ED:25:DE:D5:E5:42:28:9B:26:F8:1E:36:70:CD:D9:3B:2A:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3276: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191577 (0x433ed659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:53 2025 Not After : Thu Nov 28 11:18:53 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:8d:48:81:0b:8d:eb:20:b5:f4:ce:71:bc:ac:e2:ad: 55:69:6c:cf:e5:75:6e:97:c6:70:61:b8:b9:85:61:0d: 01:ab:87:d8:9e:f1:b2:59:22:f5:38:9d:1e:49:56:4b: 62:c0:ff:85:66:79:32:ce:95:13:92:79:17:3b:98:d3: 7b:b4:c7:19:a2:51:3c:b1:99:37:90:f8:6a:f3:86:2b: 64:bb:cc:ec:de:2b:c9:d2:82:7a:10:a6:47:c7:82:ce: d6:a6:a0:3e:a2:1a:6b:10:d5:72:02:af:83:96:7b:c7: d3:f5:c9:b2:09:3c:ff:a0:19:1e:78:f2:e8:30:98:17: 6a:a0:2e:b7:8c:12:45:5d:d0:43:bc:93:34:82:a3:ce: 68:2e:c6:0e:68:d4:24:ba:91:89:96:12:56:32:68:04: 11:dc:d7:f9:ff:43:b3:25:ce:ab:2f:4e:61:00:f4:9f: 26:b0:5e:30:b4:80:51:5d:26:14:36:0d:15:ac:35:76: af:c1:39:fc:d5:12:6f:f5:1a:62:88:24:93:73:f7:75: 6c:1b:9f:69:a3:17:f0:39:39:9c:61:bf:41:e8:fa:70: 20:68:6d:dd:33:1b:5e:32:20:7d:88:98:fc:a0:0b:93: 0e:cd:cd:a0:ab:be:09:7e:5a:03:d4:7b:00:02:dd:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:79:40:98:04:2e:d3:54:26:e5:27:8a:10:d3:b6:b9: 81:ac:6d:ef:84:9f:d0:45:6d:d1:fe:7e:32:c9:aa:01: 6e:03:d8:49:6d:3b:d5:ba:64:ea:48:a5:54:97:fb:3c: 68:47:60:c0:4a:2c:4c:e3:45:75:b1:f3:5c:66:8c:70: 8f:da:ab:a6:2d:52:be:2c:be:b8:81:3d:28:49:04:13: 3a:f0:3a:0b:77:c3:1a:fc:02:c1:c8:b0:53:35:a2:a3: 15:bc:f5:8f:4d:52:d4:7a:86:1a:cb:bf:7f:3e:2d:cb: b4:3d:ba:ee:c3:f2:eb:53:fa:18:00:98:6e:e1:f8:6c: 37:ae:56:c5:45:95:87:84:4d:5d:fa:1b:ca:5e:c8:04: 09:09:ba:85:7f:7b:3c:1d:7e:aa:d5:be:17:67:f7:ac: 72:01:f9:d5:f0:6e:db:d0:39:cd:d7:7a:7b:16:77:a7: c6:9c:1c:1c:55:37:97:11:0d:a1:cc:73:72:53:a1:10: 5c:60:ff:a6:e9:99:3d:99:17:1b:48:9b:fb:00:98:46: 92:11:18:bc:bb:f2:49:44:2f:4a:aa:53:3b:40:71:2b: 41:be:70:8d:f0:ad:b3:7c:88:7d:9a:e8:55:3f:1a:52: 79:a5:75:e5:d8:0c:9f:cd:44:ee:24:95:4b:1e:9d:6b Fingerprint (SHA-256): FA:88:8A:2B:F9:F2:DC:29:DC:3E:4F:76:47:E9:CC:5D:9A:F5:15:C9:E6:A0:AA:95:86:17:13:97:D8:12:16:CC Fingerprint (SHA1): 2C:29:15:2B:23:30:06:B8:18:D9:99:75:D0:55:69:20:3C:F5:53:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3277: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191577 (0x433ed659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:53 2025 Not After : Thu Nov 28 11:18:53 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:8d:48:81:0b:8d:eb:20:b5:f4:ce:71:bc:ac:e2:ad: 55:69:6c:cf:e5:75:6e:97:c6:70:61:b8:b9:85:61:0d: 01:ab:87:d8:9e:f1:b2:59:22:f5:38:9d:1e:49:56:4b: 62:c0:ff:85:66:79:32:ce:95:13:92:79:17:3b:98:d3: 7b:b4:c7:19:a2:51:3c:b1:99:37:90:f8:6a:f3:86:2b: 64:bb:cc:ec:de:2b:c9:d2:82:7a:10:a6:47:c7:82:ce: d6:a6:a0:3e:a2:1a:6b:10:d5:72:02:af:83:96:7b:c7: d3:f5:c9:b2:09:3c:ff:a0:19:1e:78:f2:e8:30:98:17: 6a:a0:2e:b7:8c:12:45:5d:d0:43:bc:93:34:82:a3:ce: 68:2e:c6:0e:68:d4:24:ba:91:89:96:12:56:32:68:04: 11:dc:d7:f9:ff:43:b3:25:ce:ab:2f:4e:61:00:f4:9f: 26:b0:5e:30:b4:80:51:5d:26:14:36:0d:15:ac:35:76: af:c1:39:fc:d5:12:6f:f5:1a:62:88:24:93:73:f7:75: 6c:1b:9f:69:a3:17:f0:39:39:9c:61:bf:41:e8:fa:70: 20:68:6d:dd:33:1b:5e:32:20:7d:88:98:fc:a0:0b:93: 0e:cd:cd:a0:ab:be:09:7e:5a:03:d4:7b:00:02:dd:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:79:40:98:04:2e:d3:54:26:e5:27:8a:10:d3:b6:b9: 81:ac:6d:ef:84:9f:d0:45:6d:d1:fe:7e:32:c9:aa:01: 6e:03:d8:49:6d:3b:d5:ba:64:ea:48:a5:54:97:fb:3c: 68:47:60:c0:4a:2c:4c:e3:45:75:b1:f3:5c:66:8c:70: 8f:da:ab:a6:2d:52:be:2c:be:b8:81:3d:28:49:04:13: 3a:f0:3a:0b:77:c3:1a:fc:02:c1:c8:b0:53:35:a2:a3: 15:bc:f5:8f:4d:52:d4:7a:86:1a:cb:bf:7f:3e:2d:cb: b4:3d:ba:ee:c3:f2:eb:53:fa:18:00:98:6e:e1:f8:6c: 37:ae:56:c5:45:95:87:84:4d:5d:fa:1b:ca:5e:c8:04: 09:09:ba:85:7f:7b:3c:1d:7e:aa:d5:be:17:67:f7:ac: 72:01:f9:d5:f0:6e:db:d0:39:cd:d7:7a:7b:16:77:a7: c6:9c:1c:1c:55:37:97:11:0d:a1:cc:73:72:53:a1:10: 5c:60:ff:a6:e9:99:3d:99:17:1b:48:9b:fb:00:98:46: 92:11:18:bc:bb:f2:49:44:2f:4a:aa:53:3b:40:71:2b: 41:be:70:8d:f0:ad:b3:7c:88:7d:9a:e8:55:3f:1a:52: 79:a5:75:e5:d8:0c:9f:cd:44:ee:24:95:4b:1e:9d:6b Fingerprint (SHA-256): FA:88:8A:2B:F9:F2:DC:29:DC:3E:4F:76:47:E9:CC:5D:9A:F5:15:C9:E6:A0:AA:95:86:17:13:97:D8:12:16:CC Fingerprint (SHA1): 2C:29:15:2B:23:30:06:B8:18:D9:99:75:D0:55:69:20:3C:F5:53:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3278: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #3279: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191576 (0x433ed658) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:18:52 2025 Not After : Thu Nov 28 11:18:52 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:7d:b1:c7:cb:7b:35:40:e6:17:f1:b6:5b:53:c7:6e: 93:4a:67:b3:b4:f4:6d:12:fc:b0:5d:76:b7:5c:39:a7: f6:06:7d:62:82:e2:23:9b:e0:8e:ab:28:1f:12:4c:bc: b1:df:ec:d3:67:26:ae:b3:f6:cd:0b:8f:3a:bb:4c:94: ae:f1:4c:bd:70:5d:92:46:85:39:e0:c1:8c:5e:68:a8: 19:a7:94:5a:05:56:d8:9d:5f:38:d0:5e:20:88:55:ed: e1:cf:63:44:97:8e:92:e9:95:39:84:24:fc:f0:01:2f: 79:fe:e8:2d:da:b4:33:a1:03:be:9b:37:67:98:61:87: 43:65:3e:41:54:c9:ba:48:ca:a3:14:e5:59:bc:b8:d6: 43:7f:0b:01:8d:e9:93:48:16:27:8e:81:43:87:bc:79: 41:19:8f:2d:76:72:6e:68:ea:9e:ee:44:f2:1f:da:1d: 02:d5:67:33:76:e8:43:c2:0d:d2:41:62:ae:69:b3:c3: 2e:80:47:98:79:62:57:cb:9b:a9:46:66:ab:b6:1a:1c: 41:88:f2:5f:55:ef:23:ae:c3:55:a5:7d:87:b3:42:db: 2e:33:01:50:1e:bd:7a:e8:d6:14:61:73:b7:f8:01:23: d2:22:f4:43:b7:1d:75:0b:20:a6:f0:a8:08:4c:ae:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:96:90:82:dd:43:25:82:06:b3:74:1c:93:50:82:49: bc:f0:c4:e0:28:7c:b9:19:18:4f:40:7d:6a:b6:95:9f: 98:0b:5d:1a:b2:4b:58:95:8a:0c:82:23:ff:c5:cd:83: a6:cd:3c:ca:eb:a9:6b:d6:da:88:71:0c:b7:73:68:3a: 55:3b:7b:76:50:de:18:82:d9:5f:f6:0a:97:98:f6:06: 93:06:5a:c4:b5:a0:5e:94:39:ec:ba:ff:93:97:d6:b6: 7f:69:97:66:84:4b:39:90:70:68:37:8a:a8:61:21:84: ce:89:23:93:a7:63:b8:7f:ca:d3:d3:6d:f0:de:9a:37: 00:31:4e:6a:9c:7d:71:f2:de:a8:dd:52:f2:9f:b8:64: 76:1b:6f:76:c4:ea:c8:33:9e:10:22:e2:05:15:74:24: 76:3d:33:e5:96:5d:bf:cd:4c:81:be:c0:77:08:11:14: 7c:5c:70:4e:86:66:b2:48:f7:f0:76:e6:ef:bc:41:27: 7f:ec:b0:e9:9a:80:a7:4b:69:65:a5:46:d3:70:6e:83: 05:7d:50:26:c7:c8:27:7d:ad:97:97:80:3d:ac:f2:1d: ea:15:da:6a:f0:91:8f:43:09:ca:6c:88:e4:1d:8c:8f: c6:8f:ec:34:75:42:92:3c:bb:3a:25:6d:73:bb:ee:39 Fingerprint (SHA-256): 3B:EC:11:F8:F0:34:86:12:39:E3:22:5D:5A:0D:F5:62:43:24:1C:D6:4F:40:B6:04:3D:C5:B4:09:29:38:01:BB Fingerprint (SHA1): 79:93:ED:25:DE:D5:E5:42:28:9B:26:F8:1E:36:70:CD:D9:3B:2A:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3280: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191577 (0x433ed659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:53 2025 Not After : Thu Nov 28 11:18:53 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:8d:48:81:0b:8d:eb:20:b5:f4:ce:71:bc:ac:e2:ad: 55:69:6c:cf:e5:75:6e:97:c6:70:61:b8:b9:85:61:0d: 01:ab:87:d8:9e:f1:b2:59:22:f5:38:9d:1e:49:56:4b: 62:c0:ff:85:66:79:32:ce:95:13:92:79:17:3b:98:d3: 7b:b4:c7:19:a2:51:3c:b1:99:37:90:f8:6a:f3:86:2b: 64:bb:cc:ec:de:2b:c9:d2:82:7a:10:a6:47:c7:82:ce: d6:a6:a0:3e:a2:1a:6b:10:d5:72:02:af:83:96:7b:c7: d3:f5:c9:b2:09:3c:ff:a0:19:1e:78:f2:e8:30:98:17: 6a:a0:2e:b7:8c:12:45:5d:d0:43:bc:93:34:82:a3:ce: 68:2e:c6:0e:68:d4:24:ba:91:89:96:12:56:32:68:04: 11:dc:d7:f9:ff:43:b3:25:ce:ab:2f:4e:61:00:f4:9f: 26:b0:5e:30:b4:80:51:5d:26:14:36:0d:15:ac:35:76: af:c1:39:fc:d5:12:6f:f5:1a:62:88:24:93:73:f7:75: 6c:1b:9f:69:a3:17:f0:39:39:9c:61:bf:41:e8:fa:70: 20:68:6d:dd:33:1b:5e:32:20:7d:88:98:fc:a0:0b:93: 0e:cd:cd:a0:ab:be:09:7e:5a:03:d4:7b:00:02:dd:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:79:40:98:04:2e:d3:54:26:e5:27:8a:10:d3:b6:b9: 81:ac:6d:ef:84:9f:d0:45:6d:d1:fe:7e:32:c9:aa:01: 6e:03:d8:49:6d:3b:d5:ba:64:ea:48:a5:54:97:fb:3c: 68:47:60:c0:4a:2c:4c:e3:45:75:b1:f3:5c:66:8c:70: 8f:da:ab:a6:2d:52:be:2c:be:b8:81:3d:28:49:04:13: 3a:f0:3a:0b:77:c3:1a:fc:02:c1:c8:b0:53:35:a2:a3: 15:bc:f5:8f:4d:52:d4:7a:86:1a:cb:bf:7f:3e:2d:cb: b4:3d:ba:ee:c3:f2:eb:53:fa:18:00:98:6e:e1:f8:6c: 37:ae:56:c5:45:95:87:84:4d:5d:fa:1b:ca:5e:c8:04: 09:09:ba:85:7f:7b:3c:1d:7e:aa:d5:be:17:67:f7:ac: 72:01:f9:d5:f0:6e:db:d0:39:cd:d7:7a:7b:16:77:a7: c6:9c:1c:1c:55:37:97:11:0d:a1:cc:73:72:53:a1:10: 5c:60:ff:a6:e9:99:3d:99:17:1b:48:9b:fb:00:98:46: 92:11:18:bc:bb:f2:49:44:2f:4a:aa:53:3b:40:71:2b: 41:be:70:8d:f0:ad:b3:7c:88:7d:9a:e8:55:3f:1a:52: 79:a5:75:e5:d8:0c:9f:cd:44:ee:24:95:4b:1e:9d:6b Fingerprint (SHA-256): FA:88:8A:2B:F9:F2:DC:29:DC:3E:4F:76:47:E9:CC:5D:9A:F5:15:C9:E6:A0:AA:95:86:17:13:97:D8:12:16:CC Fingerprint (SHA1): 2C:29:15:2B:23:30:06:B8:18:D9:99:75:D0:55:69:20:3C:F5:53:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3281: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191577 (0x433ed659) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:53 2025 Not After : Thu Nov 28 11:18:53 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:8d:48:81:0b:8d:eb:20:b5:f4:ce:71:bc:ac:e2:ad: 55:69:6c:cf:e5:75:6e:97:c6:70:61:b8:b9:85:61:0d: 01:ab:87:d8:9e:f1:b2:59:22:f5:38:9d:1e:49:56:4b: 62:c0:ff:85:66:79:32:ce:95:13:92:79:17:3b:98:d3: 7b:b4:c7:19:a2:51:3c:b1:99:37:90:f8:6a:f3:86:2b: 64:bb:cc:ec:de:2b:c9:d2:82:7a:10:a6:47:c7:82:ce: d6:a6:a0:3e:a2:1a:6b:10:d5:72:02:af:83:96:7b:c7: d3:f5:c9:b2:09:3c:ff:a0:19:1e:78:f2:e8:30:98:17: 6a:a0:2e:b7:8c:12:45:5d:d0:43:bc:93:34:82:a3:ce: 68:2e:c6:0e:68:d4:24:ba:91:89:96:12:56:32:68:04: 11:dc:d7:f9:ff:43:b3:25:ce:ab:2f:4e:61:00:f4:9f: 26:b0:5e:30:b4:80:51:5d:26:14:36:0d:15:ac:35:76: af:c1:39:fc:d5:12:6f:f5:1a:62:88:24:93:73:f7:75: 6c:1b:9f:69:a3:17:f0:39:39:9c:61:bf:41:e8:fa:70: 20:68:6d:dd:33:1b:5e:32:20:7d:88:98:fc:a0:0b:93: 0e:cd:cd:a0:ab:be:09:7e:5a:03:d4:7b:00:02:dd:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:79:40:98:04:2e:d3:54:26:e5:27:8a:10:d3:b6:b9: 81:ac:6d:ef:84:9f:d0:45:6d:d1:fe:7e:32:c9:aa:01: 6e:03:d8:49:6d:3b:d5:ba:64:ea:48:a5:54:97:fb:3c: 68:47:60:c0:4a:2c:4c:e3:45:75:b1:f3:5c:66:8c:70: 8f:da:ab:a6:2d:52:be:2c:be:b8:81:3d:28:49:04:13: 3a:f0:3a:0b:77:c3:1a:fc:02:c1:c8:b0:53:35:a2:a3: 15:bc:f5:8f:4d:52:d4:7a:86:1a:cb:bf:7f:3e:2d:cb: b4:3d:ba:ee:c3:f2:eb:53:fa:18:00:98:6e:e1:f8:6c: 37:ae:56:c5:45:95:87:84:4d:5d:fa:1b:ca:5e:c8:04: 09:09:ba:85:7f:7b:3c:1d:7e:aa:d5:be:17:67:f7:ac: 72:01:f9:d5:f0:6e:db:d0:39:cd:d7:7a:7b:16:77:a7: c6:9c:1c:1c:55:37:97:11:0d:a1:cc:73:72:53:a1:10: 5c:60:ff:a6:e9:99:3d:99:17:1b:48:9b:fb:00:98:46: 92:11:18:bc:bb:f2:49:44:2f:4a:aa:53:3b:40:71:2b: 41:be:70:8d:f0:ad:b3:7c:88:7d:9a:e8:55:3f:1a:52: 79:a5:75:e5:d8:0c:9f:cd:44:ee:24:95:4b:1e:9d:6b Fingerprint (SHA-256): FA:88:8A:2B:F9:F2:DC:29:DC:3E:4F:76:47:E9:CC:5D:9A:F5:15:C9:E6:A0:AA:95:86:17:13:97:D8:12:16:CC Fingerprint (SHA1): 2C:29:15:2B:23:30:06:B8:18:D9:99:75:D0:55:69:20:3C:F5:53:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3282: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3283: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191584 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3284: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3285: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3286: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191585 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3287: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3288: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3289: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3290: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128191586 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3291: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3292: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3293: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3294: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128191587 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3295: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3296: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3297: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3298: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128191588 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3299: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3300: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128191589 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3301: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3302: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3303: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3304: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3305: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128191590 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3306: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3307: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3308: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3309: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128191591 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3310: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3311: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3312: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3313: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191592 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3314: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3315: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3316: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3317: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191593 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3318: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3319: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3320: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191584 (0x433ed660) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:18:58 2025 Not After : Thu Nov 28 11:18:58 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:d7:f9:8d:00:7c:e1:89:31:a9:92:9d:23:e8:48:09: 75:08:81:c2:ce:87:aa:f2:86:50:fd:e2:73:2c:57:33: f6:00:36:97:cb:e8:bd:d5:d6:ff:b2:72:1a:af:f2:f2: cf:e6:91:b2:85:27:70:13:1a:2f:0a:90:d1:c9:4c:39: ac:80:e1:53:38:49:87:2c:44:99:ab:77:94:c3:32:ee: 38:ec:4f:5f:16:74:45:b2:f5:03:f7:5a:80:90:53:e8: d1:9b:bc:25:e3:02:22:19:ac:50:91:1d:6f:1a:23:b9: b0:1c:70:78:17:e3:e0:24:aa:40:68:f2:8c:ad:2b:f6: 52:50:b5:84:2c:4b:f8:7d:54:23:05:18:1f:ee:bc:23: 93:6d:0e:f6:3d:d3:18:97:41:b2:16:82:b8:5a:71:53: 37:de:64:56:b9:0a:43:83:da:41:90:9d:00:ff:ac:38: ff:dc:a8:10:77:7f:0e:fb:cd:67:6d:fc:42:8d:01:aa: b0:7e:15:48:01:3f:37:da:73:96:8c:bf:fd:14:03:bd: 78:e1:f3:b5:82:a9:de:08:fc:e9:44:9c:ba:8c:39:c3: 56:82:e3:91:b2:3c:64:54:3b:02:68:9f:31:c2:04:43: 3b:36:28:ec:cf:df:d5:8c:f0:97:de:4b:03:20:0a:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:22:00:61:92:eb:5e:f3:fc:5a:8c:49:6b:37:43:02: 4f:c9:4e:ff:f0:9f:60:0b:e1:8d:d6:36:6c:fa:a2:07: 2e:2e:2f:7e:aa:79:a6:9e:91:5d:bc:54:fb:f0:b6:3b: aa:8a:74:00:49:83:db:ee:87:d3:e9:87:40:32:26:db: e0:cb:2b:72:55:91:7c:48:bf:2c:85:2c:5e:2c:f2:8c: c7:84:37:2c:7f:60:c3:ca:e6:3a:95:1f:9c:3e:09:a7: 41:c5:69:a4:a8:84:4c:8d:08:7e:fe:56:28:f6:1a:34: 62:d7:cf:09:5c:4e:c5:06:77:04:9c:3a:b4:21:1a:95: 84:5d:f5:1f:0e:73:95:6b:fe:d7:16:fd:f4:67:d2:7f: cc:6a:12:40:aa:b0:42:49:87:c9:3f:40:4a:8b:25:3e: 07:f8:31:02:60:a4:d8:cd:3c:ff:23:6a:66:76:89:b2: ee:77:ae:b0:cf:e5:30:61:d9:fd:26:a9:7e:22:14:5d: f7:2f:66:68:3b:de:43:07:70:c6:03:83:d0:2d:48:29: 29:12:64:2a:9c:c9:6f:3f:bd:d5:73:9b:48:e8:88:1c: b6:02:e1:5a:00:13:91:0d:7e:62:02:8c:36:50:66:10: 59:1e:3a:e1:cc:4f:dc:6d:ca:a2:6f:54:03:e7:52:ee Fingerprint (SHA-256): 5A:C0:9E:1F:8C:47:93:99:D4:4B:77:86:32:44:1F:6B:53:17:4E:F7:CD:04:DE:87:B0:E0:89:B2:01:66:63:F9 Fingerprint (SHA1): B9:09:73:C0:8E:48:93:0C:B7:0E:2D:42:F9:41:83:0A:D2:4B:F1:42 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3321: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3322: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3323: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3324: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3325: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3326: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3327: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3328: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3329: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191585 (0x433ed661) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:18:59 2025 Not After : Thu Nov 28 11:18:59 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:b8:03:e9:ff:26:6d:4d:2a:f9:37:08:4a:66:b1:03: 44:a2:bf:39:71:0e:2d:cf:4f:4f:64:f2:c0:2a:de:aa: b9:c4:fa:44:ba:52:ae:13:3c:85:05:0d:37:82:08:2a: db:e5:7d:54:81:0c:a7:5b:28:ad:46:bf:7a:2c:78:74: d9:6d:1b:e0:7d:e3:bc:52:e9:1d:6c:d4:f7:e7:36:71: 89:c5:25:88:96:49:db:95:93:88:92:c9:14:86:65:b9: 9a:dd:60:57:1c:fe:98:47:78:83:c2:51:75:2e:b0:c6: f4:cc:62:a8:91:95:29:f7:51:74:57:75:03:8f:57:0e: 45:87:b8:4c:74:88:90:a8:b0:db:2b:13:db:99:6b:76: 5a:12:4b:34:9c:9e:3b:0b:47:6c:c7:52:e1:71:51:87: de:34:1e:74:eb:9c:6c:70:d5:d6:6b:95:df:69:bb:91: 2b:37:fa:6f:96:c4:9d:8c:21:34:6e:fa:c2:2d:98:26: 2e:76:25:42:01:9b:cd:2a:a9:af:30:6b:81:c4:15:b2: 90:3d:3f:7b:e4:f4:93:e2:d9:7c:61:50:23:e4:bf:26: 5f:1f:45:46:7d:6e:bc:41:97:fd:83:2f:db:bd:7e:e6: 1f:2f:d1:b2:1a:b1:bf:a7:ad:da:23:65:60:65:99:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:d5:4c:f2:0e:d2:dd:99:5b:35:0c:a2:c0:2d:a1:90: 3f:41:4e:45:35:0b:92:a2:ca:cf:4d:a8:73:f4:47:da: 94:8e:1a:bf:13:f4:75:ca:4a:5a:f8:cc:b5:32:77:06: 84:ad:5e:9c:e7:3c:27:ae:a2:01:6e:95:37:9b:1a:4d: 23:7e:61:4f:30:2a:af:d5:7a:60:c6:7a:51:90:35:49: d4:ce:69:6a:39:28:61:e9:27:76:54:a7:af:20:fc:7d: 9e:33:ad:7e:51:2d:b3:8f:9d:a6:e3:0e:48:d4:14:f5: 4b:8f:e1:7e:de:ab:dd:ac:a9:c9:a6:2a:d0:22:2f:1e: b6:c8:96:20:30:73:1c:46:f9:28:e2:f7:4f:02:52:06: 14:64:db:a9:98:19:79:9c:90:1f:dc:cf:97:be:6f:96: a3:78:c7:7b:46:3a:cf:8f:0f:65:a8:dd:ea:01:71:49: 17:6d:c5:84:d6:fe:70:56:d6:ef:74:33:b1:b3:03:98: 30:36:d4:a2:0b:8a:78:ea:c1:87:9e:73:06:a6:77:65: ad:9e:a8:bd:1a:2b:b8:c7:21:c1:1e:fd:aa:93:81:f8: 3f:91:6e:8c:cb:8f:c7:46:32:54:1e:d4:2a:fd:fb:8d: 9d:d9:e9:de:b8:dc:8d:57:08:74:8c:39:ec:99:01:4b Fingerprint (SHA-256): AB:A6:2D:EB:C8:05:6B:1C:06:61:00:D2:FE:E1:E9:38:2D:B7:09:1C:46:79:0A:14:90:E7:C2:85:7F:D8:79:66 Fingerprint (SHA1): 73:38:B9:D0:5A:C9:85:F3:F2:43:2E:03:29:B9:59:62:11:B9:94:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3330: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3331: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3332: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3333: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3334: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3335: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3336: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3337: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3338: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3339: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3340: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3341: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3342: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3343: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3344: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3345: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #3346: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3347: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3348: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191594 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3349: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3350: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3351: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3352: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128191595 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3353: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3354: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3355: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3356: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128191596 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3357: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3358: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3359: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3360: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128191597 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3361: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3362: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3363: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3364: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128191598 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3365: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3366: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3367: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3368: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128191599 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3369: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3370: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3371: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3372: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128191600 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3373: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3374: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3375: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3376: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128191601 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3377: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3378: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3379: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3380: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128191602 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3381: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3382: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3383: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191594 (0x433ed66a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:07 2025 Not After : Thu Nov 28 11:19:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: c2:e2:5e:49:c5:5c:b4:10:fb:c1:b5:3d:0c:3e:42:f7: a3:00:f5:17:61:49:b5:67:e7:cc:0b:b4:c3:a6:bb:85: f8:fd:ec:47:c3:43:a0:ce:8b:02:9c:c9:85:5e:01:3f: 6e:23:6a:be:fd:0f:34:9e:89:aa:aa:f7:93:53:3b:9c: df:f5:89:ef:ed:13:81:49:8b:e9:c3:29:07:0a:c0:92: e6:ed:9a:7f:22:6c:1b:f7:fb:3a:07:ab:a6:01:78:df: 52:ae:e1:f5:7a:31:b5:e5:bc:8a:0a:5b:18:b8:78:c3: a6:df:76:eb:4f:d5:e4:65:ee:42:6d:8f:d3:c4:3d:b9: 0d:0e:96:5e:0e:22:21:7e:b5:b5:e6:a1:3f:3c:dc:98: 5c:db:26:b6:ec:85:40:d3:c1:76:2e:bd:af:ab:f7:ca: 2b:66:30:49:91:8a:76:68:90:1a:e1:1d:b0:86:e8:4e: 48:30:bc:1d:35:05:4e:a7:5c:43:ad:2a:27:21:7f:2d: 68:44:f1:a5:a3:f8:fc:22:fe:13:70:5c:23:58:5d:54: 0b:23:0c:f2:2d:23:9b:8d:83:4c:b6:f4:28:da:05:91: ca:82:e5:4b:69:14:dd:13:80:7e:98:b5:49:eb:5d:e8: 24:f4:89:cc:34:9c:81:51:91:6a:f8:cf:0c:ec:19:b6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:62:7f:19:f5:41:ac:24:91:a7:d0:3b:bb: 60:8b:d8:84:2c:03:94:87:95:5a:c2:65:88:ef:37:21: 02:1d:00:dd:ee:f7:52:31:40:49:71:2f:94:e9:40:0e: eb:40:fb:76:22:21:f8:1d:13:70:c8:17:c8:a4:e0 Fingerprint (SHA-256): E3:88:A1:53:FC:AF:21:C4:4A:EF:0C:F8:3C:F6:D1:C3:E7:80:DB:A2:1D:70:17:05:9F:6F:C2:58:96:63:92:CC Fingerprint (SHA1): AA:D6:9A:86:77:20:DB:7A:37:3F:F9:A7:F2:A1:75:2C:9F:3C:0B:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3384: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191594 (0x433ed66a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:07 2025 Not After : Thu Nov 28 11:19:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: c2:e2:5e:49:c5:5c:b4:10:fb:c1:b5:3d:0c:3e:42:f7: a3:00:f5:17:61:49:b5:67:e7:cc:0b:b4:c3:a6:bb:85: f8:fd:ec:47:c3:43:a0:ce:8b:02:9c:c9:85:5e:01:3f: 6e:23:6a:be:fd:0f:34:9e:89:aa:aa:f7:93:53:3b:9c: df:f5:89:ef:ed:13:81:49:8b:e9:c3:29:07:0a:c0:92: e6:ed:9a:7f:22:6c:1b:f7:fb:3a:07:ab:a6:01:78:df: 52:ae:e1:f5:7a:31:b5:e5:bc:8a:0a:5b:18:b8:78:c3: a6:df:76:eb:4f:d5:e4:65:ee:42:6d:8f:d3:c4:3d:b9: 0d:0e:96:5e:0e:22:21:7e:b5:b5:e6:a1:3f:3c:dc:98: 5c:db:26:b6:ec:85:40:d3:c1:76:2e:bd:af:ab:f7:ca: 2b:66:30:49:91:8a:76:68:90:1a:e1:1d:b0:86:e8:4e: 48:30:bc:1d:35:05:4e:a7:5c:43:ad:2a:27:21:7f:2d: 68:44:f1:a5:a3:f8:fc:22:fe:13:70:5c:23:58:5d:54: 0b:23:0c:f2:2d:23:9b:8d:83:4c:b6:f4:28:da:05:91: ca:82:e5:4b:69:14:dd:13:80:7e:98:b5:49:eb:5d:e8: 24:f4:89:cc:34:9c:81:51:91:6a:f8:cf:0c:ec:19:b6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:62:7f:19:f5:41:ac:24:91:a7:d0:3b:bb: 60:8b:d8:84:2c:03:94:87:95:5a:c2:65:88:ef:37:21: 02:1d:00:dd:ee:f7:52:31:40:49:71:2f:94:e9:40:0e: eb:40:fb:76:22:21:f8:1d:13:70:c8:17:c8:a4:e0 Fingerprint (SHA-256): E3:88:A1:53:FC:AF:21:C4:4A:EF:0C:F8:3C:F6:D1:C3:E7:80:DB:A2:1D:70:17:05:9F:6F:C2:58:96:63:92:CC Fingerprint (SHA1): AA:D6:9A:86:77:20:DB:7A:37:3F:F9:A7:F2:A1:75:2C:9F:3C:0B:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3385: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191594 (0x433ed66a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:07 2025 Not After : Thu Nov 28 11:19:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: c2:e2:5e:49:c5:5c:b4:10:fb:c1:b5:3d:0c:3e:42:f7: a3:00:f5:17:61:49:b5:67:e7:cc:0b:b4:c3:a6:bb:85: f8:fd:ec:47:c3:43:a0:ce:8b:02:9c:c9:85:5e:01:3f: 6e:23:6a:be:fd:0f:34:9e:89:aa:aa:f7:93:53:3b:9c: df:f5:89:ef:ed:13:81:49:8b:e9:c3:29:07:0a:c0:92: e6:ed:9a:7f:22:6c:1b:f7:fb:3a:07:ab:a6:01:78:df: 52:ae:e1:f5:7a:31:b5:e5:bc:8a:0a:5b:18:b8:78:c3: a6:df:76:eb:4f:d5:e4:65:ee:42:6d:8f:d3:c4:3d:b9: 0d:0e:96:5e:0e:22:21:7e:b5:b5:e6:a1:3f:3c:dc:98: 5c:db:26:b6:ec:85:40:d3:c1:76:2e:bd:af:ab:f7:ca: 2b:66:30:49:91:8a:76:68:90:1a:e1:1d:b0:86:e8:4e: 48:30:bc:1d:35:05:4e:a7:5c:43:ad:2a:27:21:7f:2d: 68:44:f1:a5:a3:f8:fc:22:fe:13:70:5c:23:58:5d:54: 0b:23:0c:f2:2d:23:9b:8d:83:4c:b6:f4:28:da:05:91: ca:82:e5:4b:69:14:dd:13:80:7e:98:b5:49:eb:5d:e8: 24:f4:89:cc:34:9c:81:51:91:6a:f8:cf:0c:ec:19:b6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:62:7f:19:f5:41:ac:24:91:a7:d0:3b:bb: 60:8b:d8:84:2c:03:94:87:95:5a:c2:65:88:ef:37:21: 02:1d:00:dd:ee:f7:52:31:40:49:71:2f:94:e9:40:0e: eb:40:fb:76:22:21:f8:1d:13:70:c8:17:c8:a4:e0 Fingerprint (SHA-256): E3:88:A1:53:FC:AF:21:C4:4A:EF:0C:F8:3C:F6:D1:C3:E7:80:DB:A2:1D:70:17:05:9F:6F:C2:58:96:63:92:CC Fingerprint (SHA1): AA:D6:9A:86:77:20:DB:7A:37:3F:F9:A7:F2:A1:75:2C:9F:3C:0B:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3386: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191594 (0x433ed66a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:07 2025 Not After : Thu Nov 28 11:19:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: c2:e2:5e:49:c5:5c:b4:10:fb:c1:b5:3d:0c:3e:42:f7: a3:00:f5:17:61:49:b5:67:e7:cc:0b:b4:c3:a6:bb:85: f8:fd:ec:47:c3:43:a0:ce:8b:02:9c:c9:85:5e:01:3f: 6e:23:6a:be:fd:0f:34:9e:89:aa:aa:f7:93:53:3b:9c: df:f5:89:ef:ed:13:81:49:8b:e9:c3:29:07:0a:c0:92: e6:ed:9a:7f:22:6c:1b:f7:fb:3a:07:ab:a6:01:78:df: 52:ae:e1:f5:7a:31:b5:e5:bc:8a:0a:5b:18:b8:78:c3: a6:df:76:eb:4f:d5:e4:65:ee:42:6d:8f:d3:c4:3d:b9: 0d:0e:96:5e:0e:22:21:7e:b5:b5:e6:a1:3f:3c:dc:98: 5c:db:26:b6:ec:85:40:d3:c1:76:2e:bd:af:ab:f7:ca: 2b:66:30:49:91:8a:76:68:90:1a:e1:1d:b0:86:e8:4e: 48:30:bc:1d:35:05:4e:a7:5c:43:ad:2a:27:21:7f:2d: 68:44:f1:a5:a3:f8:fc:22:fe:13:70:5c:23:58:5d:54: 0b:23:0c:f2:2d:23:9b:8d:83:4c:b6:f4:28:da:05:91: ca:82:e5:4b:69:14:dd:13:80:7e:98:b5:49:eb:5d:e8: 24:f4:89:cc:34:9c:81:51:91:6a:f8:cf:0c:ec:19:b6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:62:7f:19:f5:41:ac:24:91:a7:d0:3b:bb: 60:8b:d8:84:2c:03:94:87:95:5a:c2:65:88:ef:37:21: 02:1d:00:dd:ee:f7:52:31:40:49:71:2f:94:e9:40:0e: eb:40:fb:76:22:21:f8:1d:13:70:c8:17:c8:a4:e0 Fingerprint (SHA-256): E3:88:A1:53:FC:AF:21:C4:4A:EF:0C:F8:3C:F6:D1:C3:E7:80:DB:A2:1D:70:17:05:9F:6F:C2:58:96:63:92:CC Fingerprint (SHA1): AA:D6:9A:86:77:20:DB:7A:37:3F:F9:A7:F2:A1:75:2C:9F:3C:0B:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3387: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3388: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3389: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3390: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3391: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3392: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3393: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3394: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3395: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3396: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3397: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3398: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3399: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3400: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3401: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3402: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3403: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3404: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3405: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3406: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3407: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3408: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3409: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3410: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3411: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3412: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3413: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3414: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111917Z nextupdate=20261128111917Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:19:17 2025 Next Update: Sat Nov 28 11:19:17 2026 CRL Extensions: chains.sh: #3415: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111917Z nextupdate=20261128111917Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:19:17 2025 Next Update: Sat Nov 28 11:19:17 2026 CRL Extensions: chains.sh: #3416: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111917Z nextupdate=20261128111917Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:19:17 2025 Next Update: Sat Nov 28 11:19:17 2026 CRL Extensions: chains.sh: #3417: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111917Z nextupdate=20261128111917Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:19:17 2025 Next Update: Sat Nov 28 11:19:17 2026 CRL Extensions: chains.sh: #3418: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111918Z addcert 14 20251128111918Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:19:18 2025 Next Update: Sat Nov 28 11:19:17 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:19:18 2025 CRL Extensions: chains.sh: #3419: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111919Z addcert 15 20251128111919Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:19:19 2025 Next Update: Sat Nov 28 11:19:17 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:19:19 2025 CRL Extensions: chains.sh: #3420: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3421: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3422: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3423: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3424: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3425: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3426: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3427: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3428: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3429: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:12 2025 Not After : Thu Nov 28 11:19:12 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:89:7a:cb:0a:dd:c2:5e:4e:2d:ae:55:ee:15:40:cc: c4:fb:43:c8:17:51:73:ec:97:44:4f:59:45:fe:23:79: 9c:c6:a9:4b:44:0a:28:e0:5d:02:e3:54:a3:12:2d:a2: 21:02:d9:82:d6:32:f2:e5:60:a5:59:25:5a:cd:b1:97: aa:59:b5:f2:da:6a:9c:7b:e6:b5:d1:23:bb:3d:ce:52: 63:2a:3a:9d:a7:7b:64:52:0c:74:7b:b4:0e:aa:d7:e8: 96:36:05:21:db:a5:21:d7:8b:ec:84:92:0b:54:20:7d: 81:4c:14:53:53:37:64:8e:75:7b:44:fe:4a:e5:0a:be: 4d:6e:30:47:94:92:3e:db:d7:34:f3:ca:96:dd:25:92: 71:94:e9:b8:f8:4d:ca:31:c3:4b:c4:a8:38:08:b4:b3: 4a:d4:37:8e:12:30:4a:8c:52:38:05:c8:95:65:2e:05: 9e:1d:68:bc:6f:50:c2:28:d7:59:e1:0b:31:f0:e0:c5: 4b:6e:a8:80:f1:6e:49:56:d7:fb:cd:c5:e9:c6:7e:90: c4:d2:b3:59:19:79:12:c1:2e:74:4b:a8:21:6e:5f:e9: 1e:50:3f:33:4c:1f:e2:d0:e4:61:55:8b:9d:ea:9a:cb: 56:05:d1:28:00:1d:d5:fb:f3:88:8f:d2:fd:7e:b5:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:15:5d:fc:53:22:f0:e7:4e:a3:af:ac:b2:cc:0e:3e: e8:57:49:3e:85:e2:c4:de:6d:70:51:5d:1c:c4:7e:c3: d2:a7:35:a7:2a:49:bc:f6:66:03:47:15:1c:45:69:16: b6:ed:88:fb:49:0c:af:1a:4f:02:d1:e9:70:44:fb:06: da:3d:9f:81:1e:d4:f7:36:7a:c5:b0:3f:b9:22:84:39: e5:ae:d0:04:34:3f:b1:9b:d0:b0:a6:2d:dc:d3:a3:59: f2:5d:b0:e9:45:e1:e3:3b:54:7f:a0:1a:69:96:04:85: c6:e3:23:13:b5:36:5d:45:3e:58:70:00:c5:92:07:17: d3:6a:19:3e:b3:3c:3f:80:27:b8:36:85:51:ae:e7:2d: 04:6c:d5:b7:86:ad:2c:c6:42:39:dc:1d:5c:85:9e:35: ec:a9:a4:5d:b4:9f:d3:b9:46:8a:65:11:0b:98:83:c3: 15:97:6c:6a:ee:91:9a:8b:0d:88:63:55:bd:b9:37:e9: ab:8d:89:08:9a:07:9b:20:ca:33:f7:2d:a0:c8:32:74: 40:ed:dd:e0:ff:ce:6e:89:10:55:d0:20:18:9c:bd:0f: 5b:bd:ed:33:56:19:d5:41:c6:20:64:44:c9:64:3d:48: b9:08:dd:5b:be:5f:e5:44:52:a8:32:21:16:a9:8e:d8 Fingerprint (SHA-256): 52:88:1D:6E:A4:8B:15:51:6A:E4:C5:78:ED:AD:9C:89:0E:D2:8C:B2:A4:58:CE:1B:3C:54:67:3B:1B:C2:D4:F3 Fingerprint (SHA1): B4:06:2D:C8:ED:6E:FF:25:5C:CE:34:86:6B:7C:8E:BE:DE:9D:4A:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3430: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3431: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:12 2025 Not After : Thu Nov 28 11:19:12 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:89:7a:cb:0a:dd:c2:5e:4e:2d:ae:55:ee:15:40:cc: c4:fb:43:c8:17:51:73:ec:97:44:4f:59:45:fe:23:79: 9c:c6:a9:4b:44:0a:28:e0:5d:02:e3:54:a3:12:2d:a2: 21:02:d9:82:d6:32:f2:e5:60:a5:59:25:5a:cd:b1:97: aa:59:b5:f2:da:6a:9c:7b:e6:b5:d1:23:bb:3d:ce:52: 63:2a:3a:9d:a7:7b:64:52:0c:74:7b:b4:0e:aa:d7:e8: 96:36:05:21:db:a5:21:d7:8b:ec:84:92:0b:54:20:7d: 81:4c:14:53:53:37:64:8e:75:7b:44:fe:4a:e5:0a:be: 4d:6e:30:47:94:92:3e:db:d7:34:f3:ca:96:dd:25:92: 71:94:e9:b8:f8:4d:ca:31:c3:4b:c4:a8:38:08:b4:b3: 4a:d4:37:8e:12:30:4a:8c:52:38:05:c8:95:65:2e:05: 9e:1d:68:bc:6f:50:c2:28:d7:59:e1:0b:31:f0:e0:c5: 4b:6e:a8:80:f1:6e:49:56:d7:fb:cd:c5:e9:c6:7e:90: c4:d2:b3:59:19:79:12:c1:2e:74:4b:a8:21:6e:5f:e9: 1e:50:3f:33:4c:1f:e2:d0:e4:61:55:8b:9d:ea:9a:cb: 56:05:d1:28:00:1d:d5:fb:f3:88:8f:d2:fd:7e:b5:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:15:5d:fc:53:22:f0:e7:4e:a3:af:ac:b2:cc:0e:3e: e8:57:49:3e:85:e2:c4:de:6d:70:51:5d:1c:c4:7e:c3: d2:a7:35:a7:2a:49:bc:f6:66:03:47:15:1c:45:69:16: b6:ed:88:fb:49:0c:af:1a:4f:02:d1:e9:70:44:fb:06: da:3d:9f:81:1e:d4:f7:36:7a:c5:b0:3f:b9:22:84:39: e5:ae:d0:04:34:3f:b1:9b:d0:b0:a6:2d:dc:d3:a3:59: f2:5d:b0:e9:45:e1:e3:3b:54:7f:a0:1a:69:96:04:85: c6:e3:23:13:b5:36:5d:45:3e:58:70:00:c5:92:07:17: d3:6a:19:3e:b3:3c:3f:80:27:b8:36:85:51:ae:e7:2d: 04:6c:d5:b7:86:ad:2c:c6:42:39:dc:1d:5c:85:9e:35: ec:a9:a4:5d:b4:9f:d3:b9:46:8a:65:11:0b:98:83:c3: 15:97:6c:6a:ee:91:9a:8b:0d:88:63:55:bd:b9:37:e9: ab:8d:89:08:9a:07:9b:20:ca:33:f7:2d:a0:c8:32:74: 40:ed:dd:e0:ff:ce:6e:89:10:55:d0:20:18:9c:bd:0f: 5b:bd:ed:33:56:19:d5:41:c6:20:64:44:c9:64:3d:48: b9:08:dd:5b:be:5f:e5:44:52:a8:32:21:16:a9:8e:d8 Fingerprint (SHA-256): 52:88:1D:6E:A4:8B:15:51:6A:E4:C5:78:ED:AD:9C:89:0E:D2:8C:B2:A4:58:CE:1B:3C:54:67:3B:1B:C2:D4:F3 Fingerprint (SHA1): B4:06:2D:C8:ED:6E:FF:25:5C:CE:34:86:6B:7C:8E:BE:DE:9D:4A:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3432: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3433: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #3434: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #3435: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3436: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #3437: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3438: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111921Z nextupdate=20261128111921Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:19:21 2025 Next Update: Sat Nov 28 11:19:21 2026 CRL Extensions: chains.sh: #3439: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111922Z addcert 3 20251128111922Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:19:22 2025 Next Update: Sat Nov 28 11:19:21 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:19:22 2025 CRL Extensions: chains.sh: #3440: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128111923Z addcert 4 20251128111923Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:19:23 2025 Next Update: Sat Nov 28 11:19:21 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:19:23 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:19:22 2025 CRL Extensions: chains.sh: #3441: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3442: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3443: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3444: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3445: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #3446: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3447: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3448: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #3449: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3450: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3451: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3452: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #3453: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3454: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:46 2025 Not After : Thu Nov 28 11:10:46 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:de:1f:02:6e:9c:11:8d:14:99:cc:04:bf:ff:f4:4c: b8:8b:a4:d8:63:3b:35:c5:13:dd:d0:db:00:0a:70:2f: a8:37:44:d5:96:78:87:a3:89:26:6c:94:f9:3a:2c:0a: a2:5a:b2:dc:4a:5c:e5:ef:6b:de:17:e0:6b:be:f1:64: 28:2e:f3:13:23:4e:f0:6a:d0:f6:5d:03:a0:70:49:1d: b2:af:3d:66:e4:23:b7:00:01:45:62:90:9a:c0:b3:24: 69:70:66:df:ee:aa:4e:93:20:46:43:d1:ac:e3:2e:1b: 2e:fd:e5:0f:4d:80:fc:a9:e4:70:6d:76:1c:57:f9:6b: 5a:81:18:ab:d6:80:46:63:0e:42:0c:af:df:71:63:e2: 5b:fa:a1:00:24:3f:a2:f9:e7:6f:5e:c3:59:b9:2e:0a: 22:46:15:2d:b2:86:21:30:24:e9:3f:94:46:9a:8b:f4: 10:31:d0:c6:b6:12:45:4e:4f:5a:72:eb:35:57:d8:33: 9e:fe:23:b2:75:84:ad:e1:13:24:4c:9d:00:fa:3e:eb: 34:13:da:16:8b:dc:1c:ec:34:db:17:ed:80:9e:d2:36: 9c:27:12:f3:77:b2:72:48:36:e8:63:92:4e:e8:0a:12: f8:99:fc:83:f3:e1:72:57:d5:60:17:4d:50:e4:9e:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:a8:a7:03:e0:13:8e:f2:a4:d3:27:12:3d:9e:cb:3b: ec:2c:48:f7:05:a6:fd:07:24:a9:a9:d9:9e:ec:0b:df: 53:04:29:04:ad:0d:b6:8d:a3:03:8d:da:18:24:c4:1c: 2a:98:fc:b1:52:d1:0d:00:ad:7c:2e:30:5a:63:06:5c: 84:44:b4:a8:87:22:97:a1:55:dc:78:1d:28:ba:ad:17: 85:e6:21:f9:02:79:0e:33:2d:7e:6e:40:b7:15:9f:ad: 43:4e:52:7b:79:30:d7:ff:81:99:6d:23:ad:53:81:a0: 0b:bb:a5:9a:e1:95:50:d5:ec:16:4b:b6:4e:4d:d2:0a: a9:0f:f1:ff:29:6b:a0:e5:7d:28:33:f9:08:ef:90:0e: 34:83:34:a0:95:94:a8:88:74:94:ad:b3:aa:a6:01:89: 39:0f:3f:c0:c9:e8:a9:55:87:cc:e9:7c:67:1f:1c:6a: a9:9a:d1:22:9b:bb:4b:95:41:9b:c8:2c:da:39:6e:f6: 94:6c:3d:99:f0:ec:ef:6b:8a:cc:e8:42:12:3c:28:20: d9:10:f1:46:dc:36:ba:76:e0:f4:d4:8f:0f:c0:db:2e: 06:cd:75:62:7f:10:55:03:e7:a9:cf:62:a1:f3:a2:ab: 71:eb:39:9a:47:83:70:04:79:ff:0d:f0:83:0f:c4:eb Fingerprint (SHA-256): FA:9F:34:98:3E:45:9C:64:C3:1D:B0:D6:1F:FD:E7:E1:0A:FA:6E:FB:8D:38:E4:88:EA:D6:1E:1D:95:72:E9:16 Fingerprint (SHA1): 2B:9F:53:8F:89:96:19:33:10:A1:56:57:42:D6:AD:CC:A5:CE:1D:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #3455: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #3456: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3457: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3458: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #3459: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3460: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191045 (0x433ed445) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:10:45 2025 Not After : Thu Nov 28 11:10:45 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:ce:28:46:8d:8f:f2:9f:e3:01:e1:51:8e:f6:53:d0: 77:98:73:2c:0d:e5:3d:96:8e:c6:6b:0c:d8:4d:b1:78: 2e:90:30:c1:28:74:58:ca:7d:96:0f:ff:57:7d:e2:36: a7:d1:ad:eb:65:6e:05:df:98:2d:a9:34:4c:a6:97:a6: eb:15:f2:5d:3d:c9:17:36:19:d9:d9:d1:2c:97:7e:14: 8c:87:91:41:94:52:7e:8c:6f:b8:ee:58:3c:29:1c:3f: ba:c5:8d:e4:d3:75:d3:8c:20:65:97:4f:db:c9:36:55: bb:5b:9e:41:11:f9:22:ae:ed:d0:15:1c:07:70:b7:20: c5:a7:e5:a7:60:aa:9a:6f:1a:13:f7:3a:ca:5c:c7:98: b8:69:58:0e:1e:8f:08:69:c5:7c:b2:4e:9a:89:d8:5b: 2a:55:01:af:9e:9f:49:1a:9c:9c:18:14:e6:7e:0b:ac: b5:7d:f5:07:9d:68:97:d4:97:03:1e:9d:b9:46:37:67: a1:b1:67:e1:d9:4d:60:79:b2:c6:b2:68:52:4b:74:47: 35:80:5d:df:cc:47:54:35:bb:cc:ec:28:3f:1a:5c:45: bf:77:b1:8f:ca:af:5b:5d:c9:c9:52:54:32:66:91:1b: 82:17:e6:6a:10:83:99:25:51:95:4f:b3:d5:d1:8a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: be:84:5c:94:e1:7a:e5:b0:06:af:0b:4e:5d:48:ac:02: 29:69:c9:a8:d8:bb:a6:b6:fb:08:60:f3:a7:5f:b6:df: 95:f5:02:b8:72:60:95:62:8c:67:46:85:6d:84:84:a7: e3:69:b5:fd:14:a3:d5:3c:3a:69:c4:10:e3:d0:69:bb: 4f:06:e2:90:b3:2f:a0:59:f9:92:43:df:b2:41:86:b3: 91:ee:cd:fd:59:a7:24:2d:03:60:f1:0f:6e:b4:14:18: c7:fb:21:f6:22:fe:d8:35:3b:a9:e7:a0:41:88:5c:bb: a4:6c:4c:cf:33:dc:92:b5:d6:9f:e2:17:bc:a3:54:5b: 72:d8:db:2a:c7:53:96:42:6c:57:bc:07:74:f2:50:15: 53:17:90:f5:ef:1e:6e:47:1b:6b:2e:cc:db:28:91:62: e2:5b:2d:dd:a4:72:5d:a1:90:6b:e0:6c:10:1c:6e:7a: 0f:59:61:0e:2b:27:3e:ed:d9:7a:27:6c:68:d5:83:fa: 00:31:c6:79:fa:b8:13:8c:54:a6:e9:ae:7d:9f:5c:cc: b9:65:b0:a0:9f:14:a4:71:b4:1e:88:28:e5:d6:a4:9f: 7b:21:ba:d4:a7:e8:a7:b1:7f:d6:18:72:cf:7a:44:a9: 80:74:c2:91:dc:20:65:21:03:01:48:e8:d7:34:a4:7f Fingerprint (SHA-256): 47:84:DB:3A:BE:88:8E:14:5B:08:DB:7D:D9:00:3C:12:24:8E:6F:63:A4:73:EC:54:A4:D6:F1:E0:33:89:B6:5E Fingerprint (SHA1): 6B:D0:C7:7D:1A:A1:CD:2C:26:26:0D:A5:9A:6B:A2:39:DC:A8:F2:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #3461: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3462: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191603 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3463: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3464: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3465: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3466: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128191604 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3467: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3468: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3469: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191126.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3470: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191073.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3471: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3472: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3473: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191126.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3474: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128191605 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3475: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3476: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3477: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191126.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3478: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191074.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3479: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3480: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3481: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3482: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128191606 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3483: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3484: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3485: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191126.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3486: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191075.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3487: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3488: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3489: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128191126.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3490: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128191076.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3491: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3492: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128111931Z nextupdate=20261128111931Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:19:31 2025 Next Update: Sat Nov 28 11:19:31 2026 CRL Extensions: chains.sh: #3493: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111931Z nextupdate=20261128111931Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:19:31 2025 Next Update: Sat Nov 28 11:19:31 2026 CRL Extensions: chains.sh: #3494: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128111931Z nextupdate=20261128111931Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:19:31 2025 Next Update: Sat Nov 28 11:19:31 2026 CRL Extensions: chains.sh: #3495: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128111931Z nextupdate=20261128111931Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:19:31 2025 Next Update: Sat Nov 28 11:19:31 2026 CRL Extensions: chains.sh: #3496: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111932Z addcert 20 20251128111932Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:19:32 2025 Next Update: Sat Nov 28 11:19:31 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:19:32 2025 CRL Extensions: chains.sh: #3497: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128111933Z addcert 40 20251128111933Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:19:33 2025 Next Update: Sat Nov 28 11:19:31 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:19:32 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:19:33 2025 CRL Extensions: chains.sh: #3498: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3499: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3500: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3501: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191603 (0x433ed673) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:26 2025 Not After : Thu Nov 28 11:19:26 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9e:e3:f3:4c:9d:1d:21:0c:15:d6:c4:37:47:58:30: a5:ca:1c:00:ed:e3:67:9b:67:1e:4b:95:f5:43:e7:bb: fc:8d:4e:8d:93:ae:84:d1:0d:d0:d7:6d:1b:75:d6:0d: 1f:4f:03:18:97:03:0c:d5:b5:f6:9b:a3:74:d4:3a:89: eb:4c:ee:1e:a6:64:51:98:4d:82:a3:ae:31:9b:62:dc: 32:8d:cb:bb:0f:08:76:7b:83:07:32:5b:92:4c:71:63: 66:6f:a6:48:af:23:ec:59:33:e6:b7:3a:3c:ad:c9:7a: 59:e6:c2:a2:95:c1:25:2f:44:39:09:e4:69:8b:11:8f: e8:f6:1d:50:5b:42:21:d7:8b:ad:96:bb:eb:db:dd:29: 87:0e:b3:29:5d:3e:2a:a7:31:bb:71:a9:81:7d:4b:ac: 86:99:f4:c3:bd:e1:da:64:e4:56:a8:49:59:17:aa:63: 0c:5f:7b:19:9f:44:cb:61:9a:a9:06:ca:d5:67:5d:63: 38:6b:1b:a2:4d:aa:c0:68:de:27:0e:1a:d1:00:0b:de: 28:30:f2:b9:a1:1d:2f:71:bf:45:5e:39:9e:ba:8b:f8: 06:db:a0:0f:73:3a:83:d2:e8:95:ba:16:17:36:a7:5f: 40:67:46:cc:7b:e1:6b:bb:61:39:77:a5:80:11:f4:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:60:20:bd:25:51:d5:d2:c6:9a:1a:e3:2f:e9:06:05: b4:2f:07:bd:05:03:89:03:21:ad:cf:58:33:c6:fc:63: 5e:0b:39:15:9c:fe:23:5a:72:87:15:75:f9:cd:69:c6: 28:22:c3:7a:08:e5:bf:0a:28:f6:3c:59:14:07:89:5f: 8d:e8:81:0f:0a:cf:0f:56:b5:37:8e:d8:1c:61:54:4c: 1f:8e:5d:6b:98:48:5d:fa:eb:c1:17:a3:05:05:a0:01: 3b:28:f8:12:5d:c8:b8:65:19:c3:67:89:d6:cc:e9:00: 0d:8b:3b:a9:68:ca:ee:f2:64:15:e2:97:27:c6:4e:7c: 35:ab:3c:68:83:b3:41:50:84:99:e8:42:b7:04:1b:7e: 3d:c3:6d:7b:48:26:73:13:c1:7b:70:1d:21:c2:07:52: 9e:23:16:ad:18:86:b2:0b:66:fe:f2:7e:59:fc:b5:a5: 5b:2f:da:16:28:73:b7:41:8e:41:df:b7:c9:e7:fe:0b: 9f:c8:a0:96:dd:f6:71:dc:ad:1b:b5:45:03:49:9e:7c: 4e:a7:0e:50:c4:a2:00:21:c6:2c:d7:fa:6b:81:e2:89: d5:42:e2:d8:5a:d7:c2:c2:50:18:ad:e1:37:d1:c4:71: 91:13:30:82:8e:b4:04:ac:30:5f:25:9a:17:f6:b1:f2 Fingerprint (SHA-256): AE:A1:D0:BB:5A:92:41:00:33:F6:B6:DC:0A:13:E5:E5:60:D1:53:04:E2:B9:8F:7C:A1:98:C6:92:9E:E6:7C:1D Fingerprint (SHA1): E6:07:B5:D5:4B:D3:41:A7:49:79:29:D4:D4:28:DD:5E:0E:5A:8A:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3502: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3503: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191603 (0x433ed673) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:19:26 2025 Not After : Thu Nov 28 11:19:26 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9e:e3:f3:4c:9d:1d:21:0c:15:d6:c4:37:47:58:30: a5:ca:1c:00:ed:e3:67:9b:67:1e:4b:95:f5:43:e7:bb: fc:8d:4e:8d:93:ae:84:d1:0d:d0:d7:6d:1b:75:d6:0d: 1f:4f:03:18:97:03:0c:d5:b5:f6:9b:a3:74:d4:3a:89: eb:4c:ee:1e:a6:64:51:98:4d:82:a3:ae:31:9b:62:dc: 32:8d:cb:bb:0f:08:76:7b:83:07:32:5b:92:4c:71:63: 66:6f:a6:48:af:23:ec:59:33:e6:b7:3a:3c:ad:c9:7a: 59:e6:c2:a2:95:c1:25:2f:44:39:09:e4:69:8b:11:8f: e8:f6:1d:50:5b:42:21:d7:8b:ad:96:bb:eb:db:dd:29: 87:0e:b3:29:5d:3e:2a:a7:31:bb:71:a9:81:7d:4b:ac: 86:99:f4:c3:bd:e1:da:64:e4:56:a8:49:59:17:aa:63: 0c:5f:7b:19:9f:44:cb:61:9a:a9:06:ca:d5:67:5d:63: 38:6b:1b:a2:4d:aa:c0:68:de:27:0e:1a:d1:00:0b:de: 28:30:f2:b9:a1:1d:2f:71:bf:45:5e:39:9e:ba:8b:f8: 06:db:a0:0f:73:3a:83:d2:e8:95:ba:16:17:36:a7:5f: 40:67:46:cc:7b:e1:6b:bb:61:39:77:a5:80:11:f4:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:60:20:bd:25:51:d5:d2:c6:9a:1a:e3:2f:e9:06:05: b4:2f:07:bd:05:03:89:03:21:ad:cf:58:33:c6:fc:63: 5e:0b:39:15:9c:fe:23:5a:72:87:15:75:f9:cd:69:c6: 28:22:c3:7a:08:e5:bf:0a:28:f6:3c:59:14:07:89:5f: 8d:e8:81:0f:0a:cf:0f:56:b5:37:8e:d8:1c:61:54:4c: 1f:8e:5d:6b:98:48:5d:fa:eb:c1:17:a3:05:05:a0:01: 3b:28:f8:12:5d:c8:b8:65:19:c3:67:89:d6:cc:e9:00: 0d:8b:3b:a9:68:ca:ee:f2:64:15:e2:97:27:c6:4e:7c: 35:ab:3c:68:83:b3:41:50:84:99:e8:42:b7:04:1b:7e: 3d:c3:6d:7b:48:26:73:13:c1:7b:70:1d:21:c2:07:52: 9e:23:16:ad:18:86:b2:0b:66:fe:f2:7e:59:fc:b5:a5: 5b:2f:da:16:28:73:b7:41:8e:41:df:b7:c9:e7:fe:0b: 9f:c8:a0:96:dd:f6:71:dc:ad:1b:b5:45:03:49:9e:7c: 4e:a7:0e:50:c4:a2:00:21:c6:2c:d7:fa:6b:81:e2:89: d5:42:e2:d8:5a:d7:c2:c2:50:18:ad:e1:37:d1:c4:71: 91:13:30:82:8e:b4:04:ac:30:5f:25:9a:17:f6:b1:f2 Fingerprint (SHA-256): AE:A1:D0:BB:5A:92:41:00:33:F6:B6:DC:0A:13:E5:E5:60:D1:53:04:E2:B9:8F:7C:A1:98:C6:92:9E:E6:7C:1D Fingerprint (SHA1): E6:07:B5:D5:4B:D3:41:A7:49:79:29:D4:D4:28:DD:5E:0E:5A:8A:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3504: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3505: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3506: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191607 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3507: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3508: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3509: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3510: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128191608 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3511: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3512: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3513: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3514: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128191609 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3515: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3516: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3517: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3518: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128191610 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3519: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3520: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #3521: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -m 1128191611 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3522: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #3523: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #3524: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3525: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128191612 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3526: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3527: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3528: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3529: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128191613 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3530: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3531: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #3532: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #3533: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #3534: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191607 (0x433ed677) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:19:35 2025 Not After : Thu Nov 28 11:19:35 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:78:01:73:35:9c:93:cc:ad:35:32:2f:48:fe:5b:38: b3:39:15:d8:14:c6:46:8d:3c:c3:58:99:c4:25:28:6e: 26:2c:40:76:56:72:96:10:1d:a6:bb:c3:1a:c9:c8:f0: 4a:69:80:46:72:5f:16:bf:5e:e1:9e:d7:48:0f:47:25: d7:d8:2e:bc:d6:11:54:62:37:7a:e4:be:16:77:40:37: 2d:c4:a7:2b:78:29:53:a3:49:0c:b7:68:8c:3a:0e:49: dc:53:ee:a0:c8:b8:4c:ac:bc:e1:29:e5:c9:f0:5c:44: ac:72:1e:4e:ef:b0:01:2f:28:6d:fe:53:d0:c9:b8:33: 43:68:1a:d4:99:32:fb:6d:41:3e:a2:8c:5e:7e:12:43: 15:7f:95:e7:9e:53:38:3f:d5:7a:f6:a8:4c:c2:f9:79: 40:e4:7d:f4:e5:49:d1:fa:b0:06:1f:d3:8e:81:f9:74: 60:8f:ab:a1:b1:dd:25:9c:5a:57:93:4d:d2:27:1a:2a: 30:07:24:c7:ea:d3:a0:56:5a:11:a8:d4:70:31:09:d4: 92:f8:48:16:71:29:1e:a8:72:bd:69:84:5f:fb:53:d3: a4:2d:68:3c:ab:31:29:7b:25:fe:c4:1a:2a:df:35:9b: 60:11:ca:4a:70:ed:7f:1a:30:66:df:6a:d0:49:cc:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:b6:1d:1c:9d:08:e9:37:c4:83:20:fd:11:cb:47:68: 11:30:99:c4:ba:fc:b8:f6:60:e0:19:4c:3d:e2:b9:5d: ac:8b:a9:00:91:9c:c3:57:e8:1d:e2:5f:02:78:3c:aa: f9:fa:f2:b0:e4:09:33:22:9d:cf:9d:46:96:6d:51:74: 3c:08:d1:4e:ab:11:c6:fb:7a:10:3c:a3:f3:f9:c9:0c: f4:19:0c:d3:90:ec:23:f1:f7:cc:30:2a:e7:29:2f:fb: 93:f9:fc:2f:4d:8f:cd:bb:64:b1:90:f3:10:77:a9:93: 83:67:ed:06:14:a0:39:68:e4:6d:91:29:fe:7d:2d:21: 21:d4:e5:3b:6c:41:96:6d:b2:6d:8d:09:17:5b:f7:40: 58:c2:e1:a1:cb:59:21:95:6b:fa:07:54:69:2a:ed:7f: a3:02:e9:6a:f4:9e:4c:9f:3f:fa:12:d5:1a:96:fc:87: 64:03:09:5c:54:5e:ab:25:b3:67:2d:07:79:8f:85:3c: ae:bc:06:11:21:8c:c5:f8:99:3c:ed:e7:e4:95:96:ad: 90:46:ec:9f:85:bd:00:16:9d:83:08:1a:2a:5a:78:85: ab:bb:80:fa:f0:1c:aa:5a:30:ff:d2:c0:ec:52:fd:8d: 41:16:dc:d8:a9:22:a6:81:25:6e:0d:08:f5:9d:be:61 Fingerprint (SHA-256): E2:BB:F1:58:A8:EF:7E:B9:C1:FF:08:B4:1D:75:EE:CF:83:77:BB:60:EC:53:0F:74:5E:BA:4E:D1:BB:26:EF:0E Fingerprint (SHA1): D7:1F:FC:CE:5B:41:17:28:62:68:9D:7C:4E:CB:64:F8:DA:36:B5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3535: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191609 (0x433ed679) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:19:36 2025 Not After : Thu Nov 28 11:19:36 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:7f:ae:3c:41:34:df:b6:9c:80:47:51:4c:14:6b:a8: 51:43:c6:56:e1:62:bd:90:c0:e7:f1:d0:06:e9:83:de: 5b:a3:e5:0d:fd:7f:ac:48:ff:bf:bb:9d:fa:9b:d3:35: 9c:fb:b5:56:65:dd:b1:03:c2:47:59:71:95:6f:4a:c6: 06:6b:89:1a:12:89:5a:7f:68:3c:5d:ae:42:d2:43:96: 6b:6d:43:34:1a:1e:d4:60:dc:33:b0:46:59:9c:74:fa: 50:d6:50:f3:72:4c:1c:85:23:9d:0b:7a:89:c7:54:e7: 77:83:f8:fc:95:34:cd:df:74:5e:e3:87:b5:15:17:22: 36:c3:10:32:fc:c4:52:4f:9e:e7:32:c2:a4:c5:db:f8: ea:83:35:d5:cf:52:49:90:8b:c3:e3:92:1e:31:c3:aa: a1:7e:65:ee:39:17:08:4b:46:73:c8:77:e7:8e:1c:3d: b1:5f:16:47:61:ab:78:79:d4:d1:58:8e:c7:a7:25:a2: c9:7b:97:c4:77:06:f6:3e:df:76:31:aa:e1:a0:45:49: d6:58:a7:57:88:c1:ae:82:45:c0:58:3c:98:de:21:2c: 3f:da:29:ce:6e:e1:a5:94:f6:07:38:b5:13:59:39:af: 6a:46:bf:ff:54:d6:eb:46:d1:ee:03:2e:a6:0a:a9:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:9f:a7:db:91:e4:92:88:f7:ca:5e:39:ae:8b:b7:6e: 77:ab:a4:d1:54:68:16:5f:72:a4:2f:4c:92:fe:99:a7: 71:41:91:62:c3:15:91:6b:60:32:b6:4b:86:09:e0:7e: 9a:66:79:75:2f:ce:ca:fd:2f:8d:54:f2:0e:fe:00:f4: 3d:6a:2f:36:51:d4:1d:e4:8d:2a:d9:be:21:39:b3:88: 18:3f:a6:f2:7b:76:69:85:86:40:f0:5a:eb:11:b9:8a: e4:f7:09:55:a1:03:12:a3:60:ea:a1:51:84:71:53:e1: f7:2d:0b:11:43:ea:8a:7e:69:36:63:8c:a4:f8:4e:c3: 59:f4:38:09:0e:23:7f:06:b5:bf:16:80:6d:54:57:41: 3b:11:8a:99:09:a5:a1:f2:ba:7b:86:5a:b0:db:34:b1: 34:93:5d:cd:d8:4b:19:65:bb:b2:e3:1d:15:31:b8:86: bc:50:db:43:08:a4:3e:c6:bc:c6:ca:9b:14:d2:4e:ca: 34:95:ec:e2:89:a8:54:2f:f2:15:00:c0:c3:3b:2b:45: fe:16:3f:f0:5f:1c:5f:f8:79:bd:9a:5a:d0:ed:ca:c2: 31:da:57:9d:1b:bd:08:67:fa:e9:42:e9:3f:46:f8:20: 9e:6a:5e:68:f1:ae:58:f8:7d:b1:af:dc:b5:2d:62:dc Fingerprint (SHA-256): 44:A5:47:0D:40:94:8F:94:EA:72:31:2A:65:F7:E6:F5:9B:D7:BC:74:95:A6:4A:65:29:CE:F6:15:E8:48:28:5F Fingerprint (SHA1): 78:DD:D0:42:77:6E:9C:4D:DE:7E:D1:E0:24:58:18:5F:99:37:CB:90 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3536: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191607 (0x433ed677) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:19:35 2025 Not After : Thu Nov 28 11:19:35 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:78:01:73:35:9c:93:cc:ad:35:32:2f:48:fe:5b:38: b3:39:15:d8:14:c6:46:8d:3c:c3:58:99:c4:25:28:6e: 26:2c:40:76:56:72:96:10:1d:a6:bb:c3:1a:c9:c8:f0: 4a:69:80:46:72:5f:16:bf:5e:e1:9e:d7:48:0f:47:25: d7:d8:2e:bc:d6:11:54:62:37:7a:e4:be:16:77:40:37: 2d:c4:a7:2b:78:29:53:a3:49:0c:b7:68:8c:3a:0e:49: dc:53:ee:a0:c8:b8:4c:ac:bc:e1:29:e5:c9:f0:5c:44: ac:72:1e:4e:ef:b0:01:2f:28:6d:fe:53:d0:c9:b8:33: 43:68:1a:d4:99:32:fb:6d:41:3e:a2:8c:5e:7e:12:43: 15:7f:95:e7:9e:53:38:3f:d5:7a:f6:a8:4c:c2:f9:79: 40:e4:7d:f4:e5:49:d1:fa:b0:06:1f:d3:8e:81:f9:74: 60:8f:ab:a1:b1:dd:25:9c:5a:57:93:4d:d2:27:1a:2a: 30:07:24:c7:ea:d3:a0:56:5a:11:a8:d4:70:31:09:d4: 92:f8:48:16:71:29:1e:a8:72:bd:69:84:5f:fb:53:d3: a4:2d:68:3c:ab:31:29:7b:25:fe:c4:1a:2a:df:35:9b: 60:11:ca:4a:70:ed:7f:1a:30:66:df:6a:d0:49:cc:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:b6:1d:1c:9d:08:e9:37:c4:83:20:fd:11:cb:47:68: 11:30:99:c4:ba:fc:b8:f6:60:e0:19:4c:3d:e2:b9:5d: ac:8b:a9:00:91:9c:c3:57:e8:1d:e2:5f:02:78:3c:aa: f9:fa:f2:b0:e4:09:33:22:9d:cf:9d:46:96:6d:51:74: 3c:08:d1:4e:ab:11:c6:fb:7a:10:3c:a3:f3:f9:c9:0c: f4:19:0c:d3:90:ec:23:f1:f7:cc:30:2a:e7:29:2f:fb: 93:f9:fc:2f:4d:8f:cd:bb:64:b1:90:f3:10:77:a9:93: 83:67:ed:06:14:a0:39:68:e4:6d:91:29:fe:7d:2d:21: 21:d4:e5:3b:6c:41:96:6d:b2:6d:8d:09:17:5b:f7:40: 58:c2:e1:a1:cb:59:21:95:6b:fa:07:54:69:2a:ed:7f: a3:02:e9:6a:f4:9e:4c:9f:3f:fa:12:d5:1a:96:fc:87: 64:03:09:5c:54:5e:ab:25:b3:67:2d:07:79:8f:85:3c: ae:bc:06:11:21:8c:c5:f8:99:3c:ed:e7:e4:95:96:ad: 90:46:ec:9f:85:bd:00:16:9d:83:08:1a:2a:5a:78:85: ab:bb:80:fa:f0:1c:aa:5a:30:ff:d2:c0:ec:52:fd:8d: 41:16:dc:d8:a9:22:a6:81:25:6e:0d:08:f5:9d:be:61 Fingerprint (SHA-256): E2:BB:F1:58:A8:EF:7E:B9:C1:FF:08:B4:1D:75:EE:CF:83:77:BB:60:EC:53:0F:74:5E:BA:4E:D1:BB:26:EF:0E Fingerprint (SHA1): D7:1F:FC:CE:5B:41:17:28:62:68:9D:7C:4E:CB:64:F8:DA:36:B5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3537: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #3538: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191607 (0x433ed677) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:19:35 2025 Not After : Thu Nov 28 11:19:35 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:78:01:73:35:9c:93:cc:ad:35:32:2f:48:fe:5b:38: b3:39:15:d8:14:c6:46:8d:3c:c3:58:99:c4:25:28:6e: 26:2c:40:76:56:72:96:10:1d:a6:bb:c3:1a:c9:c8:f0: 4a:69:80:46:72:5f:16:bf:5e:e1:9e:d7:48:0f:47:25: d7:d8:2e:bc:d6:11:54:62:37:7a:e4:be:16:77:40:37: 2d:c4:a7:2b:78:29:53:a3:49:0c:b7:68:8c:3a:0e:49: dc:53:ee:a0:c8:b8:4c:ac:bc:e1:29:e5:c9:f0:5c:44: ac:72:1e:4e:ef:b0:01:2f:28:6d:fe:53:d0:c9:b8:33: 43:68:1a:d4:99:32:fb:6d:41:3e:a2:8c:5e:7e:12:43: 15:7f:95:e7:9e:53:38:3f:d5:7a:f6:a8:4c:c2:f9:79: 40:e4:7d:f4:e5:49:d1:fa:b0:06:1f:d3:8e:81:f9:74: 60:8f:ab:a1:b1:dd:25:9c:5a:57:93:4d:d2:27:1a:2a: 30:07:24:c7:ea:d3:a0:56:5a:11:a8:d4:70:31:09:d4: 92:f8:48:16:71:29:1e:a8:72:bd:69:84:5f:fb:53:d3: a4:2d:68:3c:ab:31:29:7b:25:fe:c4:1a:2a:df:35:9b: 60:11:ca:4a:70:ed:7f:1a:30:66:df:6a:d0:49:cc:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:b6:1d:1c:9d:08:e9:37:c4:83:20:fd:11:cb:47:68: 11:30:99:c4:ba:fc:b8:f6:60:e0:19:4c:3d:e2:b9:5d: ac:8b:a9:00:91:9c:c3:57:e8:1d:e2:5f:02:78:3c:aa: f9:fa:f2:b0:e4:09:33:22:9d:cf:9d:46:96:6d:51:74: 3c:08:d1:4e:ab:11:c6:fb:7a:10:3c:a3:f3:f9:c9:0c: f4:19:0c:d3:90:ec:23:f1:f7:cc:30:2a:e7:29:2f:fb: 93:f9:fc:2f:4d:8f:cd:bb:64:b1:90:f3:10:77:a9:93: 83:67:ed:06:14:a0:39:68:e4:6d:91:29:fe:7d:2d:21: 21:d4:e5:3b:6c:41:96:6d:b2:6d:8d:09:17:5b:f7:40: 58:c2:e1:a1:cb:59:21:95:6b:fa:07:54:69:2a:ed:7f: a3:02:e9:6a:f4:9e:4c:9f:3f:fa:12:d5:1a:96:fc:87: 64:03:09:5c:54:5e:ab:25:b3:67:2d:07:79:8f:85:3c: ae:bc:06:11:21:8c:c5:f8:99:3c:ed:e7:e4:95:96:ad: 90:46:ec:9f:85:bd:00:16:9d:83:08:1a:2a:5a:78:85: ab:bb:80:fa:f0:1c:aa:5a:30:ff:d2:c0:ec:52:fd:8d: 41:16:dc:d8:a9:22:a6:81:25:6e:0d:08:f5:9d:be:61 Fingerprint (SHA-256): E2:BB:F1:58:A8:EF:7E:B9:C1:FF:08:B4:1D:75:EE:CF:83:77:BB:60:EC:53:0F:74:5E:BA:4E:D1:BB:26:EF:0E Fingerprint (SHA1): D7:1F:FC:CE:5B:41:17:28:62:68:9D:7C:4E:CB:64:F8:DA:36:B5:69 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3539: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191609 (0x433ed679) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:19:36 2025 Not After : Thu Nov 28 11:19:36 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:7f:ae:3c:41:34:df:b6:9c:80:47:51:4c:14:6b:a8: 51:43:c6:56:e1:62:bd:90:c0:e7:f1:d0:06:e9:83:de: 5b:a3:e5:0d:fd:7f:ac:48:ff:bf:bb:9d:fa:9b:d3:35: 9c:fb:b5:56:65:dd:b1:03:c2:47:59:71:95:6f:4a:c6: 06:6b:89:1a:12:89:5a:7f:68:3c:5d:ae:42:d2:43:96: 6b:6d:43:34:1a:1e:d4:60:dc:33:b0:46:59:9c:74:fa: 50:d6:50:f3:72:4c:1c:85:23:9d:0b:7a:89:c7:54:e7: 77:83:f8:fc:95:34:cd:df:74:5e:e3:87:b5:15:17:22: 36:c3:10:32:fc:c4:52:4f:9e:e7:32:c2:a4:c5:db:f8: ea:83:35:d5:cf:52:49:90:8b:c3:e3:92:1e:31:c3:aa: a1:7e:65:ee:39:17:08:4b:46:73:c8:77:e7:8e:1c:3d: b1:5f:16:47:61:ab:78:79:d4:d1:58:8e:c7:a7:25:a2: c9:7b:97:c4:77:06:f6:3e:df:76:31:aa:e1:a0:45:49: d6:58:a7:57:88:c1:ae:82:45:c0:58:3c:98:de:21:2c: 3f:da:29:ce:6e:e1:a5:94:f6:07:38:b5:13:59:39:af: 6a:46:bf:ff:54:d6:eb:46:d1:ee:03:2e:a6:0a:a9:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:9f:a7:db:91:e4:92:88:f7:ca:5e:39:ae:8b:b7:6e: 77:ab:a4:d1:54:68:16:5f:72:a4:2f:4c:92:fe:99:a7: 71:41:91:62:c3:15:91:6b:60:32:b6:4b:86:09:e0:7e: 9a:66:79:75:2f:ce:ca:fd:2f:8d:54:f2:0e:fe:00:f4: 3d:6a:2f:36:51:d4:1d:e4:8d:2a:d9:be:21:39:b3:88: 18:3f:a6:f2:7b:76:69:85:86:40:f0:5a:eb:11:b9:8a: e4:f7:09:55:a1:03:12:a3:60:ea:a1:51:84:71:53:e1: f7:2d:0b:11:43:ea:8a:7e:69:36:63:8c:a4:f8:4e:c3: 59:f4:38:09:0e:23:7f:06:b5:bf:16:80:6d:54:57:41: 3b:11:8a:99:09:a5:a1:f2:ba:7b:86:5a:b0:db:34:b1: 34:93:5d:cd:d8:4b:19:65:bb:b2:e3:1d:15:31:b8:86: bc:50:db:43:08:a4:3e:c6:bc:c6:ca:9b:14:d2:4e:ca: 34:95:ec:e2:89:a8:54:2f:f2:15:00:c0:c3:3b:2b:45: fe:16:3f:f0:5f:1c:5f:f8:79:bd:9a:5a:d0:ed:ca:c2: 31:da:57:9d:1b:bd:08:67:fa:e9:42:e9:3f:46:f8:20: 9e:6a:5e:68:f1:ae:58:f8:7d:b1:af:dc:b5:2d:62:dc Fingerprint (SHA-256): 44:A5:47:0D:40:94:8F:94:EA:72:31:2A:65:F7:E6:F5:9B:D7:BC:74:95:A6:4A:65:29:CE:F6:15:E8:48:28:5F Fingerprint (SHA1): 78:DD:D0:42:77:6E:9C:4D:DE:7E:D1:E0:24:58:18:5F:99:37:CB:90 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3540: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #3541: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #3542: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #3543: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191607 (0x433ed677) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:19:35 2025 Not After : Thu Nov 28 11:19:35 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:78:01:73:35:9c:93:cc:ad:35:32:2f:48:fe:5b:38: b3:39:15:d8:14:c6:46:8d:3c:c3:58:99:c4:25:28:6e: 26:2c:40:76:56:72:96:10:1d:a6:bb:c3:1a:c9:c8:f0: 4a:69:80:46:72:5f:16:bf:5e:e1:9e:d7:48:0f:47:25: d7:d8:2e:bc:d6:11:54:62:37:7a:e4:be:16:77:40:37: 2d:c4:a7:2b:78:29:53:a3:49:0c:b7:68:8c:3a:0e:49: dc:53:ee:a0:c8:b8:4c:ac:bc:e1:29:e5:c9:f0:5c:44: ac:72:1e:4e:ef:b0:01:2f:28:6d:fe:53:d0:c9:b8:33: 43:68:1a:d4:99:32:fb:6d:41:3e:a2:8c:5e:7e:12:43: 15:7f:95:e7:9e:53:38:3f:d5:7a:f6:a8:4c:c2:f9:79: 40:e4:7d:f4:e5:49:d1:fa:b0:06:1f:d3:8e:81:f9:74: 60:8f:ab:a1:b1:dd:25:9c:5a:57:93:4d:d2:27:1a:2a: 30:07:24:c7:ea:d3:a0:56:5a:11:a8:d4:70:31:09:d4: 92:f8:48:16:71:29:1e:a8:72:bd:69:84:5f:fb:53:d3: a4:2d:68:3c:ab:31:29:7b:25:fe:c4:1a:2a:df:35:9b: 60:11:ca:4a:70:ed:7f:1a:30:66:df:6a:d0:49:cc:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:b6:1d:1c:9d:08:e9:37:c4:83:20:fd:11:cb:47:68: 11:30:99:c4:ba:fc:b8:f6:60:e0:19:4c:3d:e2:b9:5d: ac:8b:a9:00:91:9c:c3:57:e8:1d:e2:5f:02:78:3c:aa: f9:fa:f2:b0:e4:09:33:22:9d:cf:9d:46:96:6d:51:74: 3c:08:d1:4e:ab:11:c6:fb:7a:10:3c:a3:f3:f9:c9:0c: f4:19:0c:d3:90:ec:23:f1:f7:cc:30:2a:e7:29:2f:fb: 93:f9:fc:2f:4d:8f:cd:bb:64:b1:90:f3:10:77:a9:93: 83:67:ed:06:14:a0:39:68:e4:6d:91:29:fe:7d:2d:21: 21:d4:e5:3b:6c:41:96:6d:b2:6d:8d:09:17:5b:f7:40: 58:c2:e1:a1:cb:59:21:95:6b:fa:07:54:69:2a:ed:7f: a3:02:e9:6a:f4:9e:4c:9f:3f:fa:12:d5:1a:96:fc:87: 64:03:09:5c:54:5e:ab:25:b3:67:2d:07:79:8f:85:3c: ae:bc:06:11:21:8c:c5:f8:99:3c:ed:e7:e4:95:96:ad: 90:46:ec:9f:85:bd:00:16:9d:83:08:1a:2a:5a:78:85: ab:bb:80:fa:f0:1c:aa:5a:30:ff:d2:c0:ec:52:fd:8d: 41:16:dc:d8:a9:22:a6:81:25:6e:0d:08:f5:9d:be:61 Fingerprint (SHA-256): E2:BB:F1:58:A8:EF:7E:B9:C1:FF:08:B4:1D:75:EE:CF:83:77:BB:60:EC:53:0F:74:5E:BA:4E:D1:BB:26:EF:0E Fingerprint (SHA1): D7:1F:FC:CE:5B:41:17:28:62:68:9D:7C:4E:CB:64:F8:DA:36:B5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3544: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191611 (0x433ed67b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:19:37 2025 Not After : Thu Nov 28 11:19:37 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:00:41:ab:70:39:7d:24:c5:b5:8f:e9:d2:cf:7b:4b: 0d:c8:40:8d:b1:65:fc:d2:43:01:91:6c:e8:6d:4b:7a: c8:cd:30:26:59:ca:48:61:01:65:6c:32:7a:fd:c9:4e: a2:48:6b:ce:79:b9:2f:1a:f6:9a:19:8c:73:6e:ae:04: b3:37:2a:65:87:8e:42:8f:99:e5:5c:91:8e:6c:cb:c1: dc:25:73:74:cd:25:6f:e0:01:a2:8a:ec:bb:3a:8e:55: 5a:3a:6d:ac:a6:82:37:23:cd:0a:5e:b2:b5:3d:6a:3a: f6:45:65:c2:70:83:25:43:32:dc:25:2e:bc:89:59:3d: f5:e5:9f:b9:51:30:c9:0b:7b:ce:14:fc:d5:ee:da:c2: 70:ff:21:77:f6:7d:3a:8c:44:22:7d:dc:13:c4:37:64: b7:bf:5f:b3:57:58:91:78:9e:8d:4e:4c:af:70:23:e2: 88:cf:84:c9:83:0e:cd:57:09:b2:27:e6:14:86:20:d7: d1:0f:9f:7e:90:16:21:a2:b3:2b:15:bc:80:b0:bd:f8: 7c:de:07:30:2c:23:51:5c:0b:c7:f4:59:c0:4a:5c:bb: 99:45:6d:19:47:f9:b4:b6:74:26:a2:85:72:0c:dd:8b: 5d:a1:e3:02:18:8f:2b:9a:af:58:95:2d:58:cf:1f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:dc:f3:7d:4f:90:1d:b2:d5:f2:54:58:30:68:cb:48: b4:58:95:21:78:a0:5f:f0:c5:07:73:39:91:ea:04:bb: c3:9e:67:31:49:ab:14:9d:95:23:e0:2e:7e:07:71:bc: 8a:3a:33:0a:7d:38:1e:ba:c8:45:69:12:11:a2:77:be: aa:ae:7c:be:3d:19:25:6c:bb:c8:d9:3e:a2:cb:37:53: 94:b3:4d:a6:ed:fe:db:cc:f8:db:8d:f9:98:04:e9:bf: 69:ee:2c:78:15:ed:43:05:b4:9a:2c:d5:d1:eb:13:9a: 53:51:b5:eb:ff:7d:77:79:40:c7:9f:2d:2d:ae:b3:18: da:26:9c:63:00:46:d8:d5:46:a6:0a:a2:e1:52:a5:06: 56:9e:78:83:12:d2:e1:21:ed:12:d3:51:01:c0:87:59: 1a:91:fa:d5:00:9b:27:54:39:e3:c9:17:ec:f5:22:bb: 9c:d0:e6:73:c1:f8:18:6e:67:dc:27:7a:d6:df:4a:4b: 3a:a0:52:5e:54:64:08:c2:13:4c:48:6c:a0:b0:1d:96: 7e:75:a5:4b:2f:55:28:a3:63:3e:d0:42:38:10:d8:ca: bb:78:3c:89:a7:22:0a:6a:45:1e:b4:69:eb:b8:b1:8c: ef:51:a5:c6:e8:2c:01:a2:e5:8b:04:99:39:13:bf:eb Fingerprint (SHA-256): 84:35:C3:7A:FA:D5:7F:26:A9:56:4D:D0:D3:8D:09:6B:D9:7C:ED:48:E4:36:AD:35:7F:5F:C0:6E:42:E9:E3:24 Fingerprint (SHA1): CA:A3:CB:5D:08:F1:E1:BB:46:D7:33:CD:DE:96:96:A1:F5:0F:53:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #3545: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191607 (0x433ed677) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:19:35 2025 Not After : Thu Nov 28 11:19:35 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:78:01:73:35:9c:93:cc:ad:35:32:2f:48:fe:5b:38: b3:39:15:d8:14:c6:46:8d:3c:c3:58:99:c4:25:28:6e: 26:2c:40:76:56:72:96:10:1d:a6:bb:c3:1a:c9:c8:f0: 4a:69:80:46:72:5f:16:bf:5e:e1:9e:d7:48:0f:47:25: d7:d8:2e:bc:d6:11:54:62:37:7a:e4:be:16:77:40:37: 2d:c4:a7:2b:78:29:53:a3:49:0c:b7:68:8c:3a:0e:49: dc:53:ee:a0:c8:b8:4c:ac:bc:e1:29:e5:c9:f0:5c:44: ac:72:1e:4e:ef:b0:01:2f:28:6d:fe:53:d0:c9:b8:33: 43:68:1a:d4:99:32:fb:6d:41:3e:a2:8c:5e:7e:12:43: 15:7f:95:e7:9e:53:38:3f:d5:7a:f6:a8:4c:c2:f9:79: 40:e4:7d:f4:e5:49:d1:fa:b0:06:1f:d3:8e:81:f9:74: 60:8f:ab:a1:b1:dd:25:9c:5a:57:93:4d:d2:27:1a:2a: 30:07:24:c7:ea:d3:a0:56:5a:11:a8:d4:70:31:09:d4: 92:f8:48:16:71:29:1e:a8:72:bd:69:84:5f:fb:53:d3: a4:2d:68:3c:ab:31:29:7b:25:fe:c4:1a:2a:df:35:9b: 60:11:ca:4a:70:ed:7f:1a:30:66:df:6a:d0:49:cc:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:b6:1d:1c:9d:08:e9:37:c4:83:20:fd:11:cb:47:68: 11:30:99:c4:ba:fc:b8:f6:60:e0:19:4c:3d:e2:b9:5d: ac:8b:a9:00:91:9c:c3:57:e8:1d:e2:5f:02:78:3c:aa: f9:fa:f2:b0:e4:09:33:22:9d:cf:9d:46:96:6d:51:74: 3c:08:d1:4e:ab:11:c6:fb:7a:10:3c:a3:f3:f9:c9:0c: f4:19:0c:d3:90:ec:23:f1:f7:cc:30:2a:e7:29:2f:fb: 93:f9:fc:2f:4d:8f:cd:bb:64:b1:90:f3:10:77:a9:93: 83:67:ed:06:14:a0:39:68:e4:6d:91:29:fe:7d:2d:21: 21:d4:e5:3b:6c:41:96:6d:b2:6d:8d:09:17:5b:f7:40: 58:c2:e1:a1:cb:59:21:95:6b:fa:07:54:69:2a:ed:7f: a3:02:e9:6a:f4:9e:4c:9f:3f:fa:12:d5:1a:96:fc:87: 64:03:09:5c:54:5e:ab:25:b3:67:2d:07:79:8f:85:3c: ae:bc:06:11:21:8c:c5:f8:99:3c:ed:e7:e4:95:96:ad: 90:46:ec:9f:85:bd:00:16:9d:83:08:1a:2a:5a:78:85: ab:bb:80:fa:f0:1c:aa:5a:30:ff:d2:c0:ec:52:fd:8d: 41:16:dc:d8:a9:22:a6:81:25:6e:0d:08:f5:9d:be:61 Fingerprint (SHA-256): E2:BB:F1:58:A8:EF:7E:B9:C1:FF:08:B4:1D:75:EE:CF:83:77:BB:60:EC:53:0F:74:5E:BA:4E:D1:BB:26:EF:0E Fingerprint (SHA1): D7:1F:FC:CE:5B:41:17:28:62:68:9D:7C:4E:CB:64:F8:DA:36:B5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3546: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #3547: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #3548: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #3549: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #3550: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #3551: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128191612 (0x433ed67c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:19:38 2025 Not After : Thu Nov 28 11:19:38 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:9e:c9:51:a6:21:63:b9:83:82:f9:36:25:80:d9:92: 2d:69:12:e1:f7:bf:0e:9a:70:fb:ae:63:3f:c6:26:c7: 5b:93:0d:94:ba:07:07:e7:0a:39:36:2a:1f:df:9f:23: cb:58:61:8f:6f:69:71:a2:46:a2:21:c1:ff:20:1a:18: 5f:cf:a2:2a:c9:a2:67:7c:4d:a1:dc:f9:7a:c0:23:5b: c5:ad:9c:a3:77:65:61:ba:d1:f4:0e:9c:34:65:4f:67: 31:91:95:90:66:65:ab:22:d9:fb:36:10:01:38:d0:fe: 18:ac:f8:dd:df:4c:46:6e:24:fb:60:6b:da:f0:49:b4: 2d:36:3e:7e:1b:4d:af:43:ca:f1:80:51:16:05:f5:07: de:eb:d4:59:cf:f6:35:94:c4:9f:e2:2f:9b:8a:e9:74: 81:16:96:e9:71:ae:fc:36:a6:e4:65:7d:ba:a4:d9:11: 63:4f:83:f1:8a:ff:7f:3c:6b:98:26:b0:b8:9b:65:2f: c7:45:22:ff:4c:87:27:ce:81:96:de:b3:8a:49:4f:92: 81:f7:6c:3d:12:33:20:97:f2:e0:41:51:f3:a7:85:05: 1e:40:b3:bb:03:27:17:fe:27:d2:cf:a5:6d:00:a7:e0: b7:01:4e:18:45:88:48:15:53:3e:ad:be:66:c0:e4:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:c0:f1:da:fa:d3:cb:db:ee:ad:07:87:b3:b9:6e:6a: 0e:52:3f:41:08:48:10:4d:21:db:37:5f:f1:a3:ac:77: 00:db:1d:ac:18:72:5e:76:ae:0c:cc:73:c3:8f:4a:4c: 41:f8:92:80:dc:ca:a0:e3:0c:1f:99:da:3e:67:3e:c7: fa:9c:72:41:da:9c:72:04:17:25:37:cc:f4:28:c6:37: dc:d8:d2:46:3f:3a:42:38:d9:8c:6e:4c:12:29:f6:bc: 8b:8c:34:c5:f7:bd:47:bc:86:a0:b2:01:77:77:ca:76: ad:6a:d7:3c:27:13:55:41:da:bd:6c:13:8f:30:cd:ae: 41:64:32:1c:1e:56:d6:24:f4:0a:95:97:49:71:9f:f0: 4f:f7:f2:13:c4:e0:5a:97:90:7c:9e:52:49:8d:4d:39: 43:7c:78:1c:0a:ab:8c:ef:f9:12:1c:41:00:2e:53:65: a5:f8:41:c1:a5:5e:ca:9d:d9:50:a5:8c:02:d2:80:99: 7b:eb:60:5a:eb:da:fb:c2:da:cc:4c:cc:f7:58:4c:c4: 62:91:9e:53:5d:37:89:3c:8f:05:c8:50:e4:ff:23:b6: c4:8b:b5:52:4b:cf:d3:91:c9:06:64:07:b9:20:ae:90: ba:88:f7:79:b3:7e:5b:b8:ea:08:0c:a5:ec:2c:a5:4c Fingerprint (SHA-256): 1C:C3:3C:95:9E:07:9A:03:D3:55:2F:16:63:1D:8C:DB:9E:DD:DA:08:E4:3C:D2:A0:90:06:48:EE:6D:18:7E:98 Fingerprint (SHA1): AC:1B:7A:28:D0:A9:49:2E:BE:73:E9:D1:84:5D:90:51:18:1A:FD:58 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #3552: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #3553: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #3554: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #3555: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #3556: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #3557: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3558: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3559: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3560: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3561: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3562: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3563: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3564: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3565: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3566: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3567: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3568: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #3569: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3570: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3571: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3572: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3573: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3574: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3575: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3576: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #3577: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2228491 at Fri Nov 28 19:19:43 CST 2025 kill -USR1 2228491 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2228491 killed at Fri Nov 28 19:19:43 CST 2025 TIMESTAMP chains END: Fri Nov 28 19:19:43 CST 2025 Running tests for ec TIMESTAMP ec BEGIN: Fri Nov 28 19:19:43 CST 2025 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Fri Nov 28 19:19:43 CST 2025 ecperf.sh: ecperf test =============================== Testing NIST-P256 using freebl implementation... ECDH_Derive count: 100 sec: 0.06 op/sec: 1658.76 ECDSA_Sign count: 100 sec: 0.03 op/sec: 3342.36 ECDHE max rate = 1250.28 ECDSA_Verify count: 100 sec: 0.07 op/sec: 1361.88 ... okay. Testing NIST-P384 using freebl implementation... ECDH_Derive count: 100 sec: 0.17 op/sec: 586.87 ECDSA_Sign count: 100 sec: 0.18 op/sec: 553.33 ECDHE max rate = 285.05 ECDSA_Verify count: 100 sec: 0.34 op/sec: 293.03 ... okay. Testing NIST-P521 using freebl implementation... ECDH_Derive count: 100 sec: 0.42 op/sec: 238.60 ECDSA_Sign count: 100 sec: 0.45 op/sec: 224.24 ECDHE max rate = 115.71 ECDSA_Verify count: 100 sec: 0.84 op/sec: 118.93 ... okay. Testing Curve25519 using freebl implementation... ECDH_Derive count: 100 sec: 0.01 op/sec: 7811.89 ... okay. ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Fri Nov 28 19:19:46 CST 2025 Running ec tests for ectest TIMESTAMP ectest BEGIN: Fri Nov 28 19:19:46 CST 2025 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: freebl ec tests - PASSED ectest.sh: #7: pk11 ec tests - PASSED TIMESTAMP ectest END: Fri Nov 28 19:19:47 CST 2025 TIMESTAMP ec END: Fri Nov 28 19:19:47 CST 2025 ec.sh: Testing with PKIX =============================== Running test cycle: PKIX ---------------------- List of tests that will be executed: libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec Running tests for libpkix TIMESTAMP libpkix BEGIN: Fri Nov 28 19:19:47 CST 2025 TIMESTAMP libpkix END: Fri Nov 28 19:19:47 CST 2025 Running tests for cert TIMESTAMP cert BEGIN: Fri Nov 28 19:19:47 CST 2025 rm: cannot remove '/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.PKIX.cert.cache.tar.gz': No such file or directory cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #80: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #82: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #110: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #111: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 70313b184376b4751fff96276ee5006b7f437ae6 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 93ec3ab8c701270912f64730e79e233c8a01bab7 -s CN=orphan -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:f8:ec:0d:76:ec:b7:95:34:ac:e7:55:50:05:ae:76: e9:b9:5a:6a:c7:10:7c:22:5b:da:c4:b4:da:3c:aa:ec: 5c:f9:7a:5a:ae:42:bc:00:f8:78:10:78:0c:50:4a:a4: d8:98:11:38:ae:a9:08:55:7c:7d:76:3f:89:75:08:42: 8a:2f:99:af:a7:d7:7c:8e:b7:28:2d:55:12:83:f9:8d: 83:81:ba:8c:96:bc:b7:6f:1b:09:07:33:59:90:21:ef: bf:f2:df:cf:b0:16:7e:85:6d:0c:1f:47:ce:93:36:c2: 99:18:71:00:c1:cd:6b:12:72:2c:41:e2:8b:3f:33:16: 28:a3:5b:8c:fd:a0:26:4c:ee:77:f4:64:2e:5e:07:75: b5:6a:8d:e0:ba:43:76:42:dc:b6:1c:9d:43:d7:ec:4e: f0:2a:c0:57:81:94:8f:f5:43:4f:a9:d4:8e:af:f0:42: 54:b9:29:ed:ab:f5:49:06:4e:41:e7:79:b2:13:c3:2d: 64:0c:f7:6d:66:b3:dd:ee:b0:27:df:53:a5:d1:3a:f0: bf:4f:45:cc:52:7b:cb:6f:36:5a:26:b7:cf:40:ed:9f: 44:dd:ca:54:39:13:8f:27:b3:dd:1d:48:32:8c:3d:8a: a3:bf:75:dd:67:c0:e3:f5:b5:d2:c7:6f:99:d6:23:4f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:12:84:48:45:0c:10:cc:57:1e:4c:f8:e2:af:c9:1e: 36:c9:64:0f:5f:c0:c2:fb:dd:e4:aa:34:77:5d:92:3e: 2d:a2:90:fa:5e:c5:2a:72:46:31:7c:c2:50:f9:da:00: 63:20:32:09:c0:c4:0a:2b:2a:ad:95:92:c7:5b:39:fd: 26:18:da:7d:91:69:55:d7:7b:cc:8d:f8:3b:22:71:50: 7d:a0:12:98:6d:9c:23:bf:5d:0c:95:52:05:a7:e7:6a: 93:b8:ab:37:32:49:e4:de:16:5d:86:9b:93:f8:27:27: 76:63:25:41:5c:05:96:cd:0f:88:74:52:ec:bc:95:c9: ff:9a:5c:1f:5d:fc:21:ee:23:de:99:80:1b:d9:5b:ec: 80:d2:35:03:9b:7f:83:8d:fb:56:a9:1b:dd:8a:b5:3a: f2:0a:fc:f5:a1:99:2f:e3:c7:58:27:4b:e6:ee:b3:4e: e1:44:e4:fb:6d:74:d4:0e:68:ad:6d:8a:cd:a5:8d:3c: 45:08:41:41:94:6a:84:6a:10:11:7f:07:21:bf:ff:f9: 8d:09:74:a2:0f:06:39:f1:1b:8b:d7:94:00:65:04:74: 04:4e:5f:93:ca:7a:6d:6b:00:d0:57:be:12:34:6c:a5: ac:57:fb:2e:17:5c:3a:80:1f:9b:b1:c3:ed:2e:67:84 Fingerprint (SHA-256): 3F:30:96:9D:4F:CA:60:DE:06:19:B5:F5:BC:D3:CF:9F:C6:CC:D0:34:F3:CF:68:74:D6:AC:5D:1E:7C:9F:F7:9E Fingerprint (SHA1): 20:2B:29:6B:27:7E:53:3D:01:A7:0F:63:23:D7:AA:F3:7E:23:15:E0 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:1d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:25 2025 Not After : Sat Feb 28 11:20:25 2026 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:6f:6f:9c:de:62:98:b7:fe:2b:33:5b:b1:09:f6:5d: 62:40:a0:73:1f:af:fa:27:1a:15:e2:d3:6e:80:06:aa: 25:28:97:09:72:f4:e1:ff:d6:c5:f4:17:d6:18:27:88: 3f:c5:34:d7:a8:8b:b2:74:77:5e:6d:93:12:e3:dd:9e: 96:36:7e:c4:88:eb:23:24:25:e2:b6:11:86:55:28:09: ab:cf:af:10:8a:00:61:b0:ba:17:c2:9c:7b:19:a0:f9: 5a:c9:d8:21:81:72:51:7b:5c:b3:ca:de:0b:90:80:26: ca:80:90:53:f9:2b:6e:e0:78:df:44:e0:38:2e:cd:3e: eb:a5:b8:e0:90:01:ea:9d:84:78:50:20:b0:83:39:d3: 34:9a:65:72:74:6f:0e:0d:94:3a:ee:8f:a2:26:12:33: 41:da:1d:79:a1:91:5b:f5:87:82:fc:98:93:ff:b4:07: a4:c1:6c:db:c5:2e:0a:70:ce:1f:a8:45:d6:9b:fe:fe: 42:8e:b6:18:34:fe:de:cd:4d:9a:5d:98:45:03:e2:64: f6:f0:63:ff:87:bc:8e:25:c1:53:3e:b7:fc:74:98:56: 52:0d:f0:ec:62:df:c5:92:11:bd:1a:3f:a9:2b:21:64: c8:8a:f6:5b:de:da:bc:91:14:48:15:af:06:c7:57:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:a7:d0:d3:ef:2f:38:af:7d:f7:c2:ee:53:24:f7:9a: de:a7:19:4f:12:e9:e1:92:2b:79:d7:e3:ea:fd:78:42: 59:0e:36:11:3b:c5:91:65:37:d1:16:61:ab:f7:28:3e: b8:09:0d:ce:92:84:65:b2:5a:d9:7c:3c:db:9f:82:eb: 31:97:17:28:d6:bd:4e:4e:5a:c6:27:1f:19:46:03:67: 0d:2b:a7:8b:f2:ee:8b:ef:00:88:c9:c4:50:1d:1d:e0: f7:be:91:c8:ff:ff:ad:dc:82:3c:ec:e9:81:45:0a:a8: d2:40:e6:6b:5c:7f:cd:00:5c:7f:ec:84:75:a3:d1:28: ea:f5:46:85:86:d4:18:cd:43:91:5b:54:da:09:46:01: 30:1c:b5:b4:51:ce:e5:56:ff:dd:eb:53:d5:44:de:99: a2:ce:b1:7a:1e:a7:7c:5b:5d:5e:d1:f4:30:a5:96:60: c4:7d:04:4a:72:d8:74:f3:0b:fc:2f:12:7a:b7:52:16: 59:12:65:b0:ee:9d:ff:12:cd:ec:d5:f8:69:5a:f1:dc: 3e:97:ed:71:07:40:5f:28:28:66:0b:e5:a6:53:43:bd: cb:97:dd:c6:11:81:09:26:b5:de:d2:3b:96:e4:da:e7: 52:b1:81:cf:aa:62:5b:d7:9c:e6:f9:7e:e7:c3:0b:41 Fingerprint (SHA-256): 2A:24:1D:AD:FC:A4:6D:96:B9:40:11:04:C3:E2:2C:A6:7B:E6:3A:34:EE:6C:D6:54:42:75:72:3D:CC:51:5A:15 Fingerprint (SHA1): 0F:C0:5A:74:9E:20:BA:60:83:09:5F:5B:7D:7A:F3:85:0F:81:23:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:1e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:26 2025 Not After : Sat Feb 28 11:20:26 2026 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ec:4f:ce:ac:6e:6b:e5:12:6a:92:eb:83:14:ce:c8: ae:5f:20:ba:72:7c:e0:ab:8a:a8:a6:3d:5f:11:84:83: c2:59:04:8b:b7:74:20:dd:ef:d2:3a:91:ca:8c:5d:95: 92:3a:81:8f:99:47:04:5c:75:39:0b:7a:f9:c0:d4:41: f0:3e:a5:75:59:68:e0:00:52:b9:64:c9:81:ab:4e:73: a1:b7:02:7d:98:de:19:54:8f:bc:86:4e:fa:f5:97:d8: f1:4b:3b:02:d5:65:81:f0:93:60:01:aa:87:1e:85:ed: f3:ae:3e:ea:4b:f6:b5:42:97:7e:3b:35:c4:66:64:d2: 10:78:85:d5:9d:4f:ca:03:18:c2:6a:9f:91:2a:35:53: d9:d1:38:ab:19:c4:01:fc:45:3a:68:52:3f:61:fc:4b: ad:60:54:f4:42:96:22:92:fe:7c:4e:96:fd:af:fd:58: 54:a1:51:a4:f0:e3:5e:7a:fc:7e:4c:fb:6e:7c:7f:5e: 8d:61:9f:f6:98:30:4d:e6:da:5e:18:b3:c8:45:e8:03: 9e:9c:b7:40:19:5a:37:2f:52:fd:83:03:86:b4:27:f1: 32:21:f7:ea:58:64:03:ee:5a:bb:cf:cf:a5:1b:12:a1: b2:ae:8f:6a:f8:bd:c4:c1:5c:4e:c5:98:e3:a6:72:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:c7:02:ad:bd:99:10:58:e9:2b:54:6e:b8:ce:d2:3b: 6b:02:ca:7e:2f:1a:54:b7:15:2a:5f:dd:dd:50:57:a4: 2e:b0:2b:33:94:4c:ef:30:cc:95:a6:67:00:da:c6:d6: 53:1f:04:f0:33:ec:9e:71:03:48:68:7e:c1:e3:bf:08: 9b:59:f2:1d:fb:9d:58:5d:0e:6e:88:02:7a:f7:46:a5: ed:36:57:0d:aa:21:b0:fe:66:9c:c4:80:25:c9:58:62: f4:fd:47:5e:c8:6a:ca:17:d8:44:b9:f5:4d:2d:b2:7e: f5:85:35:e6:bc:b8:42:45:a2:93:f0:25:61:97:1f:b2: 9d:ae:bb:45:ed:65:65:7f:0b:39:7f:2f:a0:23:24:a4: 65:91:9c:66:2b:cf:e4:93:3a:b7:47:dd:7e:45:91:82: 45:49:b3:c2:50:aa:91:90:c3:05:50:c9:73:99:2d:b2: 1d:b1:0a:6d:94:e0:81:3d:d9:51:89:32:12:b4:98:a4: 01:5e:14:26:e6:4b:a2:63:d3:9b:46:04:b1:92:66:86: a3:26:22:4c:4f:78:aa:d0:04:9a:31:12:bf:17:4f:06: eb:1d:4e:46:5f:20:90:b4:8f:bf:9f:27:9f:60:9c:67: e2:e2:01:d6:38:a5:22:bf:26:b4:69:d8:6c:6c:f6:b1 Fingerprint (SHA-256): 39:7F:66:5B:D4:6F:1D:4F:3C:7A:56:03:4D:D8:96:4E:10:BF:E0:79:69:AE:C1:23:A0:CA:5C:5A:2D:F9:5F:49 Fingerprint (SHA1): 3B:23:7C:FF:3D:B3:4D:90:79:23:B6:3D:53:8B:69:D0:32:31:B0:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:1f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:27 2025 Not After : Sat Feb 28 11:20:27 2026 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:71:b2:d5:f3:e9:0c:86:13:69:25:3b:89:9e:83:ba: 9a:4c:6b:6e:2b:e9:a4:c3:2d:6b:43:fa:ec:1c:f7:6d: eb:95:32:25:2a:5f:dd:87:b8:bc:14:67:18:c3:23:bd: 0e:7e:10:6a:67:41:3c:22:91:63:6b:3b:d3:d3:05:75: c2:6a:fb:b0:d0:38:56:9e:93:f3:d9:74:f7:b9:b4:57: 2e:20:af:a3:dd:b3:bb:1c:35:25:c0:7f:c8:c9:ca:ba: ce:67:51:13:03:ef:f3:1a:e6:cf:fb:ec:5a:ee:1e:d8: 9f:cb:2f:ff:1e:27:5c:b2:c2:2c:43:b9:73:bb:9b:ba: 06:14:81:3b:d2:89:9b:a8:87:bf:56:a5:78:8d:58:89: ba:bc:9e:86:16:48:29:5f:81:bd:bb:c4:64:c4:75:ab: 44:18:a6:3d:bb:2b:c9:f8:30:66:91:a0:ee:ba:01:7c: f5:e6:56:8d:b6:18:14:ba:4c:97:1f:28:2b:45:18:eb: ac:02:71:c8:c5:cb:c9:7b:c9:fb:da:aa:6b:28:10:4b: 4b:21:df:ea:8f:0e:d9:d7:91:b5:cc:08:9f:8c:ad:42: 6c:1a:48:4f:a2:3c:77:4f:59:8d:33:91:64:7e:7d:95: d0:c5:d8:44:2e:10:18:91:51:63:89:79:a1:f4:94:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:1f:9f:66:9b:4b:74:bb:ea:3e:8d:89:be:6f:8d:9e: 64:15:fd:9c:57:34:ee:56:e4:75:c9:b7:26:bb:61:d0: a0:4b:6c:00:b0:50:6b:7c:9f:50:6a:30:35:6c:8c:22: 42:c9:5b:8b:84:f4:ca:ee:56:e9:b6:27:fa:ee:bd:5d: 4b:22:27:52:44:33:51:60:70:20:70:a4:d4:fc:61:78: be:1b:ea:93:7a:7e:42:16:cf:e1:f3:3f:ec:6e:32:6c: b0:f0:c0:ce:71:d6:84:5b:0a:48:2d:a4:4d:db:a2:6d: 29:e6:53:14:8c:a0:f0:95:92:6e:05:b9:7b:2a:87:e2: d5:86:9e:cb:22:97:98:32:13:2c:67:d8:c4:02:7e:ad: df:8d:8e:6b:32:92:0b:60:1d:62:29:3e:cd:ce:a6:ca: 17:33:ad:42:e7:59:57:5c:68:57:bc:04:c7:28:1d:f8: 8e:c3:03:f0:4e:b0:8a:83:e1:1b:7e:d2:1b:cc:f4:11: 66:4f:b5:2e:69:2e:74:82:05:43:9c:d3:11:05:b8:29: d8:eb:d3:26:ce:fd:37:4c:13:ee:0d:da:f2:6d:72:93: 7a:23:d2:af:87:0b:f5:93:8b:ee:3c:9f:fa:76:f8:91: 62:6a:a8:ab:79:c5:6f:89:0b:d1:cd:c6:79:fe:76:69 Fingerprint (SHA-256): A2:DF:D1:50:25:F1:99:E3:4D:66:41:40:E4:47:B8:D1:3E:FC:40:4E:52:BE:CC:1B:48:8C:F9:C0:6C:A6:0C:FB Fingerprint (SHA1): 98:5E:E4:64:2C:EC:63:B1:CA:B0:13:F5:C7:6A:B3:C2:BC:7F:E8:A9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:20 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:27 2025 Not After : Sat Feb 28 11:20:27 2026 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:bc:31:9d:9c:b4:8a:0d:66:75:84:04:5e:1b:5d:c6: 0d:c9:e7:eb:99:39:17:6a:87:3c:f9:0b:6a:9b:31:c3: 64:ed:25:d5:c8:d3:2b:d4:a0:71:dc:63:4e:22:9e:93: ec:ea:72:2a:e3:53:ca:8f:3c:14:5a:29:2a:3b:ef:a7: c6:3e:6f:21:24:46:80:f8:6a:ac:32:7a:e3:ac:61:55: 51:bf:3a:70:dd:d7:03:0b:f3:cd:58:1d:05:b9:eb:1d: fb:c2:30:99:dd:3f:cd:c6:62:c0:af:2b:60:f7:65:0a: b2:fe:82:95:dd:1d:d4:e7:d8:0c:59:a0:05:5b:2f:e7: 2c:81:71:cf:70:70:c0:51:0a:17:19:6b:1a:e5:e7:62: 9e:3b:72:58:5a:6f:18:3d:66:82:d4:6a:b5:60:9d:e1: 03:2d:ed:fd:d7:6f:7e:52:55:d3:be:1c:d0:79:30:9a: b0:49:ad:da:07:df:b3:01:e4:24:e9:15:16:58:54:2b: 68:d8:bd:50:31:8c:10:c8:91:c2:74:b5:71:10:47:9f: dc:e7:7b:81:39:a1:7e:54:ac:4d:23:48:08:b7:82:56: b3:17:2f:3a:c3:5c:bb:08:b4:91:e1:bb:67:7f:b3:78: 1c:57:3d:2a:6f:c6:3a:20:71:2e:83:ae:11:6b:a7:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:c3:f1:27:f3:0d:65:a6:a6:b2:ba:89:2c:26:87:78: 2b:26:ba:d4:09:00:21:45:25:1f:e3:4b:03:5f:4d:36: d4:26:98:80:49:e4:9b:dd:e6:25:dc:75:b6:67:8f:6d: fb:a9:95:bc:ba:65:c7:ce:3e:5f:6c:39:36:f0:81:dc: e7:ed:22:fd:35:a2:4e:ea:79:1c:4d:8f:70:39:01:19: 9e:84:25:33:0a:a6:8d:0f:ba:9f:96:05:01:01:e5:1e: 92:a5:24:67:04:18:f0:b7:05:31:41:e9:83:12:a4:6c: 86:84:aa:45:50:7e:a6:a9:52:f0:93:f6:3d:c8:0c:65: 16:94:ce:87:5a:66:9f:3c:f4:ef:1e:5d:46:71:1c:67: 58:20:9c:e6:b9:62:24:f2:cb:d4:71:e1:6d:ae:eb:77: 49:7d:35:e3:b0:da:8a:e6:77:8a:fb:29:b4:9f:fa:77: f4:b7:06:71:28:56:aa:ba:6d:f8:df:5d:f6:3b:c5:40: c6:42:8b:d1:a3:ee:4f:1c:df:4d:46:07:b9:25:2d:df: 2a:40:15:08:0c:e8:f6:76:78:38:78:59:b8:92:b9:77: 8e:cf:fc:67:88:94:9d:7b:d2:db:1a:f8:12:72:f3:6c: 63:44:97:b6:db:c4:15:2a:4b:1e:e6:87:c9:cb:95:db Fingerprint (SHA-256): E6:00:F6:D5:94:F9:5F:CB:DF:9A:20:72:51:EC:A3:5D:29:1C:AB:F3:50:A7:B2:FC:18:B4:49:77:DD:F4:FD:9D Fingerprint (SHA1): BE:9C:46:A9:F7:84:AB:3D:85:74:96:B9:B1:BD:E8:DB:D6:27:87:94 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:21 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:28 2025 Not After : Sat Feb 28 11:20:28 2026 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:97:f5:9d:45:e4:6d:a2:f3:dc:ac:ff:78:ff:63:62: bb:5e:83:c9:7d:41:73:5a:e4:a2:bb:30:6a:97:ae:aa: 7c:69:bf:29:82:71:85:d1:36:be:1e:d6:d1:be:f1:44: 91:2c:07:05:3a:bc:35:5f:a6:3c:ba:03:85:c3:60:d2: 30:23:c3:80:34:73:6c:81:0c:03:07:e6:2f:b2:3a:b4: 38:06:37:f9:5c:b9:19:50:ec:8f:f1:01:66:9c:ae:e5: 3f:c0:cf:18:9d:f8:33:0e:c5:d3:63:c8:d9:3f:d1:f5: cd:24:7d:76:35:fe:03:08:cb:2f:09:90:ba:c5:a9:aa: d4:23:20:66:55:6e:02:4f:cb:7f:3d:82:83:f7:30:53: 18:fe:b4:97:7e:fe:2a:50:3f:42:ff:01:df:cf:7d:76: 9c:00:a9:40:45:bb:29:92:c7:3f:b5:14:b8:87:97:50: e9:02:67:0b:3b:88:69:d3:f6:62:c2:1f:62:ff:e4:70: 43:88:92:d3:8e:ea:89:28:7d:57:3b:0d:3d:ea:95:cf: 5b:b0:f5:0d:a6:bb:65:ae:f8:b1:04:01:b7:c2:0f:80: 71:46:81:af:61:32:e9:ed:49:52:1b:1c:66:6e:f9:0d: c5:67:24:29:93:a4:48:19:e1:31:e3:19:9e:cd:63:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:e6:09:52:4c:47:af:83:6c:eb:57:1f:c4:82:96:09: 57:45:e6:3d:3f:c1:18:47:d6:a2:7e:be:46:48:09:59: 55:c5:3e:1a:0b:9f:e7:a2:a0:7c:13:9b:0f:e5:70:54: e9:8b:76:77:9b:d9:a2:8f:ad:b5:10:eb:15:1e:06:9d: ca:b8:bf:5a:35:51:84:34:71:bb:f9:0e:1c:c8:87:8a: bc:10:d5:a4:e7:30:d5:bd:b9:d0:39:57:a8:d1:f0:7f: d7:37:3d:80:1e:40:4f:1f:83:0a:7e:36:5c:bd:02:54: 25:13:28:93:22:a4:90:a3:1b:57:73:0a:dc:11:41:af: 87:5f:f2:a4:7c:ba:fa:01:a1:df:6b:fc:8a:de:ae:24: 8d:f2:ff:6c:5d:09:fc:e5:ab:ff:e1:bb:dc:da:ca:c4: 97:e3:15:92:52:8f:ca:e9:5e:61:40:e2:60:75:64:d2: 88:18:3d:07:58:a7:8c:f7:4b:5f:28:50:f8:1d:40:ee: 0f:0b:12:91:58:7c:73:b6:cc:f8:3e:49:30:5f:46:47: d8:50:dc:04:52:59:b1:ab:fc:80:6e:0c:d3:84:2a:2e: 06:2c:4b:e3:8a:b4:d5:1f:26:37:95:28:c8:9d:e0:d7: dd:99:21:83:ab:56:bc:29:d9:b0:20:75:66:bc:9f:53 Fingerprint (SHA-256): BC:82:93:C9:92:45:6E:0E:EB:18:2B:FD:FE:E8:65:E9:DC:40:F5:8A:68:E2:4E:01:62:B8:71:A2:60:C2:D0:17 Fingerprint (SHA1): A8:AC:08:B8:D5:0B:D4:BC:4E:FF:3C:BA:1E:54:E5:37:56:8F:5E:CD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:28 2025 Not After : Sat Feb 28 11:20:28 2026 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:db:c0:5e:98:5c:1f:9b:7e:d4:8d:e2:bc:cf:9e:23: 82:5e:e3:3a:57:3c:40:4c:15:d2:5c:c9:e3:97:00:4b: 31:b8:a1:64:ff:42:19:81:45:d8:c2:8f:cf:0a:5f:74: 74:77:d1:79:42:5b:da:94:36:f3:32:57:9a:c8:47:19: 8c:9e:e7:a8:7c:40:f2:13:5b:85:42:2f:4d:c8:fb:7f: 1d:57:67:7a:4f:23:26:96:1f:a5:0a:a1:82:91:e6:40: c1:6f:ff:af:3f:01:66:1d:82:00:bd:af:59:5c:03:72: e2:16:18:7c:90:fe:d4:5f:9c:09:bf:fa:5e:4f:49:fd: 53:6f:12:3f:71:dd:09:b4:68:ad:a3:dd:5e:5d:67:ee: 60:86:e3:ef:34:31:df:92:fe:ca:56:69:1d:29:a7:cc: 0e:3e:a4:5d:41:d5:12:6d:89:e1:0c:65:58:7e:f0:f9: 50:15:07:ed:22:24:6e:7f:01:d0:50:6e:d2:24:8f:ef: c3:4f:3a:fc:12:30:66:d7:d4:32:ce:e2:89:f1:29:b7: 04:02:87:66:5b:d4:59:bb:27:ce:45:db:f0:c1:73:c0: 67:9b:94:b5:47:69:c6:9d:bd:8c:12:30:73:81:af:92: 5d:1a:0c:eb:84:18:60:0a:72:f4:94:fb:59:b8:d7:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:c0:05:aa:38:b8:e2:c6:ef:c1:c2:01:f1:06:7e:33: 3d:4e:d8:88:5a:4e:55:ba:5b:af:c4:46:7f:67:06:15: db:41:b6:6c:f4:60:40:5c:7e:13:e0:61:e0:32:e1:72: da:cb:21:1e:5b:11:d7:91:76:b1:0f:9c:46:f3:23:44: 77:a6:f0:6c:0c:73:39:b3:f1:47:26:a9:1e:9f:d0:94: 59:d1:9d:9c:ac:1c:a4:ac:2a:2c:b0:9b:bf:ab:0d:43: af:61:fc:e0:5e:5f:fc:fa:39:66:f4:76:bc:72:02:11: 89:80:ef:bb:3b:9b:16:b3:84:39:cb:ed:19:8f:9f:37: e4:3e:d3:44:8b:0f:cb:ec:34:7a:09:e4:c4:c6:f6:92: 9d:40:cb:2e:94:07:a1:60:94:1b:7d:c1:44:f1:e1:8f: 83:d5:97:fd:62:86:7d:71:fa:10:26:3e:28:64:9f:0f: 03:5d:cd:db:ab:40:02:f3:27:5a:0a:5d:29:df:c9:d9: a2:18:9e:c7:6c:38:fe:aa:e7:9f:ed:41:bc:e9:bf:fd: 54:e7:89:67:84:42:17:ae:37:de:79:2c:6b:41:9d:a6: 56:25:67:cb:0f:1b:a7:69:7c:2d:29:f5:5c:29:78:4e: 29:30:fc:d2:6b:91:a7:b4:66:49:21:e1:17:e6:a2:82 Fingerprint (SHA-256): 13:10:D8:C5:E4:A7:30:2D:04:9B:27:13:2A:0B:E9:C8:63:14:62:51:35:27:48:8C:CE:EB:9B:F7:0E:78:A4:00 Fingerprint (SHA1): 29:14:13:05:4D:62:33:72:91:38:23:D6:73:AF:A6:34:F5:5F:10:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:23 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:29 2025 Not After : Sat Feb 28 11:20:29 2026 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:0a:e9:16:20:71:4d:89:72:e6:b4:60:45:4f:fd:96: 3b:72:02:8c:6e:c7:7a:fb:09:c6:9d:07:3c:aa:42:86: 95:8f:81:c6:83:87:6d:05:b9:67:d7:0e:3b:63:43:2b: 85:92:a4:7b:d6:34:fb:c7:47:49:a1:1c:f8:fc:e3:a0: dd:17:bb:28:5e:a0:4e:45:e1:ff:1e:51:48:e2:7c:0f: 8d:b3:e8:2b:2a:71:5e:11:d9:b1:22:b4:f1:c8:51:9c: 09:3c:41:5b:e7:5a:cc:a4:4d:7d:1b:a2:82:2c:23:d8: 0e:53:d9:da:9b:a6:7b:fa:9c:51:12:91:97:01:4d:9a: fd:34:6c:e6:6f:ff:63:4d:81:4f:19:d3:40:93:ad:fb: 88:41:12:3e:40:b4:d3:52:1f:1b:93:dc:cc:bf:b3:27: 53:34:79:17:e3:7a:55:a0:c4:2e:0b:ed:e9:02:a2:21: c4:f6:bb:7e:ba:ea:cb:d3:02:13:06:59:51:ef:dc:c2: 4f:c7:90:55:bc:9f:6a:1c:4b:38:c1:01:fc:e1:f3:2b: 2b:df:77:7b:05:62:5f:a4:cc:ed:91:2e:4d:08:4d:f4: c2:c3:04:8c:bb:ee:13:f6:9b:66:c4:05:22:9a:9d:5d: 75:f6:db:13:29:ba:5b:60:68:22:88:dc:15:60:86:71 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:7b:97:fb:34:cf:9d:15:32:86:d4:21:54:0c:44:d4: 71:62:ab:f9:9d:5d:5f:64:b6:ef:ec:bb:60:e9:dd:90: ed:ae:7b:4a:b2:58:83:7b:c5:4b:08:95:e8:d5:65:6d: bc:f2:19:79:87:67:fc:54:34:c3:e3:47:10:6c:af:6d: 38:98:d3:30:2d:ad:ff:a4:f6:99:4c:e4:d1:25:ae:32: 05:b6:4e:a3:f0:b0:2c:9d:a9:03:44:be:7b:11:02:cf: a7:40:dd:ae:d2:07:27:d9:92:29:fd:6e:4f:1a:c2:2f: b9:aa:34:d7:aa:08:40:59:58:19:a8:a5:7b:b1:fc:6d: 8a:69:7e:e0:ba:ae:a1:92:81:63:3f:dc:bb:4b:6e:14: f7:22:26:ba:9c:1c:b6:a8:4c:91:1d:29:66:cd:e9:6f: c4:a9:82:8e:1c:44:86:c8:f4:8f:0d:bb:66:6d:99:28: 29:ec:af:be:d7:c2:d5:1c:25:0a:e9:0f:b2:78:00:ac: 1f:39:3d:e1:6d:cd:e7:cb:df:51:31:33:de:12:0e:08: d2:eb:75:5c:a0:82:e2:31:2d:d4:b7:fd:d8:d1:ea:03: e4:60:cd:90:05:6d:96:a6:c2:67:8e:7e:0e:65:c2:6a: ce:1b:be:4a:01:cd:90:16:38:55:3b:9c:fa:34:79:f9 Fingerprint (SHA-256): 5D:7B:8B:C0:54:A0:1B:79:BF:65:A2:F7:B8:87:18:D0:DF:BF:8D:CA:DD:F5:CF:E2:85:08:DA:AA:02:5A:BD:0E Fingerprint (SHA1): 8E:3F:4D:86:A2:FB:87:77:C0:13:AB:88:55:A7:9A:84:A6:95:78:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:25 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:30 2025 Not After : Sat Feb 28 11:20:30 2026 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:0d:6c:1a:73:ba:1c:d7:8d:5f:69:5d:b1:8f:93:7d: a9:ec:55:68:54:91:df:bb:83:77:bd:10:00:39:28:fc: 17:47:48:8e:bb:32:34:f6:15:72:b2:b1:86:03:dd:7c: fc:c1:f4:f8:19:72:05:c1:c8:69:af:08:e4:4e:0f:77: 94:7d:bf:6b:0f:51:af:55:86:dc:b0:ad:ba:4e:0f:13: 99:41:8b:a4:b0:a6:ca:5e:40:10:fb:78:46:3f:93:3f: 93:ae:10:74:3f:51:11:c2:13:1f:0c:c1:9c:29:41:6f: 4a:ba:75:1d:ff:bc:61:81:03:7c:21:df:9d:f9:40:17: bf:34:4b:fa:88:40:8c:e1:61:c7:aa:4e:a4:31:d7:b5: 9c:43:7a:90:46:b4:77:92:d3:e9:d0:f6:5a:82:05:95: 81:1f:96:31:f1:6a:87:15:d1:14:7b:4b:34:83:5e:32: 4f:78:ef:2a:e0:60:53:f2:46:92:2d:02:f2:e0:c4:d5: de:c0:79:3d:a5:ca:ee:c3:a0:f6:b4:b4:3e:51:2b:b5: 15:42:c8:7c:0d:cf:af:8e:40:2a:d3:ba:ba:7f:45:07: 55:76:5f:f7:f1:13:96:a3:b5:d9:0d:eb:6b:74:f4:2e: cd:70:9a:71:3e:24:97:00:06:28:ab:01:b9:50:c7:51 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:b7:f8:e2:d0:2a:ec:a6:d1:07:eb:c0:40:97:9b:f2: f7:cf:af:3d:ed:e4:90:83:78:c9:f3:6e:4e:b1:ec:c3: e9:c7:9d:ac:34:9a:22:3e:3f:0a:44:99:c0:e4:2a:a2: 8d:3a:59:78:ea:f8:31:a0:d7:52:b0:fe:b4:fe:34:ca: 3b:cb:83:3b:bc:a4:08:94:52:bb:47:da:26:90:aa:45: cc:ca:33:a9:49:c4:f3:90:65:c4:4f:17:f3:d2:c4:65: 0a:79:45:f6:8d:2b:05:93:f9:ec:4f:d8:9b:34:97:73: 98:bf:53:38:b3:b7:1f:6d:8f:be:6f:1d:5d:eb:14:1a: c1:8d:7f:87:01:7b:77:d6:0c:ac:4c:55:44:d3:06:bf: c9:28:8a:c5:84:7f:fd:9c:c1:3f:8b:74:1b:76:3c:6e: 7f:91:53:f8:cb:f0:a7:36:50:de:ee:02:1b:5c:21:9e: d8:db:1a:e5:97:63:fd:35:09:94:29:d5:67:12:49:8e: 36:77:f8:d3:91:0f:3e:00:f3:e0:74:84:d5:12:cc:a2: fc:79:59:c3:9a:cb:17:00:a4:42:ee:3f:01:59:15:92: a3:88:c5:7c:15:4d:5c:b4:fa:fa:5c:ea:a1:a7:40:91: 66:5e:d6:f1:d8:2a:dd:ec:3f:20:35:b7:05:9d:8c:87 Fingerprint (SHA-256): 9A:13:5A:A1:82:93:BA:9E:06:F3:C3:DD:AA:81:CA:3C:80:D2:DF:AF:F5:EC:9D:F4:40:5B:01:99:B3:E9:63:DC Fingerprint (SHA1): C2:6C:51:F3:A7:DD:28:6A:80:55:01:CA:3D:BF:40:C3:96:1D:B0:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:26 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:30 2025 Not After : Sat Feb 28 11:20:30 2026 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:23:1f:21:d6:74:b4:72:01:f1:f8:30:51:b8:d7:77: f1:03:9f:87:ba:b6:50:d4:7c:31:6f:17:ca:fc:eb:12: 84:65:20:49:43:11:38:a3:bc:63:22:30:3c:ab:e0:c1: ca:98:94:80:b3:86:92:65:cc:2e:99:f5:98:db:2a:73: 37:26:42:54:11:ae:61:16:15:2b:f9:c3:e6:a3:2a:24: 10:f2:66:55:3d:b7:3d:df:c2:82:df:80:07:eb:2a:71: fb:20:69:1b:b5:7e:45:82:f9:37:5e:0d:9b:c1:2d:96: a7:1a:74:7a:e5:65:cd:64:34:3c:9a:1c:2d:a3:89:cd: 79:b3:8b:03:c1:7f:3f:dc:c7:7c:cb:88:f8:6b:4d:21: 07:22:57:45:2e:b7:a9:d1:5c:00:33:cb:e7:28:a0:00: a4:76:5b:36:4b:09:69:62:cc:c8:d0:85:09:4f:22:5f: 87:fa:8e:1c:bf:d6:75:b5:8c:15:58:82:61:3c:3f:8f: 52:be:cb:64:a2:e2:c6:c4:3e:97:8d:e2:d3:fb:2d:7e: 5f:1f:48:97:86:78:5f:86:08:da:67:a6:d8:36:92:f1: 7e:95:56:c5:9e:0b:3b:5d:ef:af:69:fe:69:fa:74:7f: 86:87:5f:b6:d2:33:16:5a:97:02:b7:d9:af:e4:c2:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:34:0e:2f:35:fa:ea:e5:f7:4f:8e:b7:71:dc:64:3a: c4:00:08:74:70:d2:67:b4:74:e8:f9:65:bd:a7:ce:5f: 63:f3:ed:e1:c4:cf:12:23:9b:2d:de:19:65:a2:1e:4b: c0:c6:c0:a0:81:e4:21:48:6e:4a:db:85:af:4e:16:cb: 54:d5:c1:b6:3a:9b:78:14:9b:99:a6:7c:62:49:dc:b2: fd:82:6b:04:88:9c:db:7c:95:d8:d4:89:43:08:4b:93: ef:ad:82:d4:b4:42:99:9f:bf:05:43:e1:b1:95:4e:da: fa:37:d2:26:ef:b9:c2:f7:44:f4:19:61:74:95:b2:c0: af:b6:79:8f:94:37:2b:6b:aa:70:22:2e:36:d6:8d:07: 8e:fe:0c:2f:73:c4:15:33:fb:62:ea:18:26:b6:87:e8: 67:2d:f6:0e:8e:3a:9e:49:42:6e:52:46:7c:c7:8a:20: 8d:94:ce:96:0e:37:83:38:d7:4a:68:03:41:cd:b8:ea: 18:61:a6:21:04:3f:66:58:b1:b9:b9:8a:64:ce:f5:9f: d6:55:0e:cf:6d:bd:09:39:dd:01:5b:d7:b2:54:0e:8f: 43:4e:96:8f:79:1e:cd:2e:c2:96:a1:f0:78:d8:9c:63: 07:da:7a:38:23:60:c3:64:09:16:b7:58:34:6c:94:9b Fingerprint (SHA-256): 85:27:9A:17:A4:06:6F:5B:DE:FB:53:5C:C1:5A:16:D4:1F:1D:6B:01:0E:2B:93:97:0C:56:CA:C5:36:CE:90:74 Fingerprint (SHA1): F3:1D:31:C1:BA:2C:7A:5A:0B:6E:18:F9:49:5F:B8:E5:03:F9:AB:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:27 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:31 2025 Not After : Sat Feb 28 11:20:31 2026 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:36:37:37:64:5b:61:26:35:40:4a:1a:fb:3b:71:a0: 2e:3c:2d:4e:58:ef:ef:55:8f:a6:37:28:01:bb:dc:5f: d9:ed:a0:1f:c4:e9:04:ce:56:aa:81:c4:80:7f:ac:82: 18:ef:db:5f:aa:60:a8:c0:8b:d2:64:7a:2a:82:ce:e1: 21:f6:84:e1:10:c0:13:3e:d2:24:9b:64:be:02:2e:09: d8:93:80:59:28:b1:b1:7e:b6:bd:39:2e:d9:b6:ce:9c: f8:7e:28:42:e4:86:67:55:bb:0a:23:39:d9:a2:02:42: 94:1a:32:07:23:ed:6e:b0:3d:71:f6:6a:5d:59:57:b4: 91:64:ba:53:07:0d:71:8a:f9:84:17:5c:8e:50:ae:d0: 9d:6a:b5:9e:9f:88:9f:a2:12:54:29:9a:9e:25:2d:4f: c1:99:12:fa:f4:86:7d:52:3f:e2:f9:1d:17:76:bd:55: 08:7b:21:49:e3:83:7f:2c:0b:1d:eb:18:fc:8e:0a:cc: d3:4e:1a:b5:8a:1a:4b:1d:35:3c:32:5e:66:05:cf:9c: d3:ae:4f:ca:41:35:1c:ba:e1:cd:7f:d3:b8:35:55:30: a6:c7:7a:4a:cf:40:0f:d2:42:74:dd:fc:6b:52:e6:5b: 96:dc:1f:df:d7:0a:fc:ef:10:20:77:96:cc:c4:e7:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:72:cd:42:b9:54:be:fc:07:38:87:d8:06:6c:11:75: 3b:16:6d:d5:eb:71:87:52:8e:d1:cd:9e:1e:20:88:77: f4:89:92:ef:9c:dc:cf:99:a7:55:b7:dd:55:a9:e6:03: 3b:d0:fc:3e:7a:8f:1e:b5:d5:dd:a7:3d:f0:6f:87:19: 4c:ec:4f:cc:b3:d5:a7:0e:94:65:42:50:a3:21:92:ee: 14:af:f5:49:5f:f3:48:3f:5f:89:3f:52:06:2b:81:35: 31:0e:5f:e3:23:8b:95:0d:6b:f5:0b:38:90:d5:89:c3: 09:b0:73:15:92:53:d3:e9:a4:a6:ef:fd:be:d9:02:89: 3e:6a:7e:58:2a:ec:4b:7a:9c:ab:21:1b:c0:e4:96:7f: 1b:29:5b:9e:0f:86:13:17:2d:67:9f:fe:cc:b0:d8:04: b8:29:7b:c4:dc:35:dd:c9:a8:e9:0b:80:04:97:cf:32: f1:3d:e7:c4:73:c6:99:25:6a:c8:22:c6:12:1a:3d:c4: 9b:9f:ab:2e:df:19:f1:fb:da:34:46:3d:af:b4:f0:1a: c9:c0:91:ef:85:10:38:bd:55:4d:69:3e:e6:c2:cc:3e: 6a:de:47:ab:cf:97:66:29:f2:d6:62:17:34:4f:e0:fc: 22:c1:5d:36:63:21:b7:a4:5c:6a:25:67:d9:90:04:40 Fingerprint (SHA-256): 7B:BA:D6:90:2B:E5:79:26:32:FD:9B:A4:5D:C6:43:82:21:26:AD:27:C0:3E:B9:2B:04:27:AD:21:8A:4C:E0:43 Fingerprint (SHA1): 24:F0:B1:4C:85:F3:10:EA:3A:EA:BA:E3:63:E0:E3:2C:B6:3D:71:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:28 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:20:31 2025 Not After : Sat Feb 28 11:20:31 2026 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:6c:44:53:5a:57:2c:58:9a:4d:44:f2:c0:ff:f4:b8: ba:fe:67:1b:de:53:d6:32:0c:ec:2a:14:61:c7:b1:c7: a5:60:d6:10:2f:ec:24:6c:d2:e6:96:4c:3f:ce:c1:3b: a7:75:04:f8:fe:0a:3d:f8:dd:08:ea:8f:43:9f:83:02: 32:31:7a:21:00:55:51:2b:6a:13:55:25:2d:a3:39:cc: 06:e2:e9:f6:2a:a4:d9:c1:64:51:3a:f1:c9:17:d5:6c: 93:7b:1d:42:5e:a0:2c:8e:76:a9:17:e4:aa:e8:c5:f8: e0:e1:36:58:d9:eb:51:58:b3:a4:cc:d2:d9:6b:d7:39: 05:27:b9:bf:96:29:f1:6e:32:74:bb:a9:07:dc:ca:9b: ea:c5:f6:ab:cc:51:69:f2:e6:6e:27:08:63:fc:20:1a: 44:81:85:7c:16:9d:ac:9e:d6:93:14:09:ca:df:af:2d: 46:81:c7:59:94:19:28:7e:83:76:a5:5f:78:21:b3:2f: 21:34:aa:a1:21:3c:e7:ca:ae:71:56:69:b8:db:20:b5: e4:be:f7:d1:22:c8:f9:74:6d:9c:43:35:a7:3c:b1:5b: 88:ea:ea:b5:a0:5d:14:d2:06:67:84:0d:f2:15:cb:05: a2:a1:01:87:ce:f8:8a:e7:b0:00:4b:6c:91:c0:05:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:34:16:fd:41:ac:31:db:ea:50:6d:28:e4:d5:f8:f8: 9c:cc:e0:4d:4b:d5:f3:de:b6:49:c5:79:f4:bd:10:6d: 6f:bd:1c:d7:27:44:51:ff:2b:a6:00:94:64:7f:8c:89: 68:02:d4:31:ac:38:e8:8e:84:21:39:d8:18:2f:32:38: 36:dc:6c:1e:2a:32:b4:c3:bd:ab:70:e1:a4:5d:bb:6b: a9:67:d8:ec:74:be:4f:76:76:75:64:05:72:f8:73:f0: 87:f4:be:f3:dc:99:f9:47:59:5f:fc:28:94:14:ae:ea: a4:21:16:8a:d1:15:74:47:df:cb:02:23:98:93:ae:33: e9:00:8e:3e:f7:18:e1:b5:1d:c7:26:fd:70:cc:2c:49: b9:bb:36:96:c7:f4:1b:4a:5c:2c:b6:59:d7:14:ff:95: 06:bf:95:a9:4a:37:df:99:f6:06:62:06:a6:17:39:ee: 3e:18:5e:be:39:c3:15:67:d4:a7:3a:0d:36:1d:c8:5b: 47:f3:89:0f:fc:a4:fb:ce:e4:28:89:5b:f2:f5:9b:b9: d4:bc:40:4b:c4:43:1c:ee:3f:a2:5f:b5:b8:5c:d1:91: 47:cd:0d:62:69:a2:45:81:ff:e9:1a:e7:e5:e8:63:eb: 68:e7:bd:6c:d6:45:84:7f:e3:b7:71:24:a3:da:6a:80 Fingerprint (SHA-256): F6:3E:9D:A5:85:BC:4D:23:A0:EB:B4:29:AE:15:3D:69:CA:37:94:F4:A3:C5:60:21:FF:F9:73:E5:81:89:06:2B Fingerprint (SHA1): 7F:FE:F2:A9:F7:F0:9A:86:84:C8:31:D3:15:70:82:C8:5F:00:90:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:2b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Nov 28 11:20:33 2025 Not After : Sat Feb 28 11:20:33 2026 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5d:26:43:ea:3a:27:ef:6a:1d:7b:b8:74:cf:84:33: 25:9b:2f:ac:4f:74:3d:31:d5:2f:20:2e:06:13:01:4c: 06:ae:ea:92:a7:b3:2e:e5:7a:5d:65:2f:06:fb:c0:69: 9a:69:ad:21:b2:76:58:5b:c2:59:fe:bc:e7:25:8b:a5: 7d:82:62:75:87:3e:93:74:ef:3b:ab:04:4e:19:ea:53: 46:e4:45:b9:73:bc:26:01:23:82:af:bb:84:33:8e:88: 92:28:16:13:82:a8:8a:c8:45:ef:6e:13:4a:49:7e:9b: c9:7d:f3:7c:55:14:d4:8e:29:88:2e:ef:fc:4e:ce:4a: 5b:4d:4a:90:0f:e6:67:04:5f:43:42:5c:c9:82:f5:61: 6d:ea:8b:a4:34:5b:9b:83:e0:e1:21:83:67:a5:19:7b: 91:97:8a:ea:b3:22:29:36:01:d9:60:72:94:4d:2d:de: 03:b3:99:34:56:d8:23:c5:f9:6f:8c:86:3c:b0:ae:72: d5:c0:69:fb:96:8a:d7:4b:32:15:7d:72:f5:5f:6b:f3: d7:74:e2:f3:51:91:9b:25:7a:6e:92:96:ef:4a:f7:a2: 3e:47:9c:4b:61:41:7f:be:fc:c7:c1:0c:6f:36:49:bb: e4:96:51:98:5d:90:c3:7e:5a:08:c5:0e:5b:8f:aa:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:23:0e:61:73:ab:ea:2f:4b:7e:1a:79:6f:4c:5a:90: a2:13:43:96:e3:6f:98:97:06:5b:d1:97:a8:7f:78:2a: 5d:9b:d5:7a:f5:85:6d:2b:c1:a2:f4:39:ca:7b:aa:da: 15:93:85:fe:b3:47:f9:c8:24:68:43:db:5d:e5:23:96: 08:05:bc:64:c1:ce:a8:0c:ed:5c:b0:98:6c:72:97:b9: 52:e8:59:b8:55:38:6e:07:f2:ba:95:a5:3c:e1:8f:53: 14:7b:a1:91:07:60:3f:42:de:84:0b:17:80:d1:1f:cf: 05:17:9d:0f:f1:60:67:a6:c3:30:8c:5c:3e:de:2c:2a: 04:47:04:b7:e7:70:3f:a6:77:e7:ac:e6:e2:68:86:a0: 8e:88:5c:2c:9d:da:b4:10:c7:bc:ba:a9:a5:24:ab:9d: e1:85:70:47:69:3b:65:d0:b5:04:29:dc:ee:a0:b0:b5: 3d:d5:eb:47:9c:bc:ce:4e:93:4f:83:9e:14:7d:aa:ee: e6:06:61:1b:93:65:5e:e3:67:04:9e:30:93:2e:80:c6: e0:e4:8c:12:fe:92:33:4e:fa:4e:16:6e:33:26:19:8b: db:85:84:1f:40:5c:7f:0c:9c:d9:f7:77:4c:53:10:7c: c1:4f:1d:2d:72:16:c6:ea:ac:76:20:bc:ca:8e:9c:fd Fingerprint (SHA-256): F5:27:0C:E1:22:EE:D3:C4:CB:DC:BD:D7:01:02:97:2D:41:3A:2C:3D:65:C0:9E:FB:6F:54:E0:54:4C:D7:58:66 Fingerprint (SHA1): 8F:4D:75:64:93:59:75:1F:F2:31:6F:06:08:FF:9E:0A:6F:C4:3A:4F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to sanext.der cert.sh: #346: dump extension 2.5.29.17 to file sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:sanext.der,2.5.29.17:critical:sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:sanext.der,2.5.29.17:critical:sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:ba:2e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Nov 28 11:20:35 2025 Not After : Sat Feb 28 11:20:35 2026 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:39:b5:20:c8:97:44:dc:60:a9:53:cf:d4:33:d4:67: 6f:13:79:6a:f3:ec:fd:13:0d:14:16:54:a1:86:d2:7d: ae:c4:ac:75:b5:83:8b:17:3e:aa:91:59:1b:b0:a1:47: 73:fe:b5:a4:cb:c8:0e:c3:05:9e:ea:eb:36:68:37:ec: 26:ef:64:c6:9a:22:da:db:7b:f4:9e:bf:91:92:c1:66: c5:ac:f6:b5:7e:d3:b0:95:eb:4d:8c:11:c7:67:e1:79: 9c:a7:02:45:e6:94:66:aa:ef:27:03:43:8f:1d:3d:ce: 01:c6:7f:b6:28:d7:16:9d:fe:84:23:26:b0:d9:f7:7b: a8:5b:1c:c4:0d:d1:3b:f2:96:2d:40:ca:fe:89:ef:e2: 41:a2:f6:04:85:f1:c9:98:43:67:63:f8:c4:78:5c:62: b8:e9:11:df:09:00:01:a2:4e:f6:89:88:58:1c:54:bc: c8:1d:21:87:cb:9c:34:8a:86:52:e0:f3:3d:1d:2b:dd: 79:a3:92:41:54:a3:b7:38:29:ba:3c:ae:cc:3c:16:36: 28:9e:2c:2e:03:69:4b:13:28:8f:31:d3:24:43:8c:9f: 64:9e:38:c6:25:cf:d0:c4:ea:5a:b1:b5:f4:73:64:5a: e7:f6:00:4f:28:f2:1a:ee:93:c9:c6:ee:b4:42:93:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:2c:31:a3:82:73:9e:b1:5e:fa:b2:95:ea:15:79:1e: 73:8b:ec:bb:2b:a8:d3:bc:f3:65:ae:5a:a4:d9:7d:37: 48:9b:54:df:9e:4d:b7:f8:97:a5:90:e5:8c:64:db:7b: 18:99:32:aa:9c:52:14:d0:29:92:7e:cb:47:5d:b5:0c: e6:03:f1:19:37:15:38:26:05:53:f4:a4:e9:45:d1:4d: f0:35:88:55:cc:e3:21:e4:a9:b8:81:c3:49:66:1c:ca: d8:d0:9a:23:36:81:46:da:e3:2e:37:f3:7c:95:16:b4: 3d:1e:c7:1a:75:02:50:6c:04:f7:ff:a0:75:23:48:06: 49:45:42:a9:1c:84:e4:3a:08:d2:e2:f9:d1:0c:2e:03: 46:ec:1d:28:04:c0:67:42:31:e6:bc:76:bd:75:08:be: a7:18:83:13:87:a0:63:99:61:00:65:7d:13:5e:69:b9: a7:f2:c4:e3:f9:cc:d9:27:a0:47:07:59:e9:7e:c1:45: 65:bd:ff:22:ac:e3:8b:77:fc:96:5c:28:59:38:40:c7: de:fd:6e:9f:4c:16:fd:12:7c:fb:01:a0:93:33:19:4d: a8:8c:df:ee:51:38:00:86:78:47:c7:97:4c:3a:6e:52: e8:e7:ec:83:5c:84:6c:33:78:49:f1:a6:16:9d:f7:f3 Fingerprint (SHA-256): 78:EB:7B:E8:DF:05:33:4A:04:41:A4:54:91:1A:A8:88:6F:20:85:DC:37:EC:A0:CB:70:2A:BC:4D:22:3E:6C:18 Fingerprint (SHA1): 46:D3:E1:52:D5:C0:5D:34:A7:C2:B4:85:CD:93:22:E6:2A:5E:F8:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 546673bd03e6c1bef0f69ee44987b184ebd8e81d NSS Certificate DB:localhost.localdomain < 1> dsa 8d02f05e9b19bdd42ea5c7623ad93677cf1c978c NSS Certificate DB:localhost.localdomain-dsa < 2> dsa cfe67b86dce0b05957373f8f0e5a8d44f3f32846 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec a01bd7b46c3a8ab5e23e97e129f8a7706891d1ce NSS Certificate DB:localhost.localdomain-ec < 4> ec 39ea52f70e40e340a66fe424be3479f34cb28437 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa f1ce97a3baa0a6b97f55c1ca3daa94c809439c87 NSS Certificate DB:localhost-sni.localdomain < 7> dsa 9867f30e96db87db98b2b9c1889e5eaaf6879603 NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 1fe2089269d8209534ab424db334e7b38ddd1650 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 5c472fdab1f1c6a908bf0d63f51bb6e4db71f9d6 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec d152708756218f9c7fcebe17823c4cdd73f24a8b NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 93ec3ab8c701270912f64730e79e233c8a01bab7 (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Fri Nov 28 19:21:30 CST 2025 Running tests for tools TIMESTAMP tools BEGIN: Fri Nov 28 19:21:30 CST 2025 tools.sh: Tools Tests =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.112/nss/tests/tools/corrupted_cert_bag.p12': No such file or directory tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 1a:7c:de:51:d5:67:c4:9a:c1:72:bd:db:01:7c:a2:59 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:08:8b:e2:2a:56:1d:75:0f:aa:12:3a:3b:3e:b0: d0:95 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw certutil: could not authenticate to token NSS Certificate DB.: SEC_ERROR_IO: An I/O error occurred during security authorization. pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 19:69:c1:15:8c:c9:2a:c0:b3:8e:ff:52:7e:58:37:a8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:ab:3d:9a:c4:25:f2:be:ed:59:5c:b7:1d:c1:31: b3:95 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 11:19:54 2025 Not After : Thu Nov 28 11:19:54 2075 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:50:59:b8:31:c7:23:45:04:49:1d:1f:5c:98:c5: 87:52:34:33:d2:a2:fc:14:1a:66:e0:45:dc:89:75:1d: dc:dc:d5:2c:77:2a:a5:07:95:1a:32:de:42:6f:7c:fc: 72:15:99:85:21:01:14:c7:95:b9:5a:a3:2f:2c:34:48: a6:ba:e8:01:1c:b1:06:22:a4:ab:e9:40:cb:7b:91:7a: cb:9f:70:19:48:c1:c9:56:06:ba:55:31:3b:d5:fb:31: 11:ed:08:8b:a4:6e:7b:d2:2f:06:ad:6b:43:70:a7:04: 7c:04:2b:f2:5d:5a:43:95:7f:c7:96:3f:98:d0:ea:90: 1b:da:ab:d1:58 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:3c:81:a9:b8:b6:5f:7e:18:5c:eb: 3f:6a:f9:6f:03:8d:43:7a:5d:a2:ea:a9:21:35:1c:66: 57:32:44:78:c3:c0:82:77:59:f7:d1:5f:4c:68:82:16: bb:c0:7f:fa:ca:1d:ed:a1:49:87:74:ac:82:73:c0:c7: c1:73:8a:2b:ea:05:d1:02:42:01:57:a3:e5:37:a1:04: f5:e2:89:59:96:29:ee:2f:0c:1c:6a:96:73:8c:18:f8: da:8c:4b:dd:74:35:f4:ce:1e:28:47:3a:97:97:57:6a: f0:21:07:29:d3:96:a5:d1:93:4a:1c:62:4e:2a:c5:2d: 83:89:5e:7a:26:bc:7a:45:a3:54:42 Fingerprint (SHA-256): 0D:7F:AB:1F:E4:C0:A1:63:AE:B0:BA:96:6E:6E:7E:C8:13:FE:36:F9:EE:60:65:D6:56:30:98:F6:44:AB:F0:F8 Fingerprint (SHA1): 8D:8B:47:16:DC:63:93:04:A0:E5:FC:51:34:3A:44:3D:14:A3:8A:55 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 11:20:12 2025 Not After : Thu Nov 28 11:20:12 2030 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:90:33:42:23:b8:df:c5:a6:06:e0:ba:de:d7:de:5a: d7:ba:19:b1:ae:d4:39:49:f9:c7:16:48:87:ef:ba:77: 79:ea:b2:79:85:29:85:09:0b:bf:59:08:55:6f:8a:0c: ca:81:ac:b8:03:1c:a4:8e:44:20:bb:96:5b:88:11:6c: 88:9c:20:bf:79:69:5b:49:23:ba:6d:db:23:8c:a6:84: ee:d8:68:0c:0d:de:77:ef:30:80:89:69:f9:a0:dc:89: 6e Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:06:99:41:38:9e:cd:3f:fe:db:2f:ee: 56:e9:d0:c9:f2:47:9b:94:39:4c:d5:ae:63:ba:8e:b5: 95:c9:a6:a9:f6:b0:ff:63:58:c6:ff:0f:8e:22:ca:fa: 6d:0c:bb:d2:11:69:31:1e:8d:47:c4:49:e7:d0:af:77: 06:8d:84:24:d6:b8:02:42:00:f0:05:a2:0a:86:d7:d9: 2f:31:40:6d:7e:b4:e2:6a:6a:78:9e:0a:2a:90:6d:c9: 4a:44:29:9c:90:51:0c:ed:d4:ac:b3:fe:a5:41:ec:24: da:3d:30:b9:2c:40:86:40:8b:4f:4c:18:c4:06:ff:85: 3b:2d:98:8a:e9:4a:de:09:44:ef Fingerprint (SHA-256): 48:F4:63:44:EB:E1:58:D9:C4:F5:B9:71:CD:5B:C0:A9:23:93:4A:CC:F4:D2:14:BE:74:27:1E:C3:E9:1C:B0:4E Fingerprint (SHA1): 41:E6:C0:C9:05:34:D0:96:DF:D2:9E:EF:17:E2:B1:96:E8:22:6C:3D Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4f:fd:f3:f1:93:0e:6d:1e:c7:10:61:9e:5e:4a:2c:c3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:26:07:e7:ef:21:c9:f0:1e:56:29:a8:76:cd:b6: 1a:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 11:19:54 2025 Not After : Thu Nov 28 11:19:54 2075 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:50:59:b8:31:c7:23:45:04:49:1d:1f:5c:98:c5: 87:52:34:33:d2:a2:fc:14:1a:66:e0:45:dc:89:75:1d: dc:dc:d5:2c:77:2a:a5:07:95:1a:32:de:42:6f:7c:fc: 72:15:99:85:21:01:14:c7:95:b9:5a:a3:2f:2c:34:48: a6:ba:e8:01:1c:b1:06:22:a4:ab:e9:40:cb:7b:91:7a: cb:9f:70:19:48:c1:c9:56:06:ba:55:31:3b:d5:fb:31: 11:ed:08:8b:a4:6e:7b:d2:2f:06:ad:6b:43:70:a7:04: 7c:04:2b:f2:5d:5a:43:95:7f:c7:96:3f:98:d0:ea:90: 1b:da:ab:d1:58 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:3c:81:a9:b8:b6:5f:7e:18:5c:eb: 3f:6a:f9:6f:03:8d:43:7a:5d:a2:ea:a9:21:35:1c:66: 57:32:44:78:c3:c0:82:77:59:f7:d1:5f:4c:68:82:16: bb:c0:7f:fa:ca:1d:ed:a1:49:87:74:ac:82:73:c0:c7: c1:73:8a:2b:ea:05:d1:02:42:01:57:a3:e5:37:a1:04: f5:e2:89:59:96:29:ee:2f:0c:1c:6a:96:73:8c:18:f8: da:8c:4b:dd:74:35:f4:ce:1e:28:47:3a:97:97:57:6a: f0:21:07:29:d3:96:a5:d1:93:4a:1c:62:4e:2a:c5:2d: 83:89:5e:7a:26:bc:7a:45:a3:54:42 Fingerprint (SHA-256): 0D:7F:AB:1F:E4:C0:A1:63:AE:B0:BA:96:6E:6E:7E:C8:13:FE:36:F9:EE:60:65:D6:56:30:98:F6:44:AB:F0:F8 Fingerprint (SHA1): 8D:8B:47:16:DC:63:93:04:A0:E5:FC:51:34:3A:44:3D:14:A3:8A:55 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Fri Nov 28 11:20:12 2025 Not After : Thu Nov 28 11:20:12 2030 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:90:33:42:23:b8:df:c5:a6:06:e0:ba:de:d7:de:5a: d7:ba:19:b1:ae:d4:39:49:f9:c7:16:48:87:ef:ba:77: 79:ea:b2:79:85:29:85:09:0b:bf:59:08:55:6f:8a:0c: ca:81:ac:b8:03:1c:a4:8e:44:20:bb:96:5b:88:11:6c: 88:9c:20:bf:79:69:5b:49:23:ba:6d:db:23:8c:a6:84: ee:d8:68:0c:0d:de:77:ef:30:80:89:69:f9:a0:dc:89: 6e Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:41:06:99:41:38:9e:cd:3f:fe:db:2f:ee: 56:e9:d0:c9:f2:47:9b:94:39:4c:d5:ae:63:ba:8e:b5: 95:c9:a6:a9:f6:b0:ff:63:58:c6:ff:0f:8e:22:ca:fa: 6d:0c:bb:d2:11:69:31:1e:8d:47:c4:49:e7:d0:af:77: 06:8d:84:24:d6:b8:02:42:00:f0:05:a2:0a:86:d7:d9: 2f:31:40:6d:7e:b4:e2:6a:6a:78:9e:0a:2a:90:6d:c9: 4a:44:29:9c:90:51:0c:ed:d4:ac:b3:fe:a5:41:ec:24: da:3d:30:b9:2c:40:86:40:8b:4f:4c:18:c4:06:ff:85: 3b:2d:98:8a:e9:4a:de:09:44:ef Fingerprint (SHA-256): 48:F4:63:44:EB:E1:58:D9:C4:F5:B9:71:CD:5B:C0:A9:23:93:4A:CC:F4:D2:14:BE:74:27:1E:C3:E9:1C:B0:4E Fingerprint (SHA1): 41:E6:C0:C9:05:34:D0:96:DF:D2:9E:EF:17:E2:B1:96:E8:22:6C:3D Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c2:be:4d:82:f8:42:a2:a4:a9:22:8c:79:68:4f:02:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 87:45:d0:22:51:21:67:c8:90:bb:e5:7e:b8:5d:cd:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 26:19:a0:77:a5:12:de:b2:13:42:63:3a:ea:6b:c8:fc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: eb:b8:30:fd:6a:b2:66:b8:ee:cf:96:b7:dc:4b:dd:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 45:d0:61:96:09:12:0b:ee:56:e6:ab:d4:4c:6f:4d:a6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9f:8b:a5:6e:85:03:b1:bc:15:3e:f1:3b:95:45: bd:0e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 12:cc:fd:90:a9:4e:ca:a9:5c:73:82:0a:b4:77:d0:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 24:e4:31:f4:bb:f0:a6:f1:09:24:cb:95:62:45:14:10 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:03:47:87:fb:be:36:b7:80:c7:18:e9:9b:91: 73:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1b:1d:21:84:46:07:39:69:eb:a1:29:e7:c9:b1:3b:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0f:9c:9e:6f:02:80:42:9a:6c:10:9b:2d:dc:49:37:54 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 48:32:76:3d:af:03:58:cd:5d:a9:c5:83:65:62:c8:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d6:58:7f:09:fd:61:59:c6:14:72:86:2d:2e:cf:fa:cb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 13:5b:9b:7e:95:a5:98:25:f2:08:24:f7:91:69:3c:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:2f:24:13:5f:c0:aa:ac:30:d7:f2:43:e9:b0:3b:17 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e9:ba:91:df:8c:36:c5:b1:9c:34:ff:dd:a8:c5:8f:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d3:5b:65:a5:ca:ce:6c:a8:08:57:78:8b:5a:ca:e4:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9a:55:4a:9f:59:ce:38:76:e6:fe:86:1c:70:b8: b2:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8e:32:2a:5c:f4:0b:2a:d9:60:2e:fd:8f:a3:9e:44:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4d:30:f2:8e:94:64:7a:8f:2e:a7:37:36:3a:0e:d4:4c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b8:c7:a6:f2:ca:a7:61:98:f1:53:25:1d:5e:89: 06:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b4:69:db:d7:b1:aa:68:3c:bd:03:50:28:77:e1:86:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e7:d6:0b:93:bf:de:55:ff:f4:19:e1:a7:e0:62:73:8e Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 7c:79:13:6e:eb:1b:36:00:a8:c9:5a:e3:55:07:71:f0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:2c:2b:20:c6:ca:8c:75:7b:3a:94:aa:07:0c:10:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c7:86:1a:1a:11:8c:9e:61:57:40:48:c7:8a:c1:5a:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 2d:ba:5e:78:1a:63:e5:91:b2:36:e8:69:d0:65:43:ab Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8b:16:71:95:bc:ff:93:5d:04:53:e4:e1:d1:ba: e1:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 69:41:65:83:62:2c:8e:e0:bb:18:13:05:ec:6b:0b:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 9c:c5:0f:ce:b7:3d:da:7b:64:33:a6:df:cd:9b:bc:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:42:ec:1e:81:52:3c:ee:91:18:eb:4a:6c:2f:40: 68:65 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8e:2a:a8:da:43:33:bb:70:5b:3d:87:ed:62:05:b6:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3b:d0:b6:a3:5f:50:2d:af:0e:50:47:01:40:3e:ea:83 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b1:13:b9:2d:ea:5b:cd:27:93:e3:44:3a:a0:91:b1:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3f:2f:00:59:78:a7:fa:64:72:55:7b:7e:12:9b:49:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 5c:34:49:93:44:88:81:ad:e7:80:2c:c4:a1:9f:bf:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d3:35:83:67:ff:d3:93:62:a4:18:9d:ea:6e:a5:29:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 4f:80:91:71:33:f2:38:4f:db:3b:79:d1:71:2d:4c:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 39:73:81:3c:6d:08:0c:27:5a:3c:a6:9d:1a:38:f2:e8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:66:29:f6:3a:0f:1d:39:d1:b7:9d:b3:8d:d9:9d: 06:5d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9c:e6:42:38:fd:12:65:fc:6c:a7:52:40:a8:bf:0f:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 3c:4d:13:43:8f:7d:64:8f:fc:7c:62:f1:c1:57:d2:8c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ab:72:e5:87:28:cb:17:14:ae:0b:47:a7:56:1a: 8b:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 62:00:a0:4c:27:44:38:5f:66:6c:9b:6b:66:d7:21:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 74:d8:eb:a7:9c:0d:36:1c:9a:2b:01:69:d2:3a:f1:bd Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: c6:7f:69:e5:86:cd:96:23:53:15:3a:61:b9:29:d3:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 82:a5:fc:15:92:bd:1b:5e:e0:5c:40:69:79:3a:6a:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: f3:6b:a9:e4:d4:e8:8c:8f:3a:bf:bc:d7:f3:f2:57:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 73:32:63:62:d5:aa:3b:73:56:79:62:95:71:c1:25:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: d5:47:58:3f:a7:be:6b:59:06:a8:a0:ed:9b:cb:e3:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 8e:29:40:6e:45:62:10:91:1f:52:9a:d1:fc:73:9e:bc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9a:d0:62:aa:2b:b1:9a:e8:ee:4c:67:88:16:0c: 68:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a8:e0:5d:c6:e3:2a:52:a9:1d:de:5e:0b:20:11:99:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4c:ba:40:38:5d:5f:19:8d:be:66:91:52:cd:93:da:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8c:93:5b:8a:b4:8b:28:0a:28:01:a4:ac:3b:e5: 1e:d1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 66:bc:f6:f3:70:20:1a:04:6e:df:b8:f6:ca:ec:a7:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 29:b9:95:bc:4d:e1:64:23:61:f9:00:41:71:88:eb:06 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: b6:c5:9d:8c:bd:6f:34:5a:5e:d8:93:80:ec:19:d3:30 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1b:70:8c:8c:6b:34:65:c2:f3:3a:76:08:71:a5:cf:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:95:a1:c4:5f:d8:52:80:7a:53:05:6c:cf:e5:6a:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 26:96:fb:33:fd:b2:05:35:13:4b:dc:27:de:45:c0:01 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d4:13:85:2f:ec:d0:d5:f7:2c:bc:cc:b5:3a:7d: f1:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:69:2d:49:82:b3:d7:f7:28:a0:7b:d8:af:3b:dd:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 30:d5:94:ce:17:57:c8:af:ed:df:77:f1:4b:d4:0a:ac Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:22:70:2e:35:2f:a8:5b:10:7e:dd:b9:71:db:d5: 70:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:7c:2d:05:59:53:2f:41:52:1d:58:c9:57:91:f8:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:83:bb:b5:a2:87:71:80:de:71:6c:bb:d5:1b:6e:54 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 42:d7:70:2b:d5:f7:6a:fd:97:a9:5f:77:69:c4:e4:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a1:17:22:24:af:67:00:07:89:80:22:fd:cd:c3:6a:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: fe:1c:3a:64:9b:7a:6c:6b:f4:ee:c0:1c:fd:87:54:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:4a:a4:64:33:3a:ef:f4:d9:0f:7b:44:26:38:d1:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0b:69:25:4b:fa:84:3a:9b:cf:76:22:f5:5d:3a:60:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ab:97:3e:d7:cf:8c:b7:b8:ab:88:26:25:d7:fb:27:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e0:52:7d:8a:8b:30:a0:5e:8d:5f:fc:4f:91:58: 1d:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 09:f1:be:e6:c3:d7:9c:bb:04:e5:52:ec:c2:3b:6d:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 02:98:b8:81:99:1e:12:a0:b9:10:46:df:f6:11:0b:b8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:93:09:5e:4f:4e:21:16:83:c9:74:90:dd:03:a6: 1d:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e1:2d:86:0d:d2:c3:5e:73:d4:b7:42:64:b7:c7:31:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 59:db:cd:78:f7:82:d3:91:e3:0f:23:29:ab:dd:18:d1 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a7:93:f5:8e:2b:dd:f0:ef:6b:cd:5d:e5:38:a6:36:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1f:0a:9f:fa:59:11:27:bf:30:ec:a1:53:2f:39:4f:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 17:12:21:af:a0:46:d2:8d:2d:2b:48:6a:10:fd:17:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:15:01:31:f2:52:79:20:5c:86:64:31:87:b1:45:a6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 1d:f8:5d:88:02:41:13:a9:da:55:bc:c0:b6:7d:a2:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 8f:55:c9:7d:d5:d7:8e:3e:de:4d:b0:5c:d2:45:f3:90 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d9:91:48:bf:35:92:80:20:00:e7:54:c6:24:fd: 0e:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 01:b2:ea:f2:54:4f:84:f2:46:b1:9e:df:30:6f:44:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ad:c5:2d:e5:01:00:9f:f3:76:af:81:01:d7:7a:72:24 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0c:d5:c8:e7:e6:27:27:ca:f5:31:f8:6b:59:49: dd:20 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 77:c1:3a:5a:a4:6d:5d:77:a9:f6:d3:a5:5a:9f:de:f7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 7c:2b:dc:cd:a5:64:83:16:34:01:53:96:39:c8:a7:c1 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: f6:32:ae:c8:17:15:35:75:e0:35:7b:fc:b5:80:50:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:2c:06:f4:b3:6f:4a:a0:b6:48:8b:6e:8a:7d:2a:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ec:3e:4e:8b:ac:d8:0f:78:f5:cf:73:1b:cf:c5:53:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:0a:89:3e:16:32:cd:22:6a:b1:7a:48:13:85:b4:16 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8b:c2:18:1e:c0:16:df:d6:cc:69:44:b4:06:c6:ff:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f2:07:b3:02:8d:50:18:9a:27:2e:0b:81:49:ba:6a:99 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a8:cf:48:d9:02:7a:53:e6:b4:5a:32:d3:7c:18: e4:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7c:c0:12:6e:c8:36:7b:82:2b:b0:be:0c:3f:39:91:84 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 3b:3d:ea:11:42:a0:43:c4:6b:30:86:56:93:4f:f6:0f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:11:fd:47:dc:c4:31:8b:8f:f5:94:73:2c:ad:08: b8:8b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 20:25:9d:f8:14:ed:84:64:ac:4e:07:97:d9:71:af:6f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bd:0b:d0:94:2f:80:a0:1a:ad:85:83:99:ec:92:cc:e9 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 93:1a:3f:8b:2c:17:a8:f8:cf:cf:74:40:2f:e1:76:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6c:b2:b1:f7:49:ee:f4:27:c1:af:b2:6d:b8:a8:68:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ec:42:41:ba:cb:71:25:e5:c6:05:74:72:ec:38:4e:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:9f:1c:b3:d2:51:a1:09:5e:88:82:f8:56:78:a7:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:66:5d:ec:b9:fe:5c:ba:70:53:9b:d3:78:6f:09:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ad:a1:b7:20:71:d7:26:ca:e8:36:87:27:7f:60:5b:3d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e5:1e:83:95:20:64:c0:72:de:9a:ad:13:25:da: 9b:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 65:d9:be:ce:af:59:5a:b1:4f:ec:35:cc:72:de:80:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 99:96:28:5f:07:fd:45:e6:3f:0e:cd:58:9a:39:22:b7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bb:c5:51:a8:b5:b5:77:c3:91:14:f3:14:bc:a2: e4:7b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:40:e2:63:3a:28:77:c4:8c:fe:60:5c:00:e5:65:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:d6:df:df:af:f5:99:8c:34:04:59:51:f6:f5:1e:46 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6f:ea:19:43:ce:12:68:ea:cf:5e:96:34:99:03:9a:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 27:ee:7a:ab:b6:27:e3:de:57:80:40:09:de:f8:88:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 1b:c0:a9:3f:52:e5:57:63:8b:ef:76:22:d5:ad:02:60 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:fc:bd:36:d3:ef:c2:fa:d8:fe:b5:04:41:4c:05: ce:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:2c:1b:cc:0b:a1:f4:dd:13:1f:ae:70:8d:15:a3:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ff:79:a9:e8:e8:bc:43:40:45:34:d2:3c:2b:4b:81:03 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:2c:f2:88:be:62:15:33:a6:c8:8f:f3:ed:d9:31: 17:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: aa:78:c1:46:2d:1b:4b:40:d9:eb:94:29:46:22:5d:7c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:18:44:76:c0:d6:55:86:65:1a:0c:d1:26:eb:4b: af:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e9:59:5a:6d:05:f2:40:68:51:22:d7:63:0e:0a:1d:78 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:98:03:99:64:d7:df:3b:f7:e6:34:67:61:2f:bc: ba:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 12:a0:33:df:e5:b8:f1:48:c3:7b:33:61:4b:ca:d0:4e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:17:86:18:a3:84:3d:b7:4b:3c:52:13:d8:10: 80:84 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a8:92:f6:45:24:09:ec:80:e0:6a:9b:66:35:12:5e:cf Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:bc:32:6c:c3:d0:bf:04:24:65:31:e7:08:9f:74: 96:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 9f:7a:04:91:f6:c7:7b:75:10:12:a4:44:ff:0a:54:53 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:6b:83:72:2b:c9:02:63:cd:a6:44:b5:e9:a9:2b: 54:07 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d6:2c:4e:0d:85:61:1c:e7:89:8c:32:0c:86:87:ca:86 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-512 Cipher: AES-128-CBC Args: 04:10:45:d9:30:47:71:c3:37:c8:6d:82:1e:35:a1:80: 54:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 86:40:12:42:61:5a:1c:b1:33:7c:80:51:c7:de:97:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: fa:d0:57:6d:e2:f3:a4:75:af:e3:64:7d:da:2f:c6:c1 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:e4:41:f7:e9:82:b2:09:06:21:69:6a:b8:fa:2f: 1c:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:79:9a:e8:62:d3:7d:e4:cf:30:bb:72:6a:57:e0:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 18:1c:c7:aa:8e:74:03:f1:c3:04:fd:5d:51:91:d1:3a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:ad:3c:54:50:09:48:a9:3f:2d:97:46:8d:c2:46: 46:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 35:e8:07:f3:95:04:75:66:9e:56:f1:93:bb:2c:b6:64 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:80:c1:cc:b9:41:8f:58:0a:36:a1:87:25:e7:30: 6a:1e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 97:ba:a9:17:a6:82:56:be:29:b0:8a:d9:75:aa:0d:aa Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:69:00:6b:37:14:5a:9e:f6:ab:d8:9b:a0:d7:19: 47:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 3e:c7:17:9a:0f:c4:2b:68:e0:d3:20:7d:0a:34:7c:9a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3b:89:97:2d:61:52:16:4f:58:fc:fe:c1:94:68: 73:5d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b8:07:cc:20:4a:3e:9a:b6:88:ff:40:93:37:4b:d4:e6 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:7e:1f:91:98:ce:d1:11:92:1d:5d:60:a1:cf:14: ef:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: aa:e9:1b:79:8c:04:cb:51:6c:d6:c5:77:27:2e:11:c7 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:44:5d:75:fc:26:56:a1:eb:3c:e0:73:96:22:56: d8:79 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 28:9c:2f:3e:f9:37:9c:53:03:a8:be:fd:65:a2:f0:ec Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-512 Cipher: AES-192-CBC Args: 04:10:6a:dc:87:1a:76:3f:3d:6a:0d:36:a0:bc:91:f9: be:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e1:a2:2f:0f:47:42:b7:70:61:de:57:6e:63:0c:79:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 5f:13:92:bd:01:e3:6c:ad:c9:95:6d:84:b2:eb:c5:34 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:4a:1f:b7:de:dc:2b:9d:15:69:70:68:02:df:1b: a9:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:0f:7a:dc:dd:4e:33:07:28:ea:61:63:9d:8c:fb:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 18:3b:d4:7e:31:62:f7:46:c6:ff:6a:5b:ba:cc:7b:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:10:8b:55:94:90:0d:e8:b1:68:88:58:e1:4f:6c: e1:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: db:14:37:ff:16:9d:d1:98:8d:c7:aa:b7:9f:9c:f5:41 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bb:86:e1:7a:fa:99:4d:25:14:d3:ac:bd:aa:20: 53:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4c:1e:70:77:6f:ac:e1:cc:5a:e0:d6:64:18:76:84:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:58:c9:18:d9:e9:91:80:ce:e3:d1:b3:13:3d:59: 5e:84 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 46:88:72:86:a5:92:99:df:56:d3:cb:e0:cb:54:bf:24 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:9d:3c:20:85:48:6e:98:c7:c3:77:57:74:4d:95: 9d:f7 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 83:62:8f:cf:cc:3f:36:a3:85:82:ed:fe:39:81:ec:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:21:fa:b2:73:db:4f:75:3c:ac:20:a2:c5:9e:57: 09:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 74:63:10:27:6f:a3:f4:3c:d6:9d:c0:d6:07:25:f6:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 38:bc:24:0a:69:be:17:0c:ed:b3:e0:4a:03:b0:57:a4 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:ab:a1:66:7d:cc:cc:bc:8b:b6:da:8a:b2:28:02: 00:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 66:73:fe:af:6e:e9:cf:d0:71:c9:4d:52:03:34:85:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 69:34:67:e4:f0:48:a8:e4:d0:f0:44:9d:3b:20:db:c0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:d2:68:15:00:6c:62:3d:cd:0d:2e:0f:bb:96:ab: a0:da Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: cb:55:f4:a1:3d:9a:29:ee:fe:af:04:40:78:e2:4f:f7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:96:82:e7:6b:5e:cc:0b:c5:01:92:75:82:64:3a: b6:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f5:a3:36:9c:b7:17:24:f2:93:2e:a6:7e:54:ef:56:71 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:75:ad:2d:40:40:40:71:4b:1e:af:00:5b:de:83: 68:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 98:17:b7:fd:4a:14:00:cd:c6:d1:d3:bb:af:94:fe:18 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ca:b5:cb:be:98:f7:42:88:a0:f3:2a:1b:ab:80: 4f:b1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: fe:47:65:e4:20:a7:68:83:15:d1:c2:c1:b7:f7:04:9e Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:e5:fd:bb:5e:f9:95:ca:71:47:15:b6:74:db:c3: 82:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e9:cd:c6:1f:91:d2:46:fc:42:e5:05:85:ba:54:8e:f8 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:a2:36:e7:4f:81:92:83:2b:11:67:b5:d3:8d:a5: e6:86 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c1:2b:aa:71:c5:98:91:ca:3f:9b:c6:90:6c:b6:15:eb Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-128-CBC Args: 04:10:f0:5f:6e:67:2b:08:9c:bf:3c:b7:d4:aa:18:b0: 0f:27 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fb:d9:6f:4c:8e:31:06:78:6f:00:f1:83:93:7c:b3:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 14:44:39:80:68:3d:5e:3e:16:a6:d7:82:35:7f:73:da Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:c9:f8:9f:84:6b:92:df:e8:7f:6d:07:cb:27:2e: 97:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 01:c5:c4:b8:4a:75:d9:72:9e:aa:9c:64:4c:f7:7f:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ef:3e:62:94:62:f1:72:37:df:32:5a:99:cd:ca:e6:4b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:10:a6:1b:88:91:d7:77:23:52:b3:86:3a:a3:30: 6b:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 27:2a:2e:10:6e:c9:1a:4d:ac:69:89:4b:d6:59:46:73 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:51:ca:85:a1:88:e6:f6:9d:23:a1:ab:05:bb:30: 1d:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4d:13:e7:0c:c1:02:fa:96:19:0c:7f:05:69:36:49:c7 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:b9:f8:2b:56:86:be:47:a2:74:06:a3:7a:30:5b: 5f:f6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 2f:72:62:9e:b3:4b:04:c9:35:ee:b4:58:fd:54:74:7a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:18:1d:57:a5:13:15:ee:bd:3b:1e:33:11:23:6b: 18:a7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f0:4c:ff:53:31:55:f5:c3:26:1d:a2:fd:5b:13:a2:b8 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:54:ed:90:a7:6c:b8:6c:13:1f:ab:02:81:57:b7: cf:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 05:c8:6a:ae:82:a6:6b:f2:52:69:18:00:63:5d:b4:1b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:30:37:f8:b4:ad:e9:d5:f3:c6:8e:26:89:c5:ff: 0f:da tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 26:50:b8:34:d2:0d:52:01:ce:c0:fd:86:46:e3:09:7a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-192-CBC Args: 04:10:6e:74:54:9b:09:5d:1a:a3:62:37:75:d0:77:ea: c3:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 44:69:1d:c9:c0:c3:37:df:8c:e9:30:be:a3:ce:4e:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 37:ac:e1:76:00:f1:17:e4:6d:9b:7a:7a:84:12:21:57 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:6f:97:3c:62:42:69:3a:87:9b:34:f8:e0:04:97: f6:08 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:50:20:66:bb:d6:2c:d2:0a:88:f1:07:e7:e8:57:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ab:11:d5:e9:85:f5:d0:38:f3:95:37:78:d0:e1:f5:e4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:6b:b9:8b:fb:ba:0a:d5:50:98:bc:7c:1f:36:81: 21:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ec:8b:ed:5f:5f:e1:4b:a7:f0:68:49:b9:46:fe:07:48 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:78:16:06:8e:4d:d2:08:5e:71:1a:50:99:c1:c9: 49:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 6b:20:3f:b5:73:e3:9b:94:a5:95:0d:5c:51:3b:3f:c5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:43:ec:96:09:28:eb:31:8d:e5:84:39:c8:e2:a1: 61:24 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ce:d9:b3:4f:cd:90:25:87:0e:cf:39:22:98:6f:1d:1b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:23:9c:63:c5:6d:aa:38:4e:43:94:aa:63:67:4a: 38:44 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 29:b7:8b:87:e0:f4:b0:b4:ee:32:f6:04:dd:ed:e5:30 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:77:63:7c:3a:5b:dd:12:99:3c:3e:41:64:cc:b5: 31:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 60:2d:40:2c:ff:05:d6:b6:ec:6b:30:30:4a:9b:41:d4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:1b:9c:d2:3e:62:07:80:0f:bb:7b:67:e5:55:c3: 32:ce tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 08:9b:82:b4:88:d7:c0:7d:95:20:52:31:08:3a:a2:5d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-256-CBC Args: 04:10:52:3d:db:2b:17:dc:e5:ae:0b:87:70:94:d3:34: 49:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f8:80:e2:d7:32:99:7e:66:27:83:91:cf:0f:d2:c0:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 21:de:69:ab:b0:83:61:e2:98:9c:e9:e1:c3:67:c8:1d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 37:4f:29:e7:cc:0e:26:a8:ac:31:93:2f:29:fc:5a:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a9:93:65:a8:0b:c3:80:26:a1:a1:14:32:b8:94:db:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f4:6c:2d:05:5c:2d:e5:59:13:f2:07:0e:1c:a0:fe:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #649: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:34:cb:a8:4b:85:7e:9b:18:c1:4f:11:57:0b:dc:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 15:7c:f9:64:4c:cb:31:77:ce:2a:2d:28:e9:8f:8a:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:70:c9:f3:53:10:d8:33:60:3d:3c:27:9f:5e:eb:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4d:d6:74:eb:91:3f:a1:e7:46:b5:fe:99:72:e8:1b:84 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:69:eb:0d:bc:16:af:a7:b6:47:3c:b4:d3:50:64:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #669: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 35:41:fb:64:a4:2d:13:ff:61:95:21:83:50:52:b2:4e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8c:15:65:49:e0:4d:b8:bd:34:b6:77:12:f8:60: 97:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #673: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f3:17:18:91:e7:14:03:ef:74:de:d0:b0:64:cf:6e:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:18:c1:92:c5:5e:0c:27:51:e0:3a:41:6e:00:dd: 7b:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c0:be:4c:19:b4:a4:7c:c4:a7:24:63:46:4a:de:98:b0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:00:8b:23:12:2d:6b:61:8f:12:14:33:53:0b:93: b0:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: bc:a9:b1:c0:fe:cd:9b:43:1e:57:46:8a:ec:a0:ba:23 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:c5:23:da:4f:9a:ef:ce:62:58:6a:06:f5:9c:2e: 6c:87 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a4:43:0c:0b:dc:18:ee:9c:24:bc:b2:c5:73:08:4f:fa Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:e7:0e:63:b4:6c:bd:f8:5c:7e:12:22:f9:4a:31: 1c:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #689: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 67:9e:d3:8b:af:07:0b:1e:ad:7f:b1:1d:e9:dd:08:b4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ca:61:ba:42:f8:ec:c5:a8:99:9a:d7:5c:d2:3c: 8f:1b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #693: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 46:82:a7:3f:86:d7:cd:42:63:0a:e0:27:5b:0a:1e:dc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:17:ad:da:11:f4:49:93:51:30:de:ba:8e:88:c7: 03:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #697: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e9:f5:0c:dc:1a:ae:d3:3e:dc:00:7c:5d:f5:a7:2e:cd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:ff:c3:80:5f:46:27:7e:5f:bb:64:9c:31:7d:a3: 1b:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #701: Exporting with [default:default:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 3b:5f:78:6b:9d:38:17:4e:19:07:ca:77:60:ac:c8:82 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:09:1a:b2:2b:a4:ab:72:fa:ce:38:b4:98:10:2b: 18:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #705: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c1:a2:6f:d4:bb:a8:6c:da:64:bf:42:cb:b8:d9:0d:16 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:65:07:5c:b1:4e:f2:58:37:e5:54:13:c3:b5:39: 3c:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:19:47 2025 Not After : Thu Nov 28 11:19:47 2075 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5b:d6:99:e0:ad:98:fd:8a:11:e2:ed:1f:d0:78:28: 0f:be:63:30:c0:15:6a:cb:e2:2d:90:b3:74:1a:fe:fd: 37:fd:75:6d:cd:b9:ce:35:54:aa:30:44:3a:92:3e:8f: c6:30:b2:bd:b6:fc:ae:db:b8:61:97:16:6b:50:91:7f: 77:a3:d8:df:cc:62:b0:5e:51:43:71:fc:8a:10:89:a8: 51:41:51:bf:5f:1a:24:0d:96:57:92:93:80:54:10:b6: ba:72:90:4b:fd:c3:5d:33:5c:43:3e:41:f9:31:5a:e3: a7:74:ed:b8:18:2e:98:4b:60:32:81:b9:58:81:b1:5a: ef:d3:ad:e0:05:a3:d4:fc:e0:ce:51:ca:e8:99:af:97: fb:da:4f:69:a3:f9:02:46:cb:5b:a3:65:15:31:ec:44: 22:b3:c0:ec:e7:47:c1:d1:0d:78:28:26:c7:0f:c0:bf: 32:49:0c:cc:b0:d8:7f:62:4f:07:06:c0:45:d3:64:64: 01:62:6f:f3:2b:94:f3:e6:f9:33:5b:68:0f:ca:d3:fa: c1:bf:a8:7e:50:50:64:30:12:cd:59:7e:0d:41:0e:05: 32:a1:06:48:2f:19:69:c0:01:60:d4:3a:64:2d:9c:6d: b8:2d:3e:47:f8:83:25:d6:48:55:83:4e:36:37:57:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:23:c9:dd:89:4e:47:6f:84:dc:4f:93:5f:b5:2b:72: ff:85:bf:e1:b1:ea:14:10:5c:cf:29:39:6e:08:f5:ce: c1:06:d1:78:2f:c1:0d:9c:19:82:ae:8c:5c:84:ce:61: a0:e1:27:dd:63:e5:56:1e:9a:ec:4b:e1:66:bd:fe:69: b7:8e:64:f2:00:ba:67:03:7b:ce:f3:ba:3a:c6:ed:a7: 68:7d:d6:4e:90:a9:99:5c:47:49:be:3e:d9:20:b4:81: b3:6b:28:08:05:5a:be:3b:1f:85:2c:2c:03:f4:3d:44: d1:ee:2b:03:d5:92:69:3a:52:83:a7:54:24:65:8a:ac: e3:34:2b:e7:6d:93:71:e1:2e:2d:f7:04:2a:6f:a8:74: 69:26:de:91:2d:a1:04:fb:7f:d9:32:cd:bb:57:4b:fa: bf:2c:e9:21:87:d7:c9:63:0c:45:38:65:71:1b:10:36: 7a:30:33:54:65:49:e7:a2:a3:64:29:14:28:71:19:02: d3:e3:dc:10:1a:a9:1d:bc:df:21:2c:e7:0d:c0:b1:a3: 41:c4:4e:65:ba:05:fb:e6:5e:05:1b:90:11:25:d4:60: a7:d3:20:a2:36:64:e4:40:d1:68:03:8e:69:e7:61:a2: db:49:dd:b3:1c:25:41:e6:2b:04:e2:02:f0:83:96:64 Fingerprint (SHA-256): 6E:BE:90:7D:B0:D1:61:9E:50:9B:25:DE:DF:01:DF:DE:DD:39:3A:51:A3:14:68:42:C6:01:10:96:48:D8:16:C3 Fingerprint (SHA1): 2B:58:D0:BE:A5:83:C3:C0:61:C5:1C:33:0A:46:F1:1A:63:85:7D:DC Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Fri Nov 28 11:20:11 2025 Not After : Thu Nov 28 11:20:11 2030 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:99:30:58:74:60:68:d2:bd:bc:41:db:0e:03:d0:ca: d5:d1:c9:40:e7:59:7a:f4:5c:99:6a:92:83:6d:1d:6e: 33:8e:49:76:fe:f2:47:dc:c4:91:0e:86:b3:e0:1d:eb: 15:ab:9a:cb:a8:1e:97:af:f3:b2:52:b9:0a:66:7d:1a: 01:1b:b1:fa:d8:ae:af:ce:e4:0f:51:d0:b2:c3:68:a5: d7:c4:35:8a:86:45:aa:1f:94:e7:66:16:93:de:a6:0a: d0:f4:1a:f5:07:1c:5b:63:e0:49:62:3c:64:e7:36:33: 6e:2c:fd:20:8f:8e:08:a9:45:77:0c:da:7d:08:6c:4f: e9:2b:dc:7c:7b:d7:e4:d1:92:ac:f3:d7:84:ce:22:86: dc:b4:de:40:c8:ba:04:d7:c7:d0:54:cd:22:3d:2a:38: e7:a1:23:63:b9:41:b8:42:db:ec:c1:a5:e0:5f:2d:11: 03:1e:81:07:f7:42:31:d2:2f:03:77:f7:6b:e3:6b:60: 89:bf:35:88:49:8c:17:30:67:61:db:07:6e:e6:20:77: 30:cf:c8:d9:c3:78:ff:11:1d:50:f1:e5:bb:e0:1e:b2: b6:ea:1c:84:ba:79:7a:81:07:39:6c:8d:fb:67:29:49: 8b:5b:ee:5a:31:23:68:fb:aa:c8:ed:28:30:af:e4:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cd:48:83:36:10:e9:72:51:96:d0:75:31:c7:16:32:6f: 92:dd:e2:2c:60:4a:b2:7e:e2:09:08:f7:9f:35:e4:f1: c5:fa:b5:19:55:49:db:fe:ae:15:60:cc:d9:a4:1e:0e: 9a:ce:99:df:02:b7:18:24:1c:8d:be:d9:df:3c:d4:eb: 49:3e:70:90:fb:cc:c4:2c:72:61:cf:f2:c7:59:81:77: 6d:33:e2:f1:e1:f2:01:57:9e:c9:2b:36:79:25:2c:02: 36:5e:3c:f4:ff:c0:59:c6:8d:c6:a7:58:b7:e9:20:13: ae:5c:7e:8a:94:24:17:c7:5b:db:85:7f:2c:ab:75:a7: 7f:46:91:cf:0c:b1:03:47:b7:28:f2:eb:21:c2:0d:24: 5f:58:68:c9:d5:9f:32:cb:67:8c:6c:ad:44:2e:62:4f: e9:d4:31:73:ca:7d:7e:2c:52:3b:af:94:86:b1:1e:ad: b2:20:f2:cd:05:5e:c7:31:b8:4b:45:60:43:cf:ad:08: 88:24:42:2f:59:cb:a6:e5:44:f3:95:d6:07:63:1b:71: 05:75:84:69:43:e3:9a:a0:9e:d1:c6:27:a6:7f:36:44: 92:62:15:30:18:4f:dc:02:36:5a:ef:46:dd:7a:5c:2b: 98:7d:44:ff:00:06:cc:d3:f5:45:64:fa:6e:ca:66:9a Fingerprint (SHA-256): 67:AD:4B:6C:86:14:66:35:5B:EF:19:C6:A3:17:E1:12:88:9F:2D:35:94:64:4C:9C:27:E5:6D:E5:60:9E:E8:20 Fingerprint (SHA1): 6A:95:ED:C9:87:69:1B:B0:F0:CA:1C:3C:ED:F4:6C:05:D8:D2:F0:63 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #709: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #710: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #711: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #712: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #713: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #715: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED pk12util -i PKCS5WithImplicitKDF.p12 -d ../tools/copydir -k ../tests.pw -W pasword pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing PKCS#12 file with and implicit KDF value - PASSED pk12util -I -l corrupted_cert_bag.p12 -W start pk12util: File Open failed: /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/corrupted_cert_bag.p12: PR_FILE_NOT_FOUND_ERROR: File not found pk12util: PKCS12 decode not verified: PR_FILE_NOT_FOUND_ERROR: File not found tools.sh: #717: Listing a PKCS#12 file with corrupted certificate bag - PASSED tools.sh: Importing private key pbmac1 PKCS#12 file -------------- /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/pbmac1-valid-sha256.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: no nickname for cert in PKCS12 file. pk12util: using nickname: tt - ee pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #718: Importing private key pbmac1 hmac-sha-256 from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/pbmac1-valid-sha256-sha512.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #719: Importing private key pbmac1 hmac-sha-256 and hmac-sha-512 prf from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/pbmac1-valid-sha512.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing private key pbmac1 hmac-sha-512 from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/pbmac1-invalid-bad-iter.p12 -d ../tools/copydir -k ../tests.pw -W '1234' -I pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. tools.sh: #721: Fail to list private key with bad iterator - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/pbmac1-invalid-bad-salt.p12 -d ../tools/copydir -k ../tests.pw -W '1234' -I pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. Fail to list private key with bad salt val=19 tools.sh: #722: Fail to import private key with bad salt - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tools/data/pbmac1-invalid-no-length.p12 -d ../tools/copydir -k ../tests.pw -W '1234' -I pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. Fail to import private key with no length val=19 tools.sh: #723: Fail to import private key with no length - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing RSA-PSS private key from PKCS#12 file - PASSED < 6> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #725: Listing RSA-PSS private key imported from PKCS#12 file - PASSED egrep: warning: egrep is obsolescent; using grep -E tools.sh: PKCS12 Policy Test {Use default policy and enable} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #726: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #728: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {allow all} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #729: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #730: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #731: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Only allow legacy read (write)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #732: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Only allow legacy read (read)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #733: Exporting with [AES-128-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #734: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #735: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, key_encrypt=AES-128-CBC (write)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: add cert and key failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=28 expect=28 tools.sh: #736: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, key_decrypt=AES-128-CBC (read)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #737: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #738: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode import bags failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=19 expect=19 tools.sh: #739: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, cert_encrypt=AES-128-CBC (write cert)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow all allow=all/legacy library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #740: Exporting with [AES-256-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow AES-128-CBC, cert_decrypt=AES-128-CBC (read cert)} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=aes128-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #741: Exporting with [AES-256-CBC:AES-128-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #742: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_DECRYPTION_DISALLOWED: Cannot decrypt: encrypted using a disallowed algorithm or key size. return=17 expect=17 tools.sh: #743: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {allow all, RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #744: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #745: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #746: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {disallow rc4 (write), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc4 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: add cert and key failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=28 expect=28 tools.sh: #747: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {disallow rc2 (write), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #748: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {disallow rc4 (read), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc4 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #749: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #750: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode import bags failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=19 expect=19 tools.sh: #751: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {disallow rc2 (read), RC4 and RC2} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rc2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #752: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #753: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_DECRYPTION_DISALLOWED: Cannot decrypt: encrypted using a disallowed algorithm or key size. return=17 expect=17 tools.sh: #754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Use default policy with multiple hashes} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #755: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Allow all encrypt, use default decrypt with multiple hashes} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #756: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #757: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #758: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Allow all with multiple hashes} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #759: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #760: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #761: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha1 on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 allow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: add cert and key failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=28 expect=28 tools.sh: #762: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow md2 on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: key or cert safe creation failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=27 expect=27 tools.sh: #763: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha256 on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 allow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 encode failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=29 expect=29 tools.sh: #764: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha1 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #765: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #766: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode import bags failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=19 expect=19 tools.sh: #767: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow md2 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=md2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #768: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #769: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_DECRYPTION_DISALLOWED: Cannot decrypt: encrypted using a disallowed algorithm or key size. return=17 expect=17 tools.sh: #770: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha256 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #771: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #772: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. return=17 expect=17 tools.sh: #773: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow md2 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=md2/pkcs12-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #774: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #775: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #776: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha1 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1/pkcs12-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #777: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #778: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #779: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow sha256 on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/pkcs12-encrypt library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #780: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #781: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #782: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Allow all with hmac} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #783: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #784: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL return=0 expect=0 tools.sh: #785: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: PKCS12 Policy Test {Disallow hmac on write} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 encode failed: SEC_ERROR_BAD_EXPORT_ALGORITHM: Required algorithm is not allowed. Error attempting to export certificates.return=29 expect=29 tools.sh: #786: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] (pk12util -o) - PASSED tools.sh: PKCS12 Policy Test {Disallow hmac on read} --------------- ******************************Testing ../alicedir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ******************************Testing ../tools/copydir with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL return=0 expect=0 tools.sh: #787: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #788: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-256] - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. return=17 expect=17 tools.sh: #789: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #726: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #727: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #728: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #729: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #730: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #731: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #732: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #733: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Fri Nov 28 19:28:59 CST 2025 Running tests for fips TIMESTAMP fips BEGIN: Fri Nov 28 19:28:59 CST 2025 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.112 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.76 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 84e87a519ed1df1d8169c2a6057609d4cf5f593d NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 84e87a519ed1df1d8169c2a6057609d4cf5f593d FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 84e87a519ed1df1d8169c2a6057609d4cf5f593d FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcpputil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.chk /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libfreeblpriv3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libgtestutil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs11testmodule.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x001ace80 (1756800): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED Copying CAVS vectors Copying CAVS scripts cd /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/cavs/scripts Running CAVS tests in /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/cavs/tests ********************Running aesgcm tests gcmDecrypt128.req gcmDecrypt128.rsp gcmDecrypt192.req gcmDecrypt192.rsp gcmDecrypt256.req gcmDecrypt256.rsp gcmEncryptExtIV128.req gcmEncryptExtIV128.rsp gcmEncryptExtIV192.req gcmEncryptExtIV192.rsp gcmEncryptExtIV256.req gcmEncryptExtIV256.rsp ********************Running ecdsa tests KeyPair.req KeyPair.rsp PKV.req PKV.rsp SigGen.req SigGen.rsp SigVer.req SigVer.rsp ********************Running hmac tests HMAC.req HMAC.rsp ********************Running kas tests KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init.req KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init.rsp KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.req KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.rsp KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init.req KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init.rsp KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.req KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.rsp KASFunctionTest_FFCEphem_NOKC_ZZOnly_init.req KASFunctionTest_FFCEphem_NOKC_ZZOnly_init.rsp KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp.req KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp.rsp KASValidityTest_FFCEphem_NOKC_ZZOnly_init.req KASValidityTest_FFCEphem_NOKC_ZZOnly_init.rsp KASValidityTest_FFCEphem_NOKC_ZZOnly_resp.req KASValidityTest_FFCEphem_NOKC_ZZOnly_resp.rsp ********************Running tls tests tls.req tls.rsp ********************Running ike tests ikev1_dsa.req ikev1_dsa.rsp ikev1_psk.req ikev1_psk.rsp ikev2.req ikev2.rsp ********************Running rng tests Hash_DRBG.req Hash_DRBG.rsp ********************Running sha tests SHA1ShortMsg.req SHA1ShortMsg.rsp SHA224ShortMsg.req SHA224ShortMsg.rsp SHA256ShortMsg.req SHA256ShortMsg.rsp SHA384ShortMsg.req SHA384ShortMsg.rsp SHA512ShortMsg.req SHA512ShortMsg.rsp SHA1LongMsg.req SHA1LongMsg.rsp SHA224LongMsg.req SHA224LongMsg.rsp SHA256LongMsg.req SHA256LongMsg.rsp SHA384LongMsg.req SHA384LongMsg.rsp SHA512LongMsg.req SHA512LongMsg.rsp SHA1Monte.req SHA1Monte.rsp SHA224Monte.req SHA224Monte.rsp SHA256Monte.req SHA256Monte.rsp SHA384Monte.req SHA384Monte.rsp SHA512Monte.req SHA512Monte.rsp Verifying CAVS results in /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/cavs/tests ********************Running aesgcm tests >>>>> gcmDecrypt128 >>>>> gcmDecrypt192 >>>>> gcmDecrypt256 >>>>> gcmEncryptExtIV128 >>>>> gcmEncryptExtIV192 >>>>> gcmEncryptExtIV256 ********************Running ecdsa tests >>>>> KeyPair >>>>> PKV >>>>> SigGen >>>>> SigVer ********************Running hmac tests >>>>> HMAC ********************Running kas tests >>>>> KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init >>>>> KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp >>>>> KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init >>>>> KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp >>>>> KASFunctionTest_FFCEphem_NOKC_ZZOnly_init >>>>> KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp >>>>> KASValidityTest_FFCEphem_NOKC_ZZOnly_init >>>>> KASValidityTest_FFCEphem_NOKC_ZZOnly_resp ********************Running tls tests >>>>> tls ********************Running ike tests >>>>> ikev1_dsa >>>>> ikev1_psk >>>>> ikev2 ********************Running rng tests >>>>> Hash_DRBG ********************Running sha tests >>>>> SHA1ShortMsg >>>>> SHA224ShortMsg >>>>> SHA256ShortMsg >>>>> SHA384ShortMsg >>>>> SHA512ShortMsg >>>>> SHA1LongMsg >>>>> SHA224LongMsg >>>>> SHA256LongMsg >>>>> SHA384LongMsg >>>>> SHA512LongMsg >>>>> SHA1Monte >>>>> SHA224Monte >>>>> SHA256Monte >>>>> SHA384Monte >>>>> SHA512Monte fips.sh: #23: NIST CAVS test /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/fips/cavs/tests - PASSED fips.sh done TIMESTAMP fips END: Fri Nov 28 19:29:20 CST 2025 Running tests for ssl TIMESTAMP ssl BEGIN: Fri Nov 28 19:29:20 CST 2025 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254565 >/dev/null 2>/dev/null selfserv_9351 with PID 2254565 found at Fri Nov 28 19:29:20 CST 2025 selfserv_9351 with PID 2254565 started at Fri Nov 28 19:29:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254565 at Fri Nov 28 19:29:21 CST 2025 kill -USR1 2254565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254565 killed at Fri Nov 28 19:29:21 CST 2025 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254604 >/dev/null 2>/dev/null selfserv_9351 with PID 2254604 found at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 with PID 2254604 started at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254604 at Fri Nov 28 19:29:21 CST 2025 kill -USR1 2254604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254604 killed at Fri Nov 28 19:29:21 CST 2025 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254643 >/dev/null 2>/dev/null selfserv_9351 with PID 2254643 found at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 with PID 2254643 started at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254643 at Fri Nov 28 19:29:21 CST 2025 kill -USR1 2254643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254643 killed at Fri Nov 28 19:29:21 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254696 >/dev/null 2>/dev/null selfserv_9351 with PID 2254696 found at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 with PID 2254696 started at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254696 at Fri Nov 28 19:29:21 CST 2025 kill -USR1 2254696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254696 killed at Fri Nov 28 19:29:21 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254746 >/dev/null 2>/dev/null selfserv_9351 with PID 2254746 found at Fri Nov 28 19:29:21 CST 2025 selfserv_9351 with PID 2254746 started at Fri Nov 28 19:29:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254746 at Fri Nov 28 19:29:22 CST 2025 kill -USR1 2254746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254746 killed at Fri Nov 28 19:29:22 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254790 >/dev/null 2>/dev/null selfserv_9351 with PID 2254790 found at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 with PID 2254790 started at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254790 at Fri Nov 28 19:29:22 CST 2025 kill -USR1 2254790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254790 killed at Fri Nov 28 19:29:22 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254844 >/dev/null 2>/dev/null selfserv_9351 with PID 2254844 found at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 with PID 2254844 started at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2254844 at Fri Nov 28 19:29:22 CST 2025 kill -USR1 2254844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254844 killed at Fri Nov 28 19:29:22 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254883 >/dev/null 2>/dev/null selfserv_9351 with PID 2254883 found at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 with PID 2254883 started at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2254883 at Fri Nov 28 19:29:22 CST 2025 kill -USR1 2254883 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254883 killed at Fri Nov 28 19:29:22 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254923 >/dev/null 2>/dev/null selfserv_9351 with PID 2254923 found at Fri Nov 28 19:29:22 CST 2025 selfserv_9351 with PID 2254923 started at Fri Nov 28 19:29:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2254923 at Fri Nov 28 19:29:23 CST 2025 kill -USR1 2254923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254923 killed at Fri Nov 28 19:29:23 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2254994 >/dev/null 2>/dev/null selfserv_9351 with PID 2254994 found at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 with PID 2254994 started at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2254994 at Fri Nov 28 19:29:23 CST 2025 kill -USR1 2254994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2254994 killed at Fri Nov 28 19:29:23 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255033 >/dev/null 2>/dev/null selfserv_9351 with PID 2255033 found at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 with PID 2255033 started at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255033 at Fri Nov 28 19:29:23 CST 2025 kill -USR1 2255033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255033 killed at Fri Nov 28 19:29:23 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255072 >/dev/null 2>/dev/null selfserv_9351 with PID 2255072 found at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 with PID 2255072 started at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255072 at Fri Nov 28 19:29:23 CST 2025 kill -USR1 2255072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255072 killed at Fri Nov 28 19:29:23 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255131 >/dev/null 2>/dev/null selfserv_9351 with PID 2255131 found at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 with PID 2255131 started at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255131 at Fri Nov 28 19:29:24 CST 2025 kill -USR1 2255131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255131 killed at Fri Nov 28 19:29:24 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255170 >/dev/null 2>/dev/null selfserv_9351 with PID 2255170 found at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 with PID 2255170 started at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255170 at Fri Nov 28 19:29:24 CST 2025 kill -USR1 2255170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255170 killed at Fri Nov 28 19:29:24 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255209 >/dev/null 2>/dev/null selfserv_9351 with PID 2255209 found at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 with PID 2255209 started at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255209 at Fri Nov 28 19:29:24 CST 2025 kill -USR1 2255209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255209 killed at Fri Nov 28 19:29:24 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255262 >/dev/null 2>/dev/null selfserv_9351 with PID 2255262 found at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 with PID 2255262 started at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255262 at Fri Nov 28 19:29:24 CST 2025 kill -USR1 2255262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255262 killed at Fri Nov 28 19:29:24 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255307 >/dev/null 2>/dev/null selfserv_9351 with PID 2255307 found at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 with PID 2255307 started at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255307 at Fri Nov 28 19:29:25 CST 2025 kill -USR1 2255307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255307 killed at Fri Nov 28 19:29:25 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255346 >/dev/null 2>/dev/null selfserv_9351 with PID 2255346 found at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 with PID 2255346 started at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255346 at Fri Nov 28 19:29:25 CST 2025 kill -USR1 2255346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255346 killed at Fri Nov 28 19:29:25 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255399 >/dev/null 2>/dev/null selfserv_9351 with PID 2255399 found at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 with PID 2255399 started at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255399 at Fri Nov 28 19:29:25 CST 2025 kill -USR1 2255399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255399 killed at Fri Nov 28 19:29:25 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255439 >/dev/null 2>/dev/null selfserv_9351 with PID 2255439 found at Fri Nov 28 19:29:25 CST 2025 selfserv_9351 with PID 2255439 started at Fri Nov 28 19:29:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255439 at Fri Nov 28 19:29:26 CST 2025 kill -USR1 2255439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255439 killed at Fri Nov 28 19:29:26 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255478 >/dev/null 2>/dev/null selfserv_9351 with PID 2255478 found at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 with PID 2255478 started at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255478 at Fri Nov 28 19:29:26 CST 2025 kill -USR1 2255478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255478 killed at Fri Nov 28 19:29:26 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255531 >/dev/null 2>/dev/null selfserv_9351 with PID 2255531 found at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 with PID 2255531 started at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255531 at Fri Nov 28 19:29:26 CST 2025 kill -USR1 2255531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255531 killed at Fri Nov 28 19:29:26 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255570 >/dev/null 2>/dev/null selfserv_9351 with PID 2255570 found at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 with PID 2255570 started at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255570 at Fri Nov 28 19:29:26 CST 2025 kill -USR1 2255570 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255570 killed at Fri Nov 28 19:29:26 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255609 >/dev/null 2>/dev/null selfserv_9351 with PID 2255609 found at Fri Nov 28 19:29:26 CST 2025 selfserv_9351 with PID 2255609 started at Fri Nov 28 19:29:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255609 at Fri Nov 28 19:29:27 CST 2025 kill -USR1 2255609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255609 killed at Fri Nov 28 19:29:27 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255662 >/dev/null 2>/dev/null selfserv_9351 with PID 2255662 found at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 with PID 2255662 started at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255662 at Fri Nov 28 19:29:27 CST 2025 kill -USR1 2255662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255662 killed at Fri Nov 28 19:29:27 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255701 >/dev/null 2>/dev/null selfserv_9351 with PID 2255701 found at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 with PID 2255701 started at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2255701 at Fri Nov 28 19:29:27 CST 2025 kill -USR1 2255701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255701 killed at Fri Nov 28 19:29:27 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255740 >/dev/null 2>/dev/null selfserv_9351 with PID 2255740 found at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 with PID 2255740 started at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255740 at Fri Nov 28 19:29:27 CST 2025 kill -USR1 2255740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255740 killed at Fri Nov 28 19:29:27 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255793 >/dev/null 2>/dev/null selfserv_9351 with PID 2255793 found at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 with PID 2255793 started at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255793 at Fri Nov 28 19:29:28 CST 2025 kill -USR1 2255793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255793 killed at Fri Nov 28 19:29:28 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255832 >/dev/null 2>/dev/null selfserv_9351 with PID 2255832 found at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 with PID 2255832 started at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255832 at Fri Nov 28 19:29:28 CST 2025 kill -USR1 2255832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255832 killed at Fri Nov 28 19:29:28 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255871 >/dev/null 2>/dev/null selfserv_9351 with PID 2255871 found at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 with PID 2255871 started at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255871 at Fri Nov 28 19:29:28 CST 2025 kill -USR1 2255871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255871 killed at Fri Nov 28 19:29:28 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255928 >/dev/null 2>/dev/null selfserv_9351 with PID 2255928 found at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 with PID 2255928 started at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255928 at Fri Nov 28 19:29:28 CST 2025 kill -USR1 2255928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255928 killed at Fri Nov 28 19:29:28 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2255967 >/dev/null 2>/dev/null selfserv_9351 with PID 2255967 found at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 with PID 2255967 started at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2255967 at Fri Nov 28 19:29:29 CST 2025 kill -USR1 2255967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2255967 killed at Fri Nov 28 19:29:29 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256006 >/dev/null 2>/dev/null selfserv_9351 with PID 2256006 found at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 with PID 2256006 started at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2256006 at Fri Nov 28 19:29:29 CST 2025 kill -USR1 2256006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256006 killed at Fri Nov 28 19:29:29 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256059 >/dev/null 2>/dev/null selfserv_9351 with PID 2256059 found at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 with PID 2256059 started at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2256059 at Fri Nov 28 19:29:29 CST 2025 kill -USR1 2256059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256059 killed at Fri Nov 28 19:29:29 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256098 >/dev/null 2>/dev/null selfserv_9351 with PID 2256098 found at Fri Nov 28 19:29:29 CST 2025 selfserv_9351 with PID 2256098 started at Fri Nov 28 19:29:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256098 at Fri Nov 28 19:29:30 CST 2025 kill -USR1 2256098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256098 killed at Fri Nov 28 19:29:30 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256143 >/dev/null 2>/dev/null selfserv_9351 with PID 2256143 found at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 with PID 2256143 started at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2256143 at Fri Nov 28 19:29:30 CST 2025 kill -USR1 2256143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256143 killed at Fri Nov 28 19:29:30 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256196 >/dev/null 2>/dev/null selfserv_9351 with PID 2256196 found at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 with PID 2256196 started at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256196 at Fri Nov 28 19:29:30 CST 2025 kill -USR1 2256196 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256196 killed at Fri Nov 28 19:29:30 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256235 >/dev/null 2>/dev/null selfserv_9351 with PID 2256235 found at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 with PID 2256235 started at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256235 at Fri Nov 28 19:29:30 CST 2025 kill -USR1 2256235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256235 killed at Fri Nov 28 19:29:30 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256278 >/dev/null 2>/dev/null selfserv_9351 with PID 2256278 found at Fri Nov 28 19:29:30 CST 2025 selfserv_9351 with PID 2256278 started at Fri Nov 28 19:29:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256278 at Fri Nov 28 19:29:31 CST 2025 kill -USR1 2256278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256278 killed at Fri Nov 28 19:29:31 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256331 >/dev/null 2>/dev/null selfserv_9351 with PID 2256331 found at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 with PID 2256331 started at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256331 at Fri Nov 28 19:29:31 CST 2025 kill -USR1 2256331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256331 killed at Fri Nov 28 19:29:31 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256370 >/dev/null 2>/dev/null selfserv_9351 with PID 2256370 found at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 with PID 2256370 started at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256370 at Fri Nov 28 19:29:31 CST 2025 kill -USR1 2256370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256370 killed at Fri Nov 28 19:29:31 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256409 >/dev/null 2>/dev/null selfserv_9351 with PID 2256409 found at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 with PID 2256409 started at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256409 at Fri Nov 28 19:29:31 CST 2025 kill -USR1 2256409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256409 killed at Fri Nov 28 19:29:31 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256466 >/dev/null 2>/dev/null selfserv_9351 with PID 2256466 found at Fri Nov 28 19:29:31 CST 2025 selfserv_9351 with PID 2256466 started at Fri Nov 28 19:29:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256466 at Fri Nov 28 19:29:32 CST 2025 kill -USR1 2256466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256466 killed at Fri Nov 28 19:29:32 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256505 >/dev/null 2>/dev/null selfserv_9351 with PID 2256505 found at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 with PID 2256505 started at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256505 at Fri Nov 28 19:29:32 CST 2025 kill -USR1 2256505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256505 killed at Fri Nov 28 19:29:32 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256544 >/dev/null 2>/dev/null selfserv_9351 with PID 2256544 found at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 with PID 2256544 started at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256544 at Fri Nov 28 19:29:32 CST 2025 kill -USR1 2256544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256544 killed at Fri Nov 28 19:29:32 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256597 >/dev/null 2>/dev/null selfserv_9351 with PID 2256597 found at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 with PID 2256597 started at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256597 at Fri Nov 28 19:29:32 CST 2025 kill -USR1 2256597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256597 killed at Fri Nov 28 19:29:32 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256637 >/dev/null 2>/dev/null selfserv_9351 with PID 2256637 found at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 with PID 2256637 started at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256637 at Fri Nov 28 19:29:33 CST 2025 kill -USR1 2256637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256637 killed at Fri Nov 28 19:29:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256676 >/dev/null 2>/dev/null selfserv_9351 with PID 2256676 found at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 with PID 2256676 started at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256676 at Fri Nov 28 19:29:33 CST 2025 kill -USR1 2256676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256676 killed at Fri Nov 28 19:29:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256729 >/dev/null 2>/dev/null selfserv_9351 with PID 2256729 found at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 with PID 2256729 started at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256729 at Fri Nov 28 19:29:33 CST 2025 kill -USR1 2256729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256729 killed at Fri Nov 28 19:29:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256768 >/dev/null 2>/dev/null selfserv_9351 with PID 2256768 found at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 with PID 2256768 started at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256768 at Fri Nov 28 19:29:33 CST 2025 kill -USR1 2256768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256768 killed at Fri Nov 28 19:29:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256812 >/dev/null 2>/dev/null selfserv_9351 with PID 2256812 found at Fri Nov 28 19:29:33 CST 2025 selfserv_9351 with PID 2256812 started at Fri Nov 28 19:29:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256812 at Fri Nov 28 19:29:34 CST 2025 kill -USR1 2256812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256812 killed at Fri Nov 28 19:29:34 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256865 >/dev/null 2>/dev/null selfserv_9351 with PID 2256865 found at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 with PID 2256865 started at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256865 at Fri Nov 28 19:29:34 CST 2025 kill -USR1 2256865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256865 killed at Fri Nov 28 19:29:34 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256904 >/dev/null 2>/dev/null selfserv_9351 with PID 2256904 found at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 with PID 2256904 started at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2256904 at Fri Nov 28 19:29:34 CST 2025 kill -USR1 2256904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256904 killed at Fri Nov 28 19:29:34 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2256943 >/dev/null 2>/dev/null selfserv_9351 with PID 2256943 found at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 with PID 2256943 started at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2256943 at Fri Nov 28 19:29:34 CST 2025 kill -USR1 2256943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2256943 killed at Fri Nov 28 19:29:34 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257002 >/dev/null 2>/dev/null selfserv_9351 with PID 2257002 found at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 with PID 2257002 started at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257002 at Fri Nov 28 19:29:35 CST 2025 kill -USR1 2257002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257002 killed at Fri Nov 28 19:29:35 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257041 >/dev/null 2>/dev/null selfserv_9351 with PID 2257041 found at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 with PID 2257041 started at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257041 at Fri Nov 28 19:29:35 CST 2025 kill -USR1 2257041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257041 killed at Fri Nov 28 19:29:35 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257080 >/dev/null 2>/dev/null selfserv_9351 with PID 2257080 found at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 with PID 2257080 started at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257080 at Fri Nov 28 19:29:35 CST 2025 kill -USR1 2257080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257080 killed at Fri Nov 28 19:29:35 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257134 >/dev/null 2>/dev/null selfserv_9351 with PID 2257134 found at Fri Nov 28 19:29:35 CST 2025 selfserv_9351 with PID 2257134 started at Fri Nov 28 19:29:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257134 at Fri Nov 28 19:29:36 CST 2025 kill -USR1 2257134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257134 killed at Fri Nov 28 19:29:36 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257173 >/dev/null 2>/dev/null selfserv_9351 with PID 2257173 found at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 with PID 2257173 started at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257173 at Fri Nov 28 19:29:36 CST 2025 kill -USR1 2257173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257173 killed at Fri Nov 28 19:29:36 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257212 >/dev/null 2>/dev/null selfserv_9351 with PID 2257212 found at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 with PID 2257212 started at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257212 at Fri Nov 28 19:29:36 CST 2025 kill -USR1 2257212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257212 killed at Fri Nov 28 19:29:36 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257265 >/dev/null 2>/dev/null selfserv_9351 with PID 2257265 found at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 with PID 2257265 started at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257265 at Fri Nov 28 19:29:36 CST 2025 kill -USR1 2257265 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257265 killed at Fri Nov 28 19:29:36 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257304 >/dev/null 2>/dev/null selfserv_9351 with PID 2257304 found at Fri Nov 28 19:29:36 CST 2025 selfserv_9351 with PID 2257304 started at Fri Nov 28 19:29:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257304 at Fri Nov 28 19:29:37 CST 2025 kill -USR1 2257304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257304 killed at Fri Nov 28 19:29:37 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257343 >/dev/null 2>/dev/null selfserv_9351 with PID 2257343 found at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 with PID 2257343 started at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257343 at Fri Nov 28 19:29:37 CST 2025 kill -USR1 2257343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257343 killed at Fri Nov 28 19:29:37 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257396 >/dev/null 2>/dev/null selfserv_9351 with PID 2257396 found at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 with PID 2257396 started at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257396 at Fri Nov 28 19:29:37 CST 2025 kill -USR1 2257396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257396 killed at Fri Nov 28 19:29:37 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257435 >/dev/null 2>/dev/null selfserv_9351 with PID 2257435 found at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 with PID 2257435 started at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257435 at Fri Nov 28 19:29:37 CST 2025 kill -USR1 2257435 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257435 killed at Fri Nov 28 19:29:37 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257474 >/dev/null 2>/dev/null selfserv_9351 with PID 2257474 found at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 with PID 2257474 started at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257474 at Fri Nov 28 19:29:38 CST 2025 kill -USR1 2257474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257474 killed at Fri Nov 28 19:29:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257527 >/dev/null 2>/dev/null selfserv_9351 with PID 2257527 found at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 with PID 2257527 started at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257527 at Fri Nov 28 19:29:38 CST 2025 kill -USR1 2257527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257527 killed at Fri Nov 28 19:29:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257566 >/dev/null 2>/dev/null selfserv_9351 with PID 2257566 found at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 with PID 2257566 started at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257566 at Fri Nov 28 19:29:38 CST 2025 kill -USR1 2257566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257566 killed at Fri Nov 28 19:29:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257605 >/dev/null 2>/dev/null selfserv_9351 with PID 2257605 found at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 with PID 2257605 started at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257605 at Fri Nov 28 19:29:38 CST 2025 kill -USR1 2257605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257605 killed at Fri Nov 28 19:29:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257662 >/dev/null 2>/dev/null selfserv_9351 with PID 2257662 found at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 with PID 2257662 started at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257662 at Fri Nov 28 19:29:39 CST 2025 kill -USR1 2257662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257662 killed at Fri Nov 28 19:29:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257701 >/dev/null 2>/dev/null selfserv_9351 with PID 2257701 found at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 with PID 2257701 started at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257701 at Fri Nov 28 19:29:39 CST 2025 kill -USR1 2257701 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257701 killed at Fri Nov 28 19:29:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257740 >/dev/null 2>/dev/null selfserv_9351 with PID 2257740 found at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 with PID 2257740 started at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2257740 at Fri Nov 28 19:29:39 CST 2025 kill -USR1 2257740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257740 killed at Fri Nov 28 19:29:39 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257799 >/dev/null 2>/dev/null selfserv_9351 with PID 2257799 found at Fri Nov 28 19:29:39 CST 2025 selfserv_9351 with PID 2257799 started at Fri Nov 28 19:29:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257799 at Fri Nov 28 19:29:40 CST 2025 kill -USR1 2257799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257799 killed at Fri Nov 28 19:29:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257838 >/dev/null 2>/dev/null selfserv_9351 with PID 2257838 found at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 with PID 2257838 started at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257838 at Fri Nov 28 19:29:40 CST 2025 kill -USR1 2257838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257838 killed at Fri Nov 28 19:29:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257877 >/dev/null 2>/dev/null selfserv_9351 with PID 2257877 found at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 with PID 2257877 started at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257877 at Fri Nov 28 19:29:40 CST 2025 kill -USR1 2257877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257877 killed at Fri Nov 28 19:29:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257930 >/dev/null 2>/dev/null selfserv_9351 with PID 2257930 found at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 with PID 2257930 started at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257930 at Fri Nov 28 19:29:40 CST 2025 kill -USR1 2257930 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257930 killed at Fri Nov 28 19:29:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2257973 >/dev/null 2>/dev/null selfserv_9351 with PID 2257973 found at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 with PID 2257973 started at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2257973 at Fri Nov 28 19:29:41 CST 2025 kill -USR1 2257973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2257973 killed at Fri Nov 28 19:29:41 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258012 >/dev/null 2>/dev/null selfserv_9351 with PID 2258012 found at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 with PID 2258012 started at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258012 at Fri Nov 28 19:29:41 CST 2025 kill -USR1 2258012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258012 killed at Fri Nov 28 19:29:41 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258065 >/dev/null 2>/dev/null selfserv_9351 with PID 2258065 found at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 with PID 2258065 started at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258065 at Fri Nov 28 19:29:41 CST 2025 kill -USR1 2258065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258065 killed at Fri Nov 28 19:29:41 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258108 >/dev/null 2>/dev/null selfserv_9351 with PID 2258108 found at Fri Nov 28 19:29:41 CST 2025 selfserv_9351 with PID 2258108 started at Fri Nov 28 19:29:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258108 at Fri Nov 28 19:29:42 CST 2025 kill -USR1 2258108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258108 killed at Fri Nov 28 19:29:42 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258147 >/dev/null 2>/dev/null selfserv_9351 with PID 2258147 found at Fri Nov 28 19:29:42 CST 2025 selfserv_9351 with PID 2258147 started at Fri Nov 28 19:29:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258147 at Fri Nov 28 19:29:42 CST 2025 kill -USR1 2258147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258147 killed at Fri Nov 28 19:29:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258200 >/dev/null 2>/dev/null selfserv_9351 with PID 2258200 found at Fri Nov 28 19:29:42 CST 2025 selfserv_9351 with PID 2258200 started at Fri Nov 28 19:29:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258200 at Fri Nov 28 19:29:42 CST 2025 kill -USR1 2258200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258200 killed at Fri Nov 28 19:29:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258239 >/dev/null 2>/dev/null selfserv_9351 with PID 2258239 found at Fri Nov 28 19:29:42 CST 2025 selfserv_9351 with PID 2258239 started at Fri Nov 28 19:29:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258239 at Fri Nov 28 19:29:43 CST 2025 kill -USR1 2258239 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258239 killed at Fri Nov 28 19:29:43 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258279 >/dev/null 2>/dev/null selfserv_9351 with PID 2258279 found at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 with PID 2258279 started at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258279 at Fri Nov 28 19:29:43 CST 2025 kill -USR1 2258279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258279 killed at Fri Nov 28 19:29:43 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258332 >/dev/null 2>/dev/null selfserv_9351 with PID 2258332 found at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 with PID 2258332 started at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258332 at Fri Nov 28 19:29:43 CST 2025 kill -USR1 2258332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258332 killed at Fri Nov 28 19:29:43 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258371 >/dev/null 2>/dev/null selfserv_9351 with PID 2258371 found at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 with PID 2258371 started at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258371 at Fri Nov 28 19:29:43 CST 2025 kill -USR1 2258371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258371 killed at Fri Nov 28 19:29:43 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258415 >/dev/null 2>/dev/null selfserv_9351 with PID 2258415 found at Fri Nov 28 19:29:43 CST 2025 selfserv_9351 with PID 2258415 started at Fri Nov 28 19:29:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258415 at Fri Nov 28 19:29:44 CST 2025 kill -USR1 2258415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258415 killed at Fri Nov 28 19:29:44 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258468 >/dev/null 2>/dev/null selfserv_9351 with PID 2258468 found at Fri Nov 28 19:29:44 CST 2025 selfserv_9351 with PID 2258468 started at Fri Nov 28 19:29:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258468 at Fri Nov 28 19:29:44 CST 2025 kill -USR1 2258468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258468 killed at Fri Nov 28 19:29:44 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258507 >/dev/null 2>/dev/null selfserv_9351 with PID 2258507 found at Fri Nov 28 19:29:44 CST 2025 selfserv_9351 with PID 2258507 started at Fri Nov 28 19:29:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258507 at Fri Nov 28 19:29:44 CST 2025 kill -USR1 2258507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258507 killed at Fri Nov 28 19:29:44 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258546 >/dev/null 2>/dev/null selfserv_9351 with PID 2258546 found at Fri Nov 28 19:29:44 CST 2025 selfserv_9351 with PID 2258546 started at Fri Nov 28 19:29:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258546 at Fri Nov 28 19:29:45 CST 2025 kill -USR1 2258546 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258546 killed at Fri Nov 28 19:29:45 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258605 >/dev/null 2>/dev/null selfserv_9351 with PID 2258605 found at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 with PID 2258605 started at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258605 at Fri Nov 28 19:29:45 CST 2025 kill -USR1 2258605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258605 killed at Fri Nov 28 19:29:45 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258644 >/dev/null 2>/dev/null selfserv_9351 with PID 2258644 found at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 with PID 2258644 started at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258644 at Fri Nov 28 19:29:45 CST 2025 kill -USR1 2258644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258644 killed at Fri Nov 28 19:29:45 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258683 >/dev/null 2>/dev/null selfserv_9351 with PID 2258683 found at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 with PID 2258683 started at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258683 at Fri Nov 28 19:29:45 CST 2025 kill -USR1 2258683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258683 killed at Fri Nov 28 19:29:45 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258737 >/dev/null 2>/dev/null selfserv_9351 with PID 2258737 found at Fri Nov 28 19:29:45 CST 2025 selfserv_9351 with PID 2258737 started at Fri Nov 28 19:29:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258737 at Fri Nov 28 19:29:46 CST 2025 kill -USR1 2258737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258737 killed at Fri Nov 28 19:29:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258776 >/dev/null 2>/dev/null selfserv_9351 with PID 2258776 found at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 with PID 2258776 started at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258776 at Fri Nov 28 19:29:46 CST 2025 kill -USR1 2258776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258776 killed at Fri Nov 28 19:29:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258815 >/dev/null 2>/dev/null selfserv_9351 with PID 2258815 found at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 with PID 2258815 started at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258815 at Fri Nov 28 19:29:46 CST 2025 kill -USR1 2258815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258815 killed at Fri Nov 28 19:29:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258868 >/dev/null 2>/dev/null selfserv_9351 with PID 2258868 found at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 with PID 2258868 started at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258868 at Fri Nov 28 19:29:46 CST 2025 kill -USR1 2258868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258868 killed at Fri Nov 28 19:29:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258907 >/dev/null 2>/dev/null selfserv_9351 with PID 2258907 found at Fri Nov 28 19:29:46 CST 2025 selfserv_9351 with PID 2258907 started at Fri Nov 28 19:29:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258907 at Fri Nov 28 19:29:47 CST 2025 kill -USR1 2258907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258907 killed at Fri Nov 28 19:29:47 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258946 >/dev/null 2>/dev/null selfserv_9351 with PID 2258946 found at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 with PID 2258946 started at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2258946 at Fri Nov 28 19:29:47 CST 2025 kill -USR1 2258946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258946 killed at Fri Nov 28 19:29:47 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2258999 >/dev/null 2>/dev/null selfserv_9351 with PID 2258999 found at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 with PID 2258999 started at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2258999 at Fri Nov 28 19:29:47 CST 2025 kill -USR1 2258999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2258999 killed at Fri Nov 28 19:29:47 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259038 >/dev/null 2>/dev/null selfserv_9351 with PID 2259038 found at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 with PID 2259038 started at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2259038 at Fri Nov 28 19:29:47 CST 2025 kill -USR1 2259038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259038 killed at Fri Nov 28 19:29:47 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259077 >/dev/null 2>/dev/null selfserv_9351 with PID 2259077 found at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 with PID 2259077 started at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2259077 at Fri Nov 28 19:29:48 CST 2025 kill -USR1 2259077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259077 killed at Fri Nov 28 19:29:48 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259130 >/dev/null 2>/dev/null selfserv_9351 with PID 2259130 found at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 with PID 2259130 started at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2259130 at Fri Nov 28 19:29:48 CST 2025 kill -USR1 2259130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259130 killed at Fri Nov 28 19:29:48 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259169 >/dev/null 2>/dev/null selfserv_9351 with PID 2259169 found at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 with PID 2259169 started at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259169 at Fri Nov 28 19:29:48 CST 2025 kill -USR1 2259169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259169 killed at Fri Nov 28 19:29:48 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259208 >/dev/null 2>/dev/null selfserv_9351 with PID 2259208 found at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 with PID 2259208 started at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2259208 at Fri Nov 28 19:29:48 CST 2025 kill -USR1 2259208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259208 killed at Fri Nov 28 19:29:48 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259265 >/dev/null 2>/dev/null selfserv_9351 with PID 2259265 found at Fri Nov 28 19:29:49 CST 2025 selfserv_9351 with PID 2259265 started at Fri Nov 28 19:29:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259265 at Fri Nov 28 19:29:49 CST 2025 kill -USR1 2259265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259265 killed at Fri Nov 28 19:29:49 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259304 >/dev/null 2>/dev/null selfserv_9351 with PID 2259304 found at Fri Nov 28 19:29:49 CST 2025 selfserv_9351 with PID 2259304 started at Fri Nov 28 19:29:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259304 at Fri Nov 28 19:29:49 CST 2025 kill -USR1 2259304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259304 killed at Fri Nov 28 19:29:49 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259343 >/dev/null 2>/dev/null selfserv_9351 with PID 2259343 found at Fri Nov 28 19:29:49 CST 2025 selfserv_9351 with PID 2259343 started at Fri Nov 28 19:29:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259343 at Fri Nov 28 19:29:49 CST 2025 kill -USR1 2259343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259343 killed at Fri Nov 28 19:29:49 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259402 >/dev/null 2>/dev/null selfserv_9351 with PID 2259402 found at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 with PID 2259402 started at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259402 at Fri Nov 28 19:29:50 CST 2025 kill -USR1 2259402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259402 killed at Fri Nov 28 19:29:50 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259441 >/dev/null 2>/dev/null selfserv_9351 with PID 2259441 found at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 with PID 2259441 started at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259441 at Fri Nov 28 19:29:50 CST 2025 kill -USR1 2259441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259441 killed at Fri Nov 28 19:29:50 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259480 >/dev/null 2>/dev/null selfserv_9351 with PID 2259480 found at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 with PID 2259480 started at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259480 at Fri Nov 28 19:29:50 CST 2025 kill -USR1 2259480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259480 killed at Fri Nov 28 19:29:50 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259533 >/dev/null 2>/dev/null selfserv_9351 with PID 2259533 found at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 with PID 2259533 started at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259533 at Fri Nov 28 19:29:50 CST 2025 kill -USR1 2259533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259533 killed at Fri Nov 28 19:29:50 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259576 >/dev/null 2>/dev/null selfserv_9351 with PID 2259576 found at Fri Nov 28 19:29:50 CST 2025 selfserv_9351 with PID 2259576 started at Fri Nov 28 19:29:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259576 at Fri Nov 28 19:29:51 CST 2025 kill -USR1 2259576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259576 killed at Fri Nov 28 19:29:51 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259615 >/dev/null 2>/dev/null selfserv_9351 with PID 2259615 found at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 with PID 2259615 started at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259615 at Fri Nov 28 19:29:51 CST 2025 kill -USR1 2259615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259615 killed at Fri Nov 28 19:29:51 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259668 >/dev/null 2>/dev/null selfserv_9351 with PID 2259668 found at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 with PID 2259668 started at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259668 at Fri Nov 28 19:29:51 CST 2025 kill -USR1 2259668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259668 killed at Fri Nov 28 19:29:51 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259707 >/dev/null 2>/dev/null selfserv_9351 with PID 2259707 found at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 with PID 2259707 started at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259707 at Fri Nov 28 19:29:51 CST 2025 kill -USR1 2259707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259707 killed at Fri Nov 28 19:29:51 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259750 >/dev/null 2>/dev/null selfserv_9351 with PID 2259750 found at Fri Nov 28 19:29:51 CST 2025 selfserv_9351 with PID 2259750 started at Fri Nov 28 19:29:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259750 at Fri Nov 28 19:29:52 CST 2025 kill -USR1 2259750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259750 killed at Fri Nov 28 19:29:52 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259803 >/dev/null 2>/dev/null selfserv_9351 with PID 2259803 found at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 with PID 2259803 started at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259803 at Fri Nov 28 19:29:52 CST 2025 kill -USR1 2259803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259803 killed at Fri Nov 28 19:29:52 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259842 >/dev/null 2>/dev/null selfserv_9351 with PID 2259842 found at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 with PID 2259842 started at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259842 at Fri Nov 28 19:29:52 CST 2025 kill -USR1 2259842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259842 killed at Fri Nov 28 19:29:52 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259881 >/dev/null 2>/dev/null selfserv_9351 with PID 2259881 found at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 with PID 2259881 started at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2259881 at Fri Nov 28 19:29:52 CST 2025 kill -USR1 2259881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259881 killed at Fri Nov 28 19:29:52 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259935 >/dev/null 2>/dev/null selfserv_9351 with PID 2259935 found at Fri Nov 28 19:29:52 CST 2025 selfserv_9351 with PID 2259935 started at Fri Nov 28 19:29:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259935 at Fri Nov 28 19:29:52 CST 2025 kill -USR1 2259935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259935 killed at Fri Nov 28 19:29:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2259974 >/dev/null 2>/dev/null selfserv_9351 with PID 2259974 found at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 with PID 2259974 started at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2259974 at Fri Nov 28 19:29:53 CST 2025 kill -USR1 2259974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2259974 killed at Fri Nov 28 19:29:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260013 >/dev/null 2>/dev/null selfserv_9351 with PID 2260013 found at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 with PID 2260013 started at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260013 at Fri Nov 28 19:29:53 CST 2025 kill -USR1 2260013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260013 killed at Fri Nov 28 19:29:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260066 >/dev/null 2>/dev/null selfserv_9351 with PID 2260066 found at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 with PID 2260066 started at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260066 at Fri Nov 28 19:29:53 CST 2025 kill -USR1 2260066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260066 killed at Fri Nov 28 19:29:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260111 >/dev/null 2>/dev/null selfserv_9351 with PID 2260111 found at Fri Nov 28 19:29:53 CST 2025 selfserv_9351 with PID 2260111 started at Fri Nov 28 19:29:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260111 at Fri Nov 28 19:29:54 CST 2025 kill -USR1 2260111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260111 killed at Fri Nov 28 19:29:54 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260150 >/dev/null 2>/dev/null selfserv_9351 with PID 2260150 found at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 with PID 2260150 started at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260150 at Fri Nov 28 19:29:54 CST 2025 kill -USR1 2260150 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260150 killed at Fri Nov 28 19:29:54 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260203 >/dev/null 2>/dev/null selfserv_9351 with PID 2260203 found at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 with PID 2260203 started at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260203 at Fri Nov 28 19:29:54 CST 2025 kill -USR1 2260203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260203 killed at Fri Nov 28 19:29:54 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260242 >/dev/null 2>/dev/null selfserv_9351 with PID 2260242 found at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 with PID 2260242 started at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260242 at Fri Nov 28 19:29:54 CST 2025 kill -USR1 2260242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260242 killed at Fri Nov 28 19:29:54 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260287 >/dev/null 2>/dev/null selfserv_9351 with PID 2260287 found at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 with PID 2260287 started at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260287 at Fri Nov 28 19:29:54 CST 2025 kill -USR1 2260287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260287 killed at Fri Nov 28 19:29:54 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260340 >/dev/null 2>/dev/null selfserv_9351 with PID 2260340 found at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 with PID 2260340 started at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260340 at Fri Nov 28 19:29:55 CST 2025 kill -USR1 2260340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260340 killed at Fri Nov 28 19:29:55 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260379 >/dev/null 2>/dev/null selfserv_9351 with PID 2260379 found at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 with PID 2260379 started at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260379 at Fri Nov 28 19:29:55 CST 2025 kill -USR1 2260379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260379 killed at Fri Nov 28 19:29:55 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260418 >/dev/null 2>/dev/null selfserv_9351 with PID 2260418 found at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 with PID 2260418 started at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2260418 at Fri Nov 28 19:29:55 CST 2025 kill -USR1 2260418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260418 killed at Fri Nov 28 19:29:55 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260472 >/dev/null 2>/dev/null selfserv_9351 with PID 2260472 found at Fri Nov 28 19:29:55 CST 2025 selfserv_9351 with PID 2260472 started at Fri Nov 28 19:29:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260472 at Fri Nov 28 19:29:56 CST 2025 kill -USR1 2260472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260472 killed at Fri Nov 28 19:29:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260511 >/dev/null 2>/dev/null selfserv_9351 with PID 2260511 found at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 with PID 2260511 started at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260511 at Fri Nov 28 19:29:56 CST 2025 kill -USR1 2260511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260511 killed at Fri Nov 28 19:29:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260550 >/dev/null 2>/dev/null selfserv_9351 with PID 2260550 found at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 with PID 2260550 started at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260550 at Fri Nov 28 19:29:56 CST 2025 kill -USR1 2260550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260550 killed at Fri Nov 28 19:29:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260603 >/dev/null 2>/dev/null selfserv_9351 with PID 2260603 found at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 with PID 2260603 started at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260603 at Fri Nov 28 19:29:56 CST 2025 kill -USR1 2260603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260603 killed at Fri Nov 28 19:29:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260642 >/dev/null 2>/dev/null selfserv_9351 with PID 2260642 found at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 with PID 2260642 started at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260642 at Fri Nov 28 19:29:56 CST 2025 kill -USR1 2260642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260642 killed at Fri Nov 28 19:29:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260681 >/dev/null 2>/dev/null selfserv_9351 with PID 2260681 found at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 with PID 2260681 started at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260681 at Fri Nov 28 19:29:57 CST 2025 kill -USR1 2260681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260681 killed at Fri Nov 28 19:29:57 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260734 >/dev/null 2>/dev/null selfserv_9351 with PID 2260734 found at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 with PID 2260734 started at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260734 at Fri Nov 28 19:29:57 CST 2025 kill -USR1 2260734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260734 killed at Fri Nov 28 19:29:57 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260773 >/dev/null 2>/dev/null selfserv_9351 with PID 2260773 found at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 with PID 2260773 started at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260773 at Fri Nov 28 19:29:57 CST 2025 kill -USR1 2260773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260773 killed at Fri Nov 28 19:29:57 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260812 >/dev/null 2>/dev/null selfserv_9351 with PID 2260812 found at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 with PID 2260812 started at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260812 at Fri Nov 28 19:29:57 CST 2025 kill -USR1 2260812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260812 killed at Fri Nov 28 19:29:57 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260865 >/dev/null 2>/dev/null selfserv_9351 with PID 2260865 found at Fri Nov 28 19:29:57 CST 2025 selfserv_9351 with PID 2260865 started at Fri Nov 28 19:29:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260865 at Fri Nov 28 19:29:58 CST 2025 kill -USR1 2260865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260865 killed at Fri Nov 28 19:29:58 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260904 >/dev/null 2>/dev/null selfserv_9351 with PID 2260904 found at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 with PID 2260904 started at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260904 at Fri Nov 28 19:29:58 CST 2025 kill -USR1 2260904 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260904 killed at Fri Nov 28 19:29:58 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260943 >/dev/null 2>/dev/null selfserv_9351 with PID 2260943 found at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 with PID 2260943 started at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2260943 at Fri Nov 28 19:29:58 CST 2025 kill -USR1 2260943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260943 killed at Fri Nov 28 19:29:58 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2260996 >/dev/null 2>/dev/null selfserv_9351 with PID 2260996 found at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 with PID 2260996 started at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2260996 at Fri Nov 28 19:29:58 CST 2025 kill -USR1 2260996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2260996 killed at Fri Nov 28 19:29:58 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261039 >/dev/null 2>/dev/null selfserv_9351 with PID 2261039 found at Fri Nov 28 19:29:58 CST 2025 selfserv_9351 with PID 2261039 started at Fri Nov 28 19:29:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261039 at Fri Nov 28 19:29:59 CST 2025 kill -USR1 2261039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261039 killed at Fri Nov 28 19:29:59 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261090 >/dev/null 2>/dev/null selfserv_9351 with PID 2261090 found at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 with PID 2261090 started at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261090 at Fri Nov 28 19:29:59 CST 2025 kill -USR1 2261090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261090 killed at Fri Nov 28 19:29:59 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261143 >/dev/null 2>/dev/null selfserv_9351 with PID 2261143 found at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 with PID 2261143 started at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261143 at Fri Nov 28 19:29:59 CST 2025 kill -USR1 2261143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261143 killed at Fri Nov 28 19:29:59 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261182 >/dev/null 2>/dev/null selfserv_9351 with PID 2261182 found at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 with PID 2261182 started at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261182 at Fri Nov 28 19:29:59 CST 2025 kill -USR1 2261182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261182 killed at Fri Nov 28 19:29:59 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261227 >/dev/null 2>/dev/null selfserv_9351 with PID 2261227 found at Fri Nov 28 19:29:59 CST 2025 selfserv_9351 with PID 2261227 started at Fri Nov 28 19:29:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261227 at Fri Nov 28 19:30:00 CST 2025 kill -USR1 2261227 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261227 killed at Fri Nov 28 19:30:00 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261280 >/dev/null 2>/dev/null selfserv_9351 with PID 2261280 found at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 with PID 2261280 started at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261280 at Fri Nov 28 19:30:00 CST 2025 kill -USR1 2261280 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261280 killed at Fri Nov 28 19:30:00 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261319 >/dev/null 2>/dev/null selfserv_9351 with PID 2261319 found at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 with PID 2261319 started at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261319 at Fri Nov 28 19:30:00 CST 2025 kill -USR1 2261319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261319 killed at Fri Nov 28 19:30:00 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261358 >/dev/null 2>/dev/null selfserv_9351 with PID 2261358 found at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 with PID 2261358 started at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261358 at Fri Nov 28 19:30:00 CST 2025 kill -USR1 2261358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261358 killed at Fri Nov 28 19:30:00 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261415 >/dev/null 2>/dev/null selfserv_9351 with PID 2261415 found at Fri Nov 28 19:30:00 CST 2025 selfserv_9351 with PID 2261415 started at Fri Nov 28 19:30:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261415 at Fri Nov 28 19:30:01 CST 2025 kill -USR1 2261415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261415 killed at Fri Nov 28 19:30:01 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261454 >/dev/null 2>/dev/null selfserv_9351 with PID 2261454 found at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 with PID 2261454 started at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261454 at Fri Nov 28 19:30:01 CST 2025 kill -USR1 2261454 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261454 killed at Fri Nov 28 19:30:01 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261493 >/dev/null 2>/dev/null selfserv_9351 with PID 2261493 found at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 with PID 2261493 started at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261493 at Fri Nov 28 19:30:01 CST 2025 kill -USR1 2261493 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261493 killed at Fri Nov 28 19:30:01 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261568 >/dev/null 2>/dev/null selfserv_9351 with PID 2261568 found at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 with PID 2261568 started at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261568 at Fri Nov 28 19:30:01 CST 2025 kill -USR1 2261568 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261568 killed at Fri Nov 28 19:30:01 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261612 >/dev/null 2>/dev/null selfserv_9351 with PID 2261612 found at Fri Nov 28 19:30:01 CST 2025 selfserv_9351 with PID 2261612 started at Fri Nov 28 19:30:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261612 at Fri Nov 28 19:30:02 CST 2025 kill -USR1 2261612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261612 killed at Fri Nov 28 19:30:02 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261651 >/dev/null 2>/dev/null selfserv_9351 with PID 2261651 found at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 with PID 2261651 started at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261651 at Fri Nov 28 19:30:02 CST 2025 kill -USR1 2261651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261651 killed at Fri Nov 28 19:30:02 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261741 >/dev/null 2>/dev/null selfserv_9351 with PID 2261741 found at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 with PID 2261741 started at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261741 at Fri Nov 28 19:30:02 CST 2025 kill -USR1 2261741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261741 killed at Fri Nov 28 19:30:02 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261789 >/dev/null 2>/dev/null selfserv_9351 with PID 2261789 found at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 with PID 2261789 started at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2261789 at Fri Nov 28 19:30:02 CST 2025 kill -USR1 2261789 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261789 killed at Fri Nov 28 19:30:02 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261830 >/dev/null 2>/dev/null selfserv_9351 with PID 2261830 found at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 with PID 2261830 started at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261830 at Fri Nov 28 19:30:03 CST 2025 kill -USR1 2261830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261830 killed at Fri Nov 28 19:30:03 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261883 >/dev/null 2>/dev/null selfserv_9351 with PID 2261883 found at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 with PID 2261883 started at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261883 at Fri Nov 28 19:30:03 CST 2025 kill -USR1 2261883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261883 killed at Fri Nov 28 19:30:03 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261922 >/dev/null 2>/dev/null selfserv_9351 with PID 2261922 found at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 with PID 2261922 started at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261922 at Fri Nov 28 19:30:03 CST 2025 kill -USR1 2261922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261922 killed at Fri Nov 28 19:30:03 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2261961 >/dev/null 2>/dev/null selfserv_9351 with PID 2261961 found at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 with PID 2261961 started at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2261961 at Fri Nov 28 19:30:03 CST 2025 kill -USR1 2261961 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2261961 killed at Fri Nov 28 19:30:03 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262019 >/dev/null 2>/dev/null selfserv_9351 with PID 2262019 found at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 with PID 2262019 started at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2262019 at Fri Nov 28 19:30:04 CST 2025 kill -USR1 2262019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262019 killed at Fri Nov 28 19:30:04 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262058 >/dev/null 2>/dev/null selfserv_9351 with PID 2262058 found at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 with PID 2262058 started at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262058 at Fri Nov 28 19:30:04 CST 2025 kill -USR1 2262058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262058 killed at Fri Nov 28 19:30:04 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262097 >/dev/null 2>/dev/null selfserv_9351 with PID 2262097 found at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 with PID 2262097 started at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2262097 at Fri Nov 28 19:30:04 CST 2025 kill -USR1 2262097 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262097 killed at Fri Nov 28 19:30:04 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262156 >/dev/null 2>/dev/null selfserv_9351 with PID 2262156 found at Fri Nov 28 19:30:04 CST 2025 selfserv_9351 with PID 2262156 started at Fri Nov 28 19:30:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262156 at Fri Nov 28 19:30:05 CST 2025 kill -USR1 2262156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262156 killed at Fri Nov 28 19:30:05 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262195 >/dev/null 2>/dev/null selfserv_9351 with PID 2262195 found at Fri Nov 28 19:30:05 CST 2025 selfserv_9351 with PID 2262195 started at Fri Nov 28 19:30:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262195 at Fri Nov 28 19:30:05 CST 2025 kill -USR1 2262195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262195 killed at Fri Nov 28 19:30:05 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262234 >/dev/null 2>/dev/null selfserv_9351 with PID 2262234 found at Fri Nov 28 19:30:05 CST 2025 selfserv_9351 with PID 2262234 started at Fri Nov 28 19:30:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262234 at Fri Nov 28 19:30:05 CST 2025 kill -USR1 2262234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262234 killed at Fri Nov 28 19:30:05 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262288 >/dev/null 2>/dev/null selfserv_9351 with PID 2262288 found at Fri Nov 28 19:30:05 CST 2025 selfserv_9351 with PID 2262288 started at Fri Nov 28 19:30:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262288 at Fri Nov 28 19:30:06 CST 2025 kill -USR1 2262288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262288 killed at Fri Nov 28 19:30:06 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262327 >/dev/null 2>/dev/null selfserv_9351 with PID 2262327 found at Fri Nov 28 19:30:06 CST 2025 selfserv_9351 with PID 2262327 started at Fri Nov 28 19:30:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262327 at Fri Nov 28 19:30:06 CST 2025 kill -USR1 2262327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262327 killed at Fri Nov 28 19:30:06 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262366 >/dev/null 2>/dev/null selfserv_9351 with PID 2262366 found at Fri Nov 28 19:30:06 CST 2025 selfserv_9351 with PID 2262366 started at Fri Nov 28 19:30:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2262366 at Fri Nov 28 19:30:06 CST 2025 kill -USR1 2262366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262366 killed at Fri Nov 28 19:30:06 CST 2025 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9351 starting at Fri Nov 28 19:30:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:06 CST 2025 selfserv_9351 with PID 2262426 started at Fri Nov 28 19:30:06 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:06 CST 2025 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:07 CST 2025 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:07 CST 2025 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:07 CST 2025 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:07 CST 2025 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:07 CST 2025 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:07 CST 2025 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:08 CST 2025 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:08 CST 2025 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:08 CST 2025 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:08 CST 2025 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:08 CST 2025 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:08 CST 2025 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:09 CST 2025 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:09 CST 2025 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:09 CST 2025 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:09 CST 2025 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:09 CST 2025 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:09 CST 2025 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:10 CST 2025 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:10 CST 2025 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:10 CST 2025 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:10 CST 2025 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:10 CST 2025 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:10 CST 2025 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:11 CST 2025 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:12 CST 2025 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:12 CST 2025 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:12 CST 2025 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:12 CST 2025 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:12 CST 2025 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:12 CST 2025 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:13 CST 2025 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:13 CST 2025 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2262426 >/dev/null 2>/dev/null selfserv_9351 with PID 2262426 found at Fri Nov 28 19:30:13 CST 2025 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2262426 at Fri Nov 28 19:30:13 CST 2025 kill -USR1 2262426 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2262426 killed at Fri Nov 28 19:30:13 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:13 CST 2025 selfserv_9351 with PID 2263366 started at Fri Nov 28 19:30:13 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:13 CST 2025 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:13 CST 2025 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:14 CST 2025 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:14 CST 2025 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:14 CST 2025 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:14 CST 2025 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:14 CST 2025 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:14 CST 2025 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:15 CST 2025 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:16 CST 2025 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:16 CST 2025 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:16 CST 2025 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:16 CST 2025 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:16 CST 2025 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:16 CST 2025 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:17 CST 2025 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:17 CST 2025 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:17 CST 2025 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:17 CST 2025 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:17 CST 2025 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:17 CST 2025 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:18 CST 2025 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:18 CST 2025 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:18 CST 2025 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:18 CST 2025 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:18 CST 2025 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:18 CST 2025 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:19 CST 2025 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2263366 >/dev/null 2>/dev/null selfserv_9351 with PID 2263366 found at Fri Nov 28 19:30:20 CST 2025 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2263366 at Fri Nov 28 19:30:20 CST 2025 kill -USR1 2263366 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2263366 killed at Fri Nov 28 19:30:20 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:20 CST 2025 selfserv_9351 with PID 2264310 started at Fri Nov 28 19:30:20 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:20 CST 2025 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:20 CST 2025 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:20 CST 2025 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:20 CST 2025 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:20 CST 2025 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:21 CST 2025 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:22 CST 2025 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:23 CST 2025 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:24 CST 2025 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:25 CST 2025 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2264310 >/dev/null 2>/dev/null selfserv_9351 with PID 2264310 found at Fri Nov 28 19:30:25 CST 2025 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2264310 at Fri Nov 28 19:30:25 CST 2025 kill -USR1 2264310 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2264310 killed at Fri Nov 28 19:30:25 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:25 CST 2025 selfserv_9351 with PID 2265272 started at Fri Nov 28 19:30:25 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:25 CST 2025 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:25 CST 2025 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:25 CST 2025 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:25 CST 2025 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:26 CST 2025 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:27 CST 2025 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:28 CST 2025 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:29 CST 2025 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:30 CST 2025 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:31 CST 2025 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2265272 >/dev/null 2>/dev/null selfserv_9351 with PID 2265272 found at Fri Nov 28 19:30:31 CST 2025 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2265272 at Fri Nov 28 19:30:31 CST 2025 kill -USR1 2265272 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2265272 killed at Fri Nov 28 19:30:31 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2266206 >/dev/null 2>/dev/null selfserv_9351 with PID 2266206 found at Fri Nov 28 19:30:31 CST 2025 selfserv_9351 with PID 2266206 started at Fri Nov 28 19:30:31 CST 2025 trying to kill selfserv_9351 with PID 2266206 at Fri Nov 28 19:30:31 CST 2025 kill -USR1 2266206 ./ssl.sh: line 213: 2266206 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2266206 killed at Fri Nov 28 19:30:31 CST 2025 selfserv_9351 starting at Fri Nov 28 19:30:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:31 CST 2025 selfserv_9351 with PID 2266238 started at Fri Nov 28 19:30:31 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:31 CST 2025 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:31 CST 2025 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:31 CST 2025 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:32 CST 2025 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:33 CST 2025 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:33 CST 2025 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:33 CST 2025 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:33 CST 2025 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:33 CST 2025 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:33 CST 2025 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:34 CST 2025 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:35 CST 2025 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:35 CST 2025 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:35 CST 2025 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:35 CST 2025 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:35 CST 2025 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:35 CST 2025 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:36 CST 2025 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:37 CST 2025 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:37 CST 2025 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:37 CST 2025 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:37 CST 2025 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2266238 >/dev/null 2>/dev/null selfserv_9351 with PID 2266238 found at Fri Nov 28 19:30:37 CST 2025 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2266238 at Fri Nov 28 19:30:37 CST 2025 kill -USR1 2266238 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2266238 killed at Fri Nov 28 19:30:37 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:37 CST 2025 selfserv_9351 with PID 2267174 started at Fri Nov 28 19:30:37 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:38 CST 2025 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:39 CST 2025 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:39 CST 2025 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:39 CST 2025 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:39 CST 2025 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:39 CST 2025 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:39 CST 2025 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:40 CST 2025 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:40 CST 2025 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:40 CST 2025 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:40 CST 2025 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:40 CST 2025 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:40 CST 2025 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:41 CST 2025 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:41 CST 2025 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:41 CST 2025 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:41 CST 2025 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:41 CST 2025 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:41 CST 2025 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:42 CST 2025 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:42 CST 2025 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:42 CST 2025 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:42 CST 2025 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:42 CST 2025 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:42 CST 2025 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:43 CST 2025 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:43 CST 2025 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:43 CST 2025 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:43 CST 2025 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:43 CST 2025 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:43 CST 2025 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:44 CST 2025 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:44 CST 2025 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:44 CST 2025 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2267174 >/dev/null 2>/dev/null selfserv_9351 with PID 2267174 found at Fri Nov 28 19:30:44 CST 2025 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2267174 at Fri Nov 28 19:30:44 CST 2025 kill -USR1 2267174 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2267174 killed at Fri Nov 28 19:30:44 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:44 CST 2025 selfserv_9351 with PID 2268117 started at Fri Nov 28 19:30:44 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:44 CST 2025 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:45 CST 2025 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:45 CST 2025 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:45 CST 2025 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:45 CST 2025 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:45 CST 2025 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:45 CST 2025 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:46 CST 2025 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:46 CST 2025 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:46 CST 2025 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:46 CST 2025 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:46 CST 2025 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:47 CST 2025 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:47 CST 2025 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:47 CST 2025 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:47 CST 2025 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:47 CST 2025 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:47 CST 2025 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:48 CST 2025 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:48 CST 2025 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:48 CST 2025 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:48 CST 2025 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:48 CST 2025 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:48 CST 2025 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:49 CST 2025 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:49 CST 2025 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:49 CST 2025 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:49 CST 2025 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:49 CST 2025 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:49 CST 2025 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:50 CST 2025 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:50 CST 2025 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:50 CST 2025 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:50 CST 2025 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:50 CST 2025 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:50 CST 2025 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:51 CST 2025 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:51 CST 2025 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:51 CST 2025 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:51 CST 2025 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2268117 >/dev/null 2>/dev/null selfserv_9351 with PID 2268117 found at Fri Nov 28 19:30:51 CST 2025 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2268117 at Fri Nov 28 19:30:51 CST 2025 kill -USR1 2268117 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2268117 killed at Fri Nov 28 19:30:51 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:51 CST 2025 selfserv_9351 with PID 2269061 started at Fri Nov 28 19:30:51 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:52 CST 2025 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:53 CST 2025 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:54 CST 2025 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:55 CST 2025 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269061 >/dev/null 2>/dev/null selfserv_9351 with PID 2269061 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2269061 at Fri Nov 28 19:30:56 CST 2025 kill -USR1 2269061 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2269061 killed at Fri Nov 28 19:30:56 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:30:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:30:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:56 CST 2025 selfserv_9351 with PID 2269994 started at Fri Nov 28 19:30:56 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:56 CST 2025 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:57 CST 2025 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:58 CST 2025 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:30:59 CST 2025 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:00 CST 2025 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2269994 >/dev/null 2>/dev/null selfserv_9351 with PID 2269994 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2269994 at Fri Nov 28 19:31:01 CST 2025 kill -USR1 2269994 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2269994 killed at Fri Nov 28 19:31:01 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:01 CST 2025 selfserv_9351 with PID 2270951 started at Fri Nov 28 19:31:01 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:01 CST 2025 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:02 CST 2025 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:02 CST 2025 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:02 CST 2025 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:02 CST 2025 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:02 CST 2025 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:02 CST 2025 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:03 CST 2025 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:04 CST 2025 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:04 CST 2025 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:04 CST 2025 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:04 CST 2025 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:04 CST 2025 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:04 CST 2025 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:05 CST 2025 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:05 CST 2025 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:05 CST 2025 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:05 CST 2025 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:05 CST 2025 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:05 CST 2025 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:06 CST 2025 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:07 CST 2025 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:07 CST 2025 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:07 CST 2025 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:07 CST 2025 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:07 CST 2025 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:07 CST 2025 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:08 CST 2025 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2270951 >/dev/null 2>/dev/null selfserv_9351 with PID 2270951 found at Fri Nov 28 19:31:08 CST 2025 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2270951 at Fri Nov 28 19:31:08 CST 2025 kill -USR1 2270951 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2270951 killed at Fri Nov 28 19:31:08 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2271925 >/dev/null 2>/dev/null selfserv_9351 with PID 2271925 found at Fri Nov 28 19:31:08 CST 2025 selfserv_9351 with PID 2271925 started at Fri Nov 28 19:31:08 CST 2025 trying to kill selfserv_9351 with PID 2271925 at Fri Nov 28 19:31:08 CST 2025 kill -USR1 2271925 ./ssl.sh: line 213: 2271925 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2271925 killed at Fri Nov 28 19:31:08 CST 2025 selfserv_9351 starting at Fri Nov 28 19:31:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:08 CST 2025 selfserv_9351 with PID 2271957 started at Fri Nov 28 19:31:08 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:08 CST 2025 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:08 CST 2025 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:08 CST 2025 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:09 CST 2025 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:09 CST 2025 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:09 CST 2025 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:09 CST 2025 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:09 CST 2025 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:09 CST 2025 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:10 CST 2025 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:11 CST 2025 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:11 CST 2025 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:11 CST 2025 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:11 CST 2025 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:11 CST 2025 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:11 CST 2025 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:12 CST 2025 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:13 CST 2025 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:13 CST 2025 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:13 CST 2025 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:13 CST 2025 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:13 CST 2025 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:13 CST 2025 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:14 CST 2025 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:14 CST 2025 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:14 CST 2025 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:14 CST 2025 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:14 CST 2025 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2271957 >/dev/null 2>/dev/null selfserv_9351 with PID 2271957 found at Fri Nov 28 19:31:14 CST 2025 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2271957 at Fri Nov 28 19:31:14 CST 2025 kill -USR1 2271957 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2271957 killed at Fri Nov 28 19:31:14 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:14 CST 2025 selfserv_9351 with PID 2272907 started at Fri Nov 28 19:31:14 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:15 CST 2025 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:15 CST 2025 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:15 CST 2025 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:15 CST 2025 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:15 CST 2025 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:15 CST 2025 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:16 CST 2025 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:16 CST 2025 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:16 CST 2025 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:16 CST 2025 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:16 CST 2025 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:16 CST 2025 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:17 CST 2025 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:17 CST 2025 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:17 CST 2025 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:17 CST 2025 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:17 CST 2025 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:17 CST 2025 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:18 CST 2025 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:18 CST 2025 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:18 CST 2025 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:18 CST 2025 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:18 CST 2025 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:18 CST 2025 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:19 CST 2025 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:19 CST 2025 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:19 CST 2025 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:19 CST 2025 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:19 CST 2025 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:19 CST 2025 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:20 CST 2025 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:21 CST 2025 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:21 CST 2025 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:21 CST 2025 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2272907 >/dev/null 2>/dev/null selfserv_9351 with PID 2272907 found at Fri Nov 28 19:31:21 CST 2025 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2272907 at Fri Nov 28 19:31:21 CST 2025 kill -USR1 2272907 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2272907 killed at Fri Nov 28 19:31:21 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:21 CST 2025 selfserv_9351 with PID 2273845 started at Fri Nov 28 19:31:21 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:21 CST 2025 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:22 CST 2025 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:22 CST 2025 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:22 CST 2025 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:22 CST 2025 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:22 CST 2025 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:23 CST 2025 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:23 CST 2025 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:23 CST 2025 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:23 CST 2025 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:23 CST 2025 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:23 CST 2025 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:24 CST 2025 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:24 CST 2025 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:24 CST 2025 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:24 CST 2025 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:24 CST 2025 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:24 CST 2025 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:25 CST 2025 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:25 CST 2025 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:25 CST 2025 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:25 CST 2025 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:25 CST 2025 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:25 CST 2025 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:26 CST 2025 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:26 CST 2025 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:26 CST 2025 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:26 CST 2025 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:26 CST 2025 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:27 CST 2025 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:27 CST 2025 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:27 CST 2025 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:27 CST 2025 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:27 CST 2025 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:27 CST 2025 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:28 CST 2025 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:28 CST 2025 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:28 CST 2025 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:28 CST 2025 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:28 CST 2025 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2273845 >/dev/null 2>/dev/null selfserv_9351 with PID 2273845 found at Fri Nov 28 19:31:28 CST 2025 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2273845 at Fri Nov 28 19:31:28 CST 2025 kill -USR1 2273845 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2273845 killed at Fri Nov 28 19:31:28 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 selfserv_9351 with PID 2274807 started at Fri Nov 28 19:31:29 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:29 CST 2025 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:30 CST 2025 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:31 CST 2025 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:32 CST 2025 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2274807 >/dev/null 2>/dev/null selfserv_9351 with PID 2274807 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2274807 at Fri Nov 28 19:31:33 CST 2025 kill -USR1 2274807 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2274807 killed at Fri Nov 28 19:31:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:33 CST 2025 selfserv_9351 with PID 2275741 started at Fri Nov 28 19:31:33 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:33 CST 2025 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:34 CST 2025 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:35 CST 2025 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:36 CST 2025 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:37 CST 2025 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2275741 >/dev/null 2>/dev/null selfserv_9351 with PID 2275741 found at Fri Nov 28 19:31:38 CST 2025 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2275741 at Fri Nov 28 19:31:38 CST 2025 kill -USR1 2275741 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2275741 killed at Fri Nov 28 19:31:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:38 CST 2025 selfserv_9351 with PID 2276676 started at Fri Nov 28 19:31:38 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:39 CST 2025 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:39 CST 2025 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:39 CST 2025 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:39 CST 2025 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:39 CST 2025 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:39 CST 2025 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:40 CST 2025 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:41 CST 2025 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:41 CST 2025 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:41 CST 2025 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:41 CST 2025 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:41 CST 2025 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:41 CST 2025 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:42 CST 2025 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:42 CST 2025 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:42 CST 2025 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:42 CST 2025 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:42 CST 2025 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:42 CST 2025 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:43 CST 2025 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:44 CST 2025 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:45 CST 2025 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2276676 >/dev/null 2>/dev/null selfserv_9351 with PID 2276676 found at Fri Nov 28 19:31:45 CST 2025 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2276676 at Fri Nov 28 19:31:45 CST 2025 kill -USR1 2276676 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2276676 killed at Fri Nov 28 19:31:45 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2277621 >/dev/null 2>/dev/null selfserv_9351 with PID 2277621 found at Fri Nov 28 19:31:45 CST 2025 selfserv_9351 with PID 2277621 started at Fri Nov 28 19:31:45 CST 2025 trying to kill selfserv_9351 with PID 2277621 at Fri Nov 28 19:31:45 CST 2025 kill -USR1 2277621 ./ssl.sh: line 213: 2277621 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2277621 killed at Fri Nov 28 19:31:45 CST 2025 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9351 starting at Fri Nov 28 19:31:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2277713 >/dev/null 2>/dev/null selfserv_9351 with PID 2277713 found at Fri Nov 28 19:31:45 CST 2025 selfserv_9351 with PID 2277713 started at Fri Nov 28 19:31:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2277713 at Fri Nov 28 19:31:45 CST 2025 kill -USR1 2277713 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2277713 killed at Fri Nov 28 19:31:45 CST 2025 ssl.sh: Check that OCSP doesn't break if we disable sha1 - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** vfyserv -o wrong.host.badssl.com -d ../server 2>&1 | tee ../server/vfy.out Connecting to host wrong.host.badssl.com (addr 104.154.89.105) on port 443 Error in function PR_Write: -12276 - Unable to communicate securely with peer: requested domain name does not match the server's certificate. grep -E '12276|5961' ../server/vfy.out Error in function PR_Write: -12276 ssl.sh: #663: produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9351 starting at Fri Nov 28 19:31:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2277758 >/dev/null 2>/dev/null selfserv_9351 with PID 2277758 found at Fri Nov 28 19:31:47 CST 2025 selfserv_9351 with PID 2277758 started at Fri Nov 28 19:31:47 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #666: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #667: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #668: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #669: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #670: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #671: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #672: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #673: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #674: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #683: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #686: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #687: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #688: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signature verification ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-verify library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #689: Restrict RSA keys on signature verification produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signing ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-sign library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #690: Restrict RSA keys on signing produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-ssl library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12226: SSL peer rejected a handshake message for unacceptable content. tstclnt: write to SSL socket failed: SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. ssl.sh: #691: Restrict RSA keys when used in SSL produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=1023 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #692: Restrict RSA keys when used in SSL produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #693: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #694: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #695: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #696: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2277758 at Fri Nov 28 19:31:49 CST 2025 kill -USR1 2277758 selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2277758 killed at Fri Nov 28 19:31:49 CST 2025 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:31:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2278231 >/dev/null 2>/dev/null selfserv_9351 with PID 2278231 found at Fri Nov 28 19:31:50 CST 2025 selfserv_9351 with PID 2278231 started at Fri Nov 28 19:31:50 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2278231 at Fri Nov 28 19:31:53 CST 2025 kill -USR1 2278231 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2278231 killed at Fri Nov 28 19:31:53 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:31:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2278733 >/dev/null 2>/dev/null selfserv_9351 with PID 2278733 found at Fri Nov 28 19:31:53 CST 2025 selfserv_9351 with PID 2278733 started at Fri Nov 28 19:31:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #790: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2278733 at Fri Nov 28 19:31:59 CST 2025 kill -USR1 2278733 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2278733 killed at Fri Nov 28 19:31:59 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279467 >/dev/null 2>/dev/null selfserv_9351 with PID 2279467 found at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 with PID 2279467 started at Fri Nov 28 19:31:59 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279467 at Fri Nov 28 19:31:59 CST 2025 kill -USR1 2279467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279467 killed at Fri Nov 28 19:31:59 CST 2025 ssl.sh: SSL Client Authentication - server normal/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279521 >/dev/null 2>/dev/null selfserv_9351 with PID 2279521 found at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 with PID 2279521 started at Fri Nov 28 19:31:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279521 at Fri Nov 28 19:31:59 CST 2025 kill -USR1 2279521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279521 killed at Fri Nov 28 19:31:59 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279568 >/dev/null 2>/dev/null selfserv_9351 with PID 2279568 found at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 with PID 2279568 started at Fri Nov 28 19:31:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279568 at Fri Nov 28 19:31:59 CST 2025 kill -USR1 2279568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279568 killed at Fri Nov 28 19:31:59 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:31:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:31:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279609 >/dev/null 2>/dev/null selfserv_9351 with PID 2279609 found at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 with PID 2279609 started at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279609 at Fri Nov 28 19:32:00 CST 2025 kill -USR1 2279609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279609 killed at Fri Nov 28 19:32:00 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279650 >/dev/null 2>/dev/null selfserv_9351 with PID 2279650 found at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 with PID 2279650 started at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2279650 at Fri Nov 28 19:32:00 CST 2025 kill -USR1 2279650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279650 killed at Fri Nov 28 19:32:00 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279691 >/dev/null 2>/dev/null selfserv_9351 with PID 2279691 found at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 with PID 2279691 started at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #795: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2279691 at Fri Nov 28 19:32:00 CST 2025 kill -USR1 2279691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279691 killed at Fri Nov 28 19:32:00 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279736 >/dev/null 2>/dev/null selfserv_9351 with PID 2279736 found at Fri Nov 28 19:32:00 CST 2025 selfserv_9351 with PID 2279736 started at Fri Nov 28 19:32:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279736 at Fri Nov 28 19:32:01 CST 2025 kill -USR1 2279736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279736 killed at Fri Nov 28 19:32:01 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279777 >/dev/null 2>/dev/null selfserv_9351 with PID 2279777 found at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 with PID 2279777 started at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279777 at Fri Nov 28 19:32:01 CST 2025 kill -USR1 2279777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279777 killed at Fri Nov 28 19:32:01 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279830 >/dev/null 2>/dev/null selfserv_9351 with PID 2279830 found at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 with PID 2279830 started at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279830 at Fri Nov 28 19:32:01 CST 2025 kill -USR1 2279830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279830 killed at Fri Nov 28 19:32:01 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279871 >/dev/null 2>/dev/null selfserv_9351 with PID 2279871 found at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 with PID 2279871 started at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2279871 at Fri Nov 28 19:32:01 CST 2025 kill -USR1 2279871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279871 killed at Fri Nov 28 19:32:01 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279952 >/dev/null 2>/dev/null selfserv_9351 with PID 2279952 found at Fri Nov 28 19:32:01 CST 2025 selfserv_9351 with PID 2279952 started at Fri Nov 28 19:32:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2279952 at Fri Nov 28 19:32:02 CST 2025 kill -USR1 2279952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279952 killed at Fri Nov 28 19:32:02 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2279993 >/dev/null 2>/dev/null selfserv_9351 with PID 2279993 found at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 with PID 2279993 started at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #801: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2279993 at Fri Nov 28 19:32:02 CST 2025 kill -USR1 2279993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2279993 killed at Fri Nov 28 19:32:02 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280034 >/dev/null 2>/dev/null selfserv_9351 with PID 2280034 found at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 with PID 2280034 started at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280034 at Fri Nov 28 19:32:02 CST 2025 kill -USR1 2280034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280034 killed at Fri Nov 28 19:32:02 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280075 >/dev/null 2>/dev/null selfserv_9351 with PID 2280075 found at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 with PID 2280075 started at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280075 at Fri Nov 28 19:32:02 CST 2025 kill -USR1 2280075 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280075 killed at Fri Nov 28 19:32:02 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280118 >/dev/null 2>/dev/null selfserv_9351 with PID 2280118 found at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 with PID 2280118 started at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280118 at Fri Nov 28 19:32:03 CST 2025 kill -USR1 2280118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280118 killed at Fri Nov 28 19:32:03 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280159 >/dev/null 2>/dev/null selfserv_9351 with PID 2280159 found at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 with PID 2280159 started at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280159 at Fri Nov 28 19:32:03 CST 2025 kill -USR1 2280159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280159 killed at Fri Nov 28 19:32:03 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280200 >/dev/null 2>/dev/null selfserv_9351 with PID 2280200 found at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 with PID 2280200 started at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280200 at Fri Nov 28 19:32:03 CST 2025 kill -USR1 2280200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280200 killed at Fri Nov 28 19:32:03 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280241 >/dev/null 2>/dev/null selfserv_9351 with PID 2280241 found at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 with PID 2280241 started at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #807: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280241 at Fri Nov 28 19:32:03 CST 2025 kill -USR1 2280241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280241 killed at Fri Nov 28 19:32:03 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280287 >/dev/null 2>/dev/null selfserv_9351 with PID 2280287 found at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 with PID 2280287 started at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280287 at Fri Nov 28 19:32:04 CST 2025 kill -USR1 2280287 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280287 killed at Fri Nov 28 19:32:04 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280328 >/dev/null 2>/dev/null selfserv_9351 with PID 2280328 found at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 with PID 2280328 started at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280328 at Fri Nov 28 19:32:04 CST 2025 kill -USR1 2280328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280328 killed at Fri Nov 28 19:32:04 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280369 >/dev/null 2>/dev/null selfserv_9351 with PID 2280369 found at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 with PID 2280369 started at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280369 at Fri Nov 28 19:32:04 CST 2025 kill -USR1 2280369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280369 killed at Fri Nov 28 19:32:04 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280410 >/dev/null 2>/dev/null selfserv_9351 with PID 2280410 found at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 with PID 2280410 started at Fri Nov 28 19:32:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #811: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280410 at Fri Nov 28 19:32:04 CST 2025 kill -USR1 2280410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280410 killed at Fri Nov 28 19:32:04 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280457 >/dev/null 2>/dev/null selfserv_9351 with PID 2280457 found at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 with PID 2280457 started at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280457 at Fri Nov 28 19:32:05 CST 2025 kill -USR1 2280457 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280457 killed at Fri Nov 28 19:32:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280498 >/dev/null 2>/dev/null selfserv_9351 with PID 2280498 found at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 with PID 2280498 started at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280498 at Fri Nov 28 19:32:05 CST 2025 kill -USR1 2280498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280498 killed at Fri Nov 28 19:32:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280539 >/dev/null 2>/dev/null selfserv_9351 with PID 2280539 found at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 with PID 2280539 started at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280539 at Fri Nov 28 19:32:05 CST 2025 kill -USR1 2280539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280539 killed at Fri Nov 28 19:32:05 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280581 >/dev/null 2>/dev/null selfserv_9351 with PID 2280581 found at Fri Nov 28 19:32:05 CST 2025 selfserv_9351 with PID 2280581 started at Fri Nov 28 19:32:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280581 at Fri Nov 28 19:32:06 CST 2025 kill -USR1 2280581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280581 killed at Fri Nov 28 19:32:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280622 >/dev/null 2>/dev/null selfserv_9351 with PID 2280622 found at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 with PID 2280622 started at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280622 at Fri Nov 28 19:32:06 CST 2025 kill -USR1 2280622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280622 killed at Fri Nov 28 19:32:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280663 >/dev/null 2>/dev/null selfserv_9351 with PID 2280663 found at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 with PID 2280663 started at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #817: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280663 at Fri Nov 28 19:32:06 CST 2025 kill -USR1 2280663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280663 killed at Fri Nov 28 19:32:06 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280704 >/dev/null 2>/dev/null selfserv_9351 with PID 2280704 found at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 with PID 2280704 started at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280704 at Fri Nov 28 19:32:06 CST 2025 kill -USR1 2280704 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280704 killed at Fri Nov 28 19:32:06 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280745 >/dev/null 2>/dev/null selfserv_9351 with PID 2280745 found at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 with PID 2280745 started at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #819: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280745 at Fri Nov 28 19:32:07 CST 2025 kill -USR1 2280745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280745 killed at Fri Nov 28 19:32:07 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280786 >/dev/null 2>/dev/null selfserv_9351 with PID 2280786 found at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 with PID 2280786 started at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280786 at Fri Nov 28 19:32:07 CST 2025 kill -USR1 2280786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280786 killed at Fri Nov 28 19:32:07 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280827 >/dev/null 2>/dev/null selfserv_9351 with PID 2280827 found at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 with PID 2280827 started at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280827 at Fri Nov 28 19:32:07 CST 2025 kill -USR1 2280827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280827 killed at Fri Nov 28 19:32:07 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280869 >/dev/null 2>/dev/null selfserv_9351 with PID 2280869 found at Fri Nov 28 19:32:07 CST 2025 selfserv_9351 with PID 2280869 started at Fri Nov 28 19:32:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280869 at Fri Nov 28 19:32:08 CST 2025 kill -USR1 2280869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280869 killed at Fri Nov 28 19:32:08 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280910 >/dev/null 2>/dev/null selfserv_9351 with PID 2280910 found at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 with PID 2280910 started at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280910 at Fri Nov 28 19:32:08 CST 2025 kill -USR1 2280910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280910 killed at Fri Nov 28 19:32:08 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280951 >/dev/null 2>/dev/null selfserv_9351 with PID 2280951 found at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 with PID 2280951 started at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #824: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2280951 at Fri Nov 28 19:32:08 CST 2025 kill -USR1 2280951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280951 killed at Fri Nov 28 19:32:08 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2280992 >/dev/null 2>/dev/null selfserv_9351 with PID 2280992 found at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 with PID 2280992 started at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2280992 at Fri Nov 28 19:32:08 CST 2025 kill -USR1 2280992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2280992 killed at Fri Nov 28 19:32:08 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281038 >/dev/null 2>/dev/null selfserv_9351 with PID 2281038 found at Fri Nov 28 19:32:08 CST 2025 selfserv_9351 with PID 2281038 started at Fri Nov 28 19:32:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281038 at Fri Nov 28 19:32:09 CST 2025 kill -USR1 2281038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281038 killed at Fri Nov 28 19:32:09 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281079 >/dev/null 2>/dev/null selfserv_9351 with PID 2281079 found at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 with PID 2281079 started at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281079 at Fri Nov 28 19:32:09 CST 2025 kill -USR1 2281079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281079 killed at Fri Nov 28 19:32:09 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281120 >/dev/null 2>/dev/null selfserv_9351 with PID 2281120 found at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 with PID 2281120 started at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281120 at Fri Nov 28 19:32:09 CST 2025 kill -USR1 2281120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281120 killed at Fri Nov 28 19:32:09 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281161 >/dev/null 2>/dev/null selfserv_9351 with PID 2281161 found at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 with PID 2281161 started at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #829: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2281161 at Fri Nov 28 19:32:09 CST 2025 kill -USR1 2281161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281161 killed at Fri Nov 28 19:32:09 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281208 >/dev/null 2>/dev/null selfserv_9351 with PID 2281208 found at Fri Nov 28 19:32:09 CST 2025 selfserv_9351 with PID 2281208 started at Fri Nov 28 19:32:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281208 at Fri Nov 28 19:32:10 CST 2025 kill -USR1 2281208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281208 killed at Fri Nov 28 19:32:10 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281249 >/dev/null 2>/dev/null selfserv_9351 with PID 2281249 found at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 with PID 2281249 started at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281249 at Fri Nov 28 19:32:10 CST 2025 kill -USR1 2281249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281249 killed at Fri Nov 28 19:32:10 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281290 >/dev/null 2>/dev/null selfserv_9351 with PID 2281290 found at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 with PID 2281290 started at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281290 at Fri Nov 28 19:32:10 CST 2025 kill -USR1 2281290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281290 killed at Fri Nov 28 19:32:10 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281331 >/dev/null 2>/dev/null selfserv_9351 with PID 2281331 found at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 with PID 2281331 started at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2281331 at Fri Nov 28 19:32:10 CST 2025 kill -USR1 2281331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281331 killed at Fri Nov 28 19:32:10 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281376 >/dev/null 2>/dev/null selfserv_9351 with PID 2281376 found at Fri Nov 28 19:32:10 CST 2025 selfserv_9351 with PID 2281376 started at Fri Nov 28 19:32:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281376 at Fri Nov 28 19:32:11 CST 2025 kill -USR1 2281376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281376 killed at Fri Nov 28 19:32:11 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281417 >/dev/null 2>/dev/null selfserv_9351 with PID 2281417 found at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 with PID 2281417 started at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281417 at Fri Nov 28 19:32:11 CST 2025 kill -USR1 2281417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281417 killed at Fri Nov 28 19:32:11 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281458 >/dev/null 2>/dev/null selfserv_9351 with PID 2281458 found at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 with PID 2281458 started at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281458 at Fri Nov 28 19:32:11 CST 2025 kill -USR1 2281458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281458 killed at Fri Nov 28 19:32:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281499 >/dev/null 2>/dev/null selfserv_9351 with PID 2281499 found at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 with PID 2281499 started at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2281499 at Fri Nov 28 19:32:11 CST 2025 kill -USR1 2281499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281499 killed at Fri Nov 28 19:32:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281544 >/dev/null 2>/dev/null selfserv_9351 with PID 2281544 found at Fri Nov 28 19:32:11 CST 2025 selfserv_9351 with PID 2281544 started at Fri Nov 28 19:32:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281544 at Fri Nov 28 19:32:12 CST 2025 kill -USR1 2281544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281544 killed at Fri Nov 28 19:32:12 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281585 >/dev/null 2>/dev/null selfserv_9351 with PID 2281585 found at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 with PID 2281585 started at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281585 at Fri Nov 28 19:32:12 CST 2025 kill -USR1 2281585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281585 killed at Fri Nov 28 19:32:12 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281626 >/dev/null 2>/dev/null selfserv_9351 with PID 2281626 found at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 with PID 2281626 started at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281626 at Fri Nov 28 19:32:12 CST 2025 kill -USR1 2281626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281626 killed at Fri Nov 28 19:32:12 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281667 >/dev/null 2>/dev/null selfserv_9351 with PID 2281667 found at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 with PID 2281667 started at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2281667 at Fri Nov 28 19:32:12 CST 2025 kill -USR1 2281667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281667 killed at Fri Nov 28 19:32:12 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281709 >/dev/null 2>/dev/null selfserv_9351 with PID 2281709 found at Fri Nov 28 19:32:12 CST 2025 selfserv_9351 with PID 2281709 started at Fri Nov 28 19:32:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281709 at Fri Nov 28 19:32:13 CST 2025 kill -USR1 2281709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281709 killed at Fri Nov 28 19:32:13 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281750 >/dev/null 2>/dev/null selfserv_9351 with PID 2281750 found at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 with PID 2281750 started at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281750 at Fri Nov 28 19:32:13 CST 2025 kill -USR1 2281750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281750 killed at Fri Nov 28 19:32:13 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281791 >/dev/null 2>/dev/null selfserv_9351 with PID 2281791 found at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 with PID 2281791 started at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #844: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281791 at Fri Nov 28 19:32:13 CST 2025 kill -USR1 2281791 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281791 killed at Fri Nov 28 19:32:13 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281832 >/dev/null 2>/dev/null selfserv_9351 with PID 2281832 found at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 with PID 2281832 started at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2281832 at Fri Nov 28 19:32:13 CST 2025 kill -USR1 2281832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281832 killed at Fri Nov 28 19:32:13 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281878 >/dev/null 2>/dev/null selfserv_9351 with PID 2281878 found at Fri Nov 28 19:32:13 CST 2025 selfserv_9351 with PID 2281878 started at Fri Nov 28 19:32:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281878 at Fri Nov 28 19:32:14 CST 2025 kill -USR1 2281878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281878 killed at Fri Nov 28 19:32:14 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281919 >/dev/null 2>/dev/null selfserv_9351 with PID 2281919 found at Fri Nov 28 19:32:14 CST 2025 selfserv_9351 with PID 2281919 started at Fri Nov 28 19:32:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281919 at Fri Nov 28 19:32:14 CST 2025 kill -USR1 2281919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281919 killed at Fri Nov 28 19:32:14 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2281960 >/dev/null 2>/dev/null selfserv_9351 with PID 2281960 found at Fri Nov 28 19:32:14 CST 2025 selfserv_9351 with PID 2281960 started at Fri Nov 28 19:32:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2281960 at Fri Nov 28 19:32:14 CST 2025 kill -USR1 2281960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2281960 killed at Fri Nov 28 19:32:14 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:32:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282013 >/dev/null 2>/dev/null selfserv_9351 with PID 2282013 found at Fri Nov 28 19:32:14 CST 2025 selfserv_9351 with PID 2282013 started at Fri Nov 28 19:32:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282013 at Fri Nov 28 19:32:15 CST 2025 kill -USR1 2282013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282013 killed at Fri Nov 28 19:32:15 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282060 >/dev/null 2>/dev/null selfserv_9351 with PID 2282060 found at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 with PID 2282060 started at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #850: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282060 at Fri Nov 28 19:32:15 CST 2025 kill -USR1 2282060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282060 killed at Fri Nov 28 19:32:15 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282107 >/dev/null 2>/dev/null selfserv_9351 with PID 2282107 found at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 with PID 2282107 started at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2282107 at Fri Nov 28 19:32:15 CST 2025 kill -USR1 2282107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282107 killed at Fri Nov 28 19:32:15 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282154 >/dev/null 2>/dev/null selfserv_9351 with PID 2282154 found at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 with PID 2282154 started at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #852: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282154 at Fri Nov 28 19:32:15 CST 2025 kill -USR1 2282154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282154 killed at Fri Nov 28 19:32:15 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282203 >/dev/null 2>/dev/null selfserv_9351 with PID 2282203 found at Fri Nov 28 19:32:15 CST 2025 selfserv_9351 with PID 2282203 started at Fri Nov 28 19:32:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #853: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2282203 at Fri Nov 28 19:32:16 CST 2025 kill -USR1 2282203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282203 killed at Fri Nov 28 19:32:16 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282250 >/dev/null 2>/dev/null selfserv_9351 with PID 2282250 found at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 with PID 2282250 started at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282250 at Fri Nov 28 19:32:16 CST 2025 kill -USR1 2282250 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282250 killed at Fri Nov 28 19:32:16 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282297 >/dev/null 2>/dev/null selfserv_9351 with PID 2282297 found at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 with PID 2282297 started at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #855: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282297 at Fri Nov 28 19:32:16 CST 2025 kill -USR1 2282297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282297 killed at Fri Nov 28 19:32:16 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282344 >/dev/null 2>/dev/null selfserv_9351 with PID 2282344 found at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 with PID 2282344 started at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #856: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2282344 at Fri Nov 28 19:32:16 CST 2025 kill -USR1 2282344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282344 killed at Fri Nov 28 19:32:16 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:32:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282392 >/dev/null 2>/dev/null selfserv_9351 with PID 2282392 found at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 with PID 2282392 started at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #857: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2282392 at Fri Nov 28 19:32:17 CST 2025 kill -USR1 2282392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282392 killed at Fri Nov 28 19:32:17 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282439 >/dev/null 2>/dev/null selfserv_9351 with PID 2282439 found at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 with PID 2282439 started at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #858: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2282439 at Fri Nov 28 19:32:17 CST 2025 kill -USR1 2282439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282439 killed at Fri Nov 28 19:32:17 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282470 >/dev/null 2>/dev/null selfserv_9351 with PID 2282470 found at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 with PID 2282470 started at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282470 at Fri Nov 28 19:32:17 CST 2025 kill -USR1 2282470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282470 killed at Fri Nov 28 19:32:17 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282501 >/dev/null 2>/dev/null selfserv_9351 with PID 2282501 found at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 with PID 2282501 started at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2282501 at Fri Nov 28 19:32:17 CST 2025 kill -USR1 2282501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282501 killed at Fri Nov 28 19:32:17 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282533 >/dev/null 2>/dev/null selfserv_9351 with PID 2282533 found at Fri Nov 28 19:32:17 CST 2025 selfserv_9351 with PID 2282533 started at Fri Nov 28 19:32:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2282533 at Fri Nov 28 19:32:18 CST 2025 kill -USR1 2282533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282533 killed at Fri Nov 28 19:32:18 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282564 >/dev/null 2>/dev/null selfserv_9351 with PID 2282564 found at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 with PID 2282564 started at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2282564 at Fri Nov 28 19:32:18 CST 2025 kill -USR1 2282564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282564 killed at Fri Nov 28 19:32:18 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282595 >/dev/null 2>/dev/null selfserv_9351 with PID 2282595 found at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 with PID 2282595 started at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2282595 at Fri Nov 28 19:32:18 CST 2025 kill -USR1 2282595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282595 killed at Fri Nov 28 19:32:18 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282626 >/dev/null 2>/dev/null selfserv_9351 with PID 2282626 found at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 with PID 2282626 started at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #796: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2282626 at Fri Nov 28 19:32:18 CST 2025 kill -USR1 2282626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282626 killed at Fri Nov 28 19:32:18 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282657 >/dev/null 2>/dev/null selfserv_9351 with PID 2282657 found at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 with PID 2282657 started at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #797: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2282657 at Fri Nov 28 19:32:18 CST 2025 kill -USR1 2282657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282657 killed at Fri Nov 28 19:32:18 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282692 >/dev/null 2>/dev/null selfserv_9351 with PID 2282692 found at Fri Nov 28 19:32:18 CST 2025 selfserv_9351 with PID 2282692 started at Fri Nov 28 19:32:18 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:32:18 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:32:19 CST 2025 ssl.sh: #798: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2282692 at Fri Nov 28 19:32:19 CST 2025 kill -USR1 2282692 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282692 killed at Fri Nov 28 19:32:19 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:32:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282736 >/dev/null 2>/dev/null selfserv_9351 with PID 2282736 found at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 with PID 2282736 started at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282736 at Fri Nov 28 19:32:20 CST 2025 kill -USR1 2282736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282736 killed at Fri Nov 28 19:32:20 CST 2025 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282767 >/dev/null 2>/dev/null selfserv_9351 with PID 2282767 found at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 with PID 2282767 started at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282767 at Fri Nov 28 19:32:20 CST 2025 kill -USR1 2282767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282767 killed at Fri Nov 28 19:32:20 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282795 >/dev/null 2>/dev/null selfserv_9351 with PID 2282795 found at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 with PID 2282795 started at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2282795 at Fri Nov 28 19:32:20 CST 2025 kill -USR1 2282795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282795 killed at Fri Nov 28 19:32:20 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282823 >/dev/null 2>/dev/null selfserv_9351 with PID 2282823 found at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 with PID 2282823 started at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282823 at Fri Nov 28 19:32:20 CST 2025 kill -USR1 2282823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282823 killed at Fri Nov 28 19:32:20 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282851 >/dev/null 2>/dev/null selfserv_9351 with PID 2282851 found at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 with PID 2282851 started at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2282851 at Fri Nov 28 19:32:20 CST 2025 kill -USR1 2282851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282851 killed at Fri Nov 28 19:32:20 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282884 >/dev/null 2>/dev/null selfserv_9351 with PID 2282884 found at Fri Nov 28 19:32:20 CST 2025 selfserv_9351 with PID 2282884 started at Fri Nov 28 19:32:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282884 at Fri Nov 28 19:32:21 CST 2025 kill -USR1 2282884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282884 killed at Fri Nov 28 19:32:21 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282912 >/dev/null 2>/dev/null selfserv_9351 with PID 2282912 found at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 with PID 2282912 started at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282912 at Fri Nov 28 19:32:21 CST 2025 kill -USR1 2282912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282912 killed at Fri Nov 28 19:32:21 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282940 >/dev/null 2>/dev/null selfserv_9351 with PID 2282940 found at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 with PID 2282940 started at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282940 at Fri Nov 28 19:32:21 CST 2025 kill -USR1 2282940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282940 killed at Fri Nov 28 19:32:21 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282968 >/dev/null 2>/dev/null selfserv_9351 with PID 2282968 found at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 with PID 2282968 started at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282968 at Fri Nov 28 19:32:21 CST 2025 kill -USR1 2282968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282968 killed at Fri Nov 28 19:32:21 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2282996 >/dev/null 2>/dev/null selfserv_9351 with PID 2282996 found at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 with PID 2282996 started at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2282996 at Fri Nov 28 19:32:21 CST 2025 kill -USR1 2282996 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2282996 killed at Fri Nov 28 19:32:21 CST 2025 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283030 >/dev/null 2>/dev/null selfserv_9351 with PID 2283030 found at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 with PID 2283030 started at Fri Nov 28 19:32:21 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283030 at Fri Nov 28 19:32:21 CST 2025 kill -USR1 2283030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283030 killed at Fri Nov 28 19:32:21 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283060 >/dev/null 2>/dev/null selfserv_9351 with PID 2283060 found at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 with PID 2283060 started at Fri Nov 28 19:32:22 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2283060 at Fri Nov 28 19:32:22 CST 2025 kill -USR1 2283060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283060 killed at Fri Nov 28 19:32:22 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283089 >/dev/null 2>/dev/null selfserv_9351 with PID 2283089 found at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 with PID 2283089 started at Fri Nov 28 19:32:22 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283089 at Fri Nov 28 19:32:22 CST 2025 kill -USR1 2283089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283089 killed at Fri Nov 28 19:32:22 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283118 >/dev/null 2>/dev/null selfserv_9351 with PID 2283118 found at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 with PID 2283118 started at Fri Nov 28 19:32:22 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2283118 at Fri Nov 28 19:32:22 CST 2025 kill -USR1 2283118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283118 killed at Fri Nov 28 19:32:22 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283147 >/dev/null 2>/dev/null selfserv_9351 with PID 2283147 found at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 with PID 2283147 started at Fri Nov 28 19:32:22 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283147 at Fri Nov 28 19:32:22 CST 2025 kill -USR1 2283147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283147 killed at Fri Nov 28 19:32:22 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283176 >/dev/null 2>/dev/null selfserv_9351 with PID 2283176 found at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 with PID 2283176 started at Fri Nov 28 19:32:22 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283176 at Fri Nov 28 19:32:22 CST 2025 kill -USR1 2283176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283176 killed at Fri Nov 28 19:32:22 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283206 >/dev/null 2>/dev/null selfserv_9351 with PID 2283206 found at Fri Nov 28 19:32:22 CST 2025 selfserv_9351 with PID 2283206 started at Fri Nov 28 19:32:22 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283206 at Fri Nov 28 19:32:23 CST 2025 kill -USR1 2283206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283206 killed at Fri Nov 28 19:32:23 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283235 >/dev/null 2>/dev/null selfserv_9351 with PID 2283235 found at Fri Nov 28 19:32:23 CST 2025 selfserv_9351 with PID 2283235 started at Fri Nov 28 19:32:23 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283235 at Fri Nov 28 19:32:23 CST 2025 kill -USR1 2283235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283235 killed at Fri Nov 28 19:32:23 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2283282 >/dev/null 2>/dev/null selfserv_9351 with PID 2283282 found at Fri Nov 28 19:32:23 CST 2025 selfserv_9351 with PID 2283282 started at Fri Nov 28 19:32:23 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #817: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283282 at Fri Nov 28 19:32:23 CST 2025 kill -USR1 2283282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283282 killed at Fri Nov 28 19:32:23 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:32:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2283311 >/dev/null 2>/dev/null selfserv_9351 with PID 2283311 found at Fri Nov 28 19:32:23 CST 2025 selfserv_9351 with PID 2283311 started at Fri Nov 28 19:32:23 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2283311 at Fri Nov 28 19:32:27 CST 2025 kill -USR1 2283311 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283311 killed at Fri Nov 28 19:32:27 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:32:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2283811 >/dev/null 2>/dev/null selfserv_9351 with PID 2283811 found at Fri Nov 28 19:32:27 CST 2025 selfserv_9351 with PID 2283811 started at Fri Nov 28 19:32:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #944: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2283811 at Fri Nov 28 19:32:33 CST 2025 kill -USR1 2283811 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2283811 killed at Fri Nov 28 19:32:33 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284554 >/dev/null 2>/dev/null selfserv_9351 with PID 2284554 found at Fri Nov 28 19:32:33 CST 2025 selfserv_9351 with PID 2284554 started at Fri Nov 28 19:32:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284554 at Fri Nov 28 19:32:33 CST 2025 kill -USR1 2284554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284554 killed at Fri Nov 28 19:32:33 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284600 >/dev/null 2>/dev/null selfserv_9351 with PID 2284600 found at Fri Nov 28 19:32:33 CST 2025 selfserv_9351 with PID 2284600 started at Fri Nov 28 19:32:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284600 at Fri Nov 28 19:32:34 CST 2025 kill -USR1 2284600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284600 killed at Fri Nov 28 19:32:34 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284641 >/dev/null 2>/dev/null selfserv_9351 with PID 2284641 found at Fri Nov 28 19:32:34 CST 2025 selfserv_9351 with PID 2284641 started at Fri Nov 28 19:32:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284641 at Fri Nov 28 19:32:34 CST 2025 kill -USR1 2284641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284641 killed at Fri Nov 28 19:32:34 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284682 >/dev/null 2>/dev/null selfserv_9351 with PID 2284682 found at Fri Nov 28 19:32:34 CST 2025 selfserv_9351 with PID 2284682 started at Fri Nov 28 19:32:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2284682 at Fri Nov 28 19:32:34 CST 2025 kill -USR1 2284682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284682 killed at Fri Nov 28 19:32:34 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284729 >/dev/null 2>/dev/null selfserv_9351 with PID 2284729 found at Fri Nov 28 19:32:35 CST 2025 selfserv_9351 with PID 2284729 started at Fri Nov 28 19:32:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #949: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2284729 at Fri Nov 28 19:32:35 CST 2025 kill -USR1 2284729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284729 killed at Fri Nov 28 19:32:35 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284770 >/dev/null 2>/dev/null selfserv_9351 with PID 2284770 found at Fri Nov 28 19:32:35 CST 2025 selfserv_9351 with PID 2284770 started at Fri Nov 28 19:32:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284770 at Fri Nov 28 19:32:35 CST 2025 kill -USR1 2284770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284770 killed at Fri Nov 28 19:32:35 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284812 >/dev/null 2>/dev/null selfserv_9351 with PID 2284812 found at Fri Nov 28 19:32:35 CST 2025 selfserv_9351 with PID 2284812 started at Fri Nov 28 19:32:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284812 at Fri Nov 28 19:32:36 CST 2025 kill -USR1 2284812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284812 killed at Fri Nov 28 19:32:36 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284853 >/dev/null 2>/dev/null selfserv_9351 with PID 2284853 found at Fri Nov 28 19:32:36 CST 2025 selfserv_9351 with PID 2284853 started at Fri Nov 28 19:32:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284853 at Fri Nov 28 19:32:36 CST 2025 kill -USR1 2284853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284853 killed at Fri Nov 28 19:32:36 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284894 >/dev/null 2>/dev/null selfserv_9351 with PID 2284894 found at Fri Nov 28 19:32:36 CST 2025 selfserv_9351 with PID 2284894 started at Fri Nov 28 19:32:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2284894 at Fri Nov 28 19:32:36 CST 2025 kill -USR1 2284894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284894 killed at Fri Nov 28 19:32:36 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284935 >/dev/null 2>/dev/null selfserv_9351 with PID 2284935 found at Fri Nov 28 19:32:37 CST 2025 selfserv_9351 with PID 2284935 started at Fri Nov 28 19:32:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2284935 at Fri Nov 28 19:32:37 CST 2025 kill -USR1 2284935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284935 killed at Fri Nov 28 19:32:37 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2284976 >/dev/null 2>/dev/null selfserv_9351 with PID 2284976 found at Fri Nov 28 19:32:37 CST 2025 selfserv_9351 with PID 2284976 started at Fri Nov 28 19:32:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #955: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2284976 at Fri Nov 28 19:32:37 CST 2025 kill -USR1 2284976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2284976 killed at Fri Nov 28 19:32:37 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285017 >/dev/null 2>/dev/null selfserv_9351 with PID 2285017 found at Fri Nov 28 19:32:37 CST 2025 selfserv_9351 with PID 2285017 started at Fri Nov 28 19:32:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285017 at Fri Nov 28 19:32:38 CST 2025 kill -USR1 2285017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285017 killed at Fri Nov 28 19:32:38 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285058 >/dev/null 2>/dev/null selfserv_9351 with PID 2285058 found at Fri Nov 28 19:32:38 CST 2025 selfserv_9351 with PID 2285058 started at Fri Nov 28 19:32:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285058 at Fri Nov 28 19:32:38 CST 2025 kill -USR1 2285058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285058 killed at Fri Nov 28 19:32:38 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285099 >/dev/null 2>/dev/null selfserv_9351 with PID 2285099 found at Fri Nov 28 19:32:38 CST 2025 selfserv_9351 with PID 2285099 started at Fri Nov 28 19:32:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285099 at Fri Nov 28 19:32:38 CST 2025 kill -USR1 2285099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285099 killed at Fri Nov 28 19:32:38 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285144 >/dev/null 2>/dev/null selfserv_9351 with PID 2285144 found at Fri Nov 28 19:32:38 CST 2025 selfserv_9351 with PID 2285144 started at Fri Nov 28 19:32:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285144 at Fri Nov 28 19:32:39 CST 2025 kill -USR1 2285144 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285144 killed at Fri Nov 28 19:32:39 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285185 >/dev/null 2>/dev/null selfserv_9351 with PID 2285185 found at Fri Nov 28 19:32:39 CST 2025 selfserv_9351 with PID 2285185 started at Fri Nov 28 19:32:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285185 at Fri Nov 28 19:32:39 CST 2025 kill -USR1 2285185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285185 killed at Fri Nov 28 19:32:39 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285226 >/dev/null 2>/dev/null selfserv_9351 with PID 2285226 found at Fri Nov 28 19:32:39 CST 2025 selfserv_9351 with PID 2285226 started at Fri Nov 28 19:32:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #961: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285226 at Fri Nov 28 19:32:39 CST 2025 kill -USR1 2285226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285226 killed at Fri Nov 28 19:32:39 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285273 >/dev/null 2>/dev/null selfserv_9351 with PID 2285273 found at Fri Nov 28 19:32:40 CST 2025 selfserv_9351 with PID 2285273 started at Fri Nov 28 19:32:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285273 at Fri Nov 28 19:32:40 CST 2025 kill -USR1 2285273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285273 killed at Fri Nov 28 19:32:40 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285314 >/dev/null 2>/dev/null selfserv_9351 with PID 2285314 found at Fri Nov 28 19:32:40 CST 2025 selfserv_9351 with PID 2285314 started at Fri Nov 28 19:32:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285314 at Fri Nov 28 19:32:40 CST 2025 kill -USR1 2285314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285314 killed at Fri Nov 28 19:32:40 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285359 >/dev/null 2>/dev/null selfserv_9351 with PID 2285359 found at Fri Nov 28 19:32:40 CST 2025 selfserv_9351 with PID 2285359 started at Fri Nov 28 19:32:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285359 at Fri Nov 28 19:32:41 CST 2025 kill -USR1 2285359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285359 killed at Fri Nov 28 19:32:41 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285400 >/dev/null 2>/dev/null selfserv_9351 with PID 2285400 found at Fri Nov 28 19:32:41 CST 2025 selfserv_9351 with PID 2285400 started at Fri Nov 28 19:32:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #965: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285400 at Fri Nov 28 19:32:41 CST 2025 kill -USR1 2285400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285400 killed at Fri Nov 28 19:32:41 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285441 >/dev/null 2>/dev/null selfserv_9351 with PID 2285441 found at Fri Nov 28 19:32:41 CST 2025 selfserv_9351 with PID 2285441 started at Fri Nov 28 19:32:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285441 at Fri Nov 28 19:32:41 CST 2025 kill -USR1 2285441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285441 killed at Fri Nov 28 19:32:41 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285486 >/dev/null 2>/dev/null selfserv_9351 with PID 2285486 found at Fri Nov 28 19:32:42 CST 2025 selfserv_9351 with PID 2285486 started at Fri Nov 28 19:32:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285486 at Fri Nov 28 19:32:42 CST 2025 kill -USR1 2285486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285486 killed at Fri Nov 28 19:32:42 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285527 >/dev/null 2>/dev/null selfserv_9351 with PID 2285527 found at Fri Nov 28 19:32:42 CST 2025 selfserv_9351 with PID 2285527 started at Fri Nov 28 19:32:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285527 at Fri Nov 28 19:32:42 CST 2025 kill -USR1 2285527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285527 killed at Fri Nov 28 19:32:42 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285568 >/dev/null 2>/dev/null selfserv_9351 with PID 2285568 found at Fri Nov 28 19:32:42 CST 2025 selfserv_9351 with PID 2285568 started at Fri Nov 28 19:32:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285568 at Fri Nov 28 19:32:43 CST 2025 kill -USR1 2285568 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285568 killed at Fri Nov 28 19:32:43 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285610 >/dev/null 2>/dev/null selfserv_9351 with PID 2285610 found at Fri Nov 28 19:32:43 CST 2025 selfserv_9351 with PID 2285610 started at Fri Nov 28 19:32:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285610 at Fri Nov 28 19:32:43 CST 2025 kill -USR1 2285610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285610 killed at Fri Nov 28 19:32:43 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285651 >/dev/null 2>/dev/null selfserv_9351 with PID 2285651 found at Fri Nov 28 19:32:43 CST 2025 selfserv_9351 with PID 2285651 started at Fri Nov 28 19:32:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285651 at Fri Nov 28 19:32:43 CST 2025 kill -USR1 2285651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285651 killed at Fri Nov 28 19:32:43 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285697 >/dev/null 2>/dev/null selfserv_9351 with PID 2285697 found at Fri Nov 28 19:32:44 CST 2025 selfserv_9351 with PID 2285697 started at Fri Nov 28 19:32:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285697 at Fri Nov 28 19:32:44 CST 2025 kill -USR1 2285697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285697 killed at Fri Nov 28 19:32:44 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285738 >/dev/null 2>/dev/null selfserv_9351 with PID 2285738 found at Fri Nov 28 19:32:44 CST 2025 selfserv_9351 with PID 2285738 started at Fri Nov 28 19:32:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #973: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285738 at Fri Nov 28 19:32:44 CST 2025 kill -USR1 2285738 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285738 killed at Fri Nov 28 19:32:44 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285779 >/dev/null 2>/dev/null selfserv_9351 with PID 2285779 found at Fri Nov 28 19:32:44 CST 2025 selfserv_9351 with PID 2285779 started at Fri Nov 28 19:32:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285779 at Fri Nov 28 19:32:45 CST 2025 kill -USR1 2285779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285779 killed at Fri Nov 28 19:32:45 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285826 >/dev/null 2>/dev/null selfserv_9351 with PID 2285826 found at Fri Nov 28 19:32:45 CST 2025 selfserv_9351 with PID 2285826 started at Fri Nov 28 19:32:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285826 at Fri Nov 28 19:32:45 CST 2025 kill -USR1 2285826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285826 killed at Fri Nov 28 19:32:45 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285867 >/dev/null 2>/dev/null selfserv_9351 with PID 2285867 found at Fri Nov 28 19:32:45 CST 2025 selfserv_9351 with PID 2285867 started at Fri Nov 28 19:32:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285867 at Fri Nov 28 19:32:46 CST 2025 kill -USR1 2285867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285867 killed at Fri Nov 28 19:32:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285909 >/dev/null 2>/dev/null selfserv_9351 with PID 2285909 found at Fri Nov 28 19:32:46 CST 2025 selfserv_9351 with PID 2285909 started at Fri Nov 28 19:32:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285909 at Fri Nov 28 19:32:46 CST 2025 kill -USR1 2285909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285909 killed at Fri Nov 28 19:32:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285950 >/dev/null 2>/dev/null selfserv_9351 with PID 2285950 found at Fri Nov 28 19:32:46 CST 2025 selfserv_9351 with PID 2285950 started at Fri Nov 28 19:32:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #978: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2285950 at Fri Nov 28 19:32:46 CST 2025 kill -USR1 2285950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285950 killed at Fri Nov 28 19:32:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2285991 >/dev/null 2>/dev/null selfserv_9351 with PID 2285991 found at Fri Nov 28 19:32:46 CST 2025 selfserv_9351 with PID 2285991 started at Fri Nov 28 19:32:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2285991 at Fri Nov 28 19:32:47 CST 2025 kill -USR1 2285991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2285991 killed at Fri Nov 28 19:32:47 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286032 >/dev/null 2>/dev/null selfserv_9351 with PID 2286032 found at Fri Nov 28 19:32:47 CST 2025 selfserv_9351 with PID 2286032 started at Fri Nov 28 19:32:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286032 at Fri Nov 28 19:32:47 CST 2025 kill -USR1 2286032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286032 killed at Fri Nov 28 19:32:47 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286073 >/dev/null 2>/dev/null selfserv_9351 with PID 2286073 found at Fri Nov 28 19:32:47 CST 2025 selfserv_9351 with PID 2286073 started at Fri Nov 28 19:32:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286073 at Fri Nov 28 19:32:47 CST 2025 kill -USR1 2286073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286073 killed at Fri Nov 28 19:32:47 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286114 >/dev/null 2>/dev/null selfserv_9351 with PID 2286114 found at Fri Nov 28 19:32:48 CST 2025 selfserv_9351 with PID 2286114 started at Fri Nov 28 19:32:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286114 at Fri Nov 28 19:32:48 CST 2025 kill -USR1 2286114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286114 killed at Fri Nov 28 19:32:48 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286155 >/dev/null 2>/dev/null selfserv_9351 with PID 2286155 found at Fri Nov 28 19:32:48 CST 2025 selfserv_9351 with PID 2286155 started at Fri Nov 28 19:32:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #983: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2286155 at Fri Nov 28 19:32:48 CST 2025 kill -USR1 2286155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286155 killed at Fri Nov 28 19:32:48 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286196 >/dev/null 2>/dev/null selfserv_9351 with PID 2286196 found at Fri Nov 28 19:32:48 CST 2025 selfserv_9351 with PID 2286196 started at Fri Nov 28 19:32:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286196 at Fri Nov 28 19:32:49 CST 2025 kill -USR1 2286196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286196 killed at Fri Nov 28 19:32:49 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286241 >/dev/null 2>/dev/null selfserv_9351 with PID 2286241 found at Fri Nov 28 19:32:49 CST 2025 selfserv_9351 with PID 2286241 started at Fri Nov 28 19:32:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286241 at Fri Nov 28 19:32:49 CST 2025 kill -USR1 2286241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286241 killed at Fri Nov 28 19:32:49 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286282 >/dev/null 2>/dev/null selfserv_9351 with PID 2286282 found at Fri Nov 28 19:32:49 CST 2025 selfserv_9351 with PID 2286282 started at Fri Nov 28 19:32:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286282 at Fri Nov 28 19:32:49 CST 2025 kill -USR1 2286282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286282 killed at Fri Nov 28 19:32:49 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286329 >/dev/null 2>/dev/null selfserv_9351 with PID 2286329 found at Fri Nov 28 19:32:50 CST 2025 selfserv_9351 with PID 2286329 started at Fri Nov 28 19:32:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #987: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2286329 at Fri Nov 28 19:32:50 CST 2025 kill -USR1 2286329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286329 killed at Fri Nov 28 19:32:50 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286370 >/dev/null 2>/dev/null selfserv_9351 with PID 2286370 found at Fri Nov 28 19:32:50 CST 2025 selfserv_9351 with PID 2286370 started at Fri Nov 28 19:32:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286370 at Fri Nov 28 19:32:50 CST 2025 kill -USR1 2286370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286370 killed at Fri Nov 28 19:32:50 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286411 >/dev/null 2>/dev/null selfserv_9351 with PID 2286411 found at Fri Nov 28 19:32:50 CST 2025 selfserv_9351 with PID 2286411 started at Fri Nov 28 19:32:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286411 at Fri Nov 28 19:32:51 CST 2025 kill -USR1 2286411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286411 killed at Fri Nov 28 19:32:51 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286456 >/dev/null 2>/dev/null selfserv_9351 with PID 2286456 found at Fri Nov 28 19:32:51 CST 2025 selfserv_9351 with PID 2286456 started at Fri Nov 28 19:32:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286456 at Fri Nov 28 19:32:51 CST 2025 kill -USR1 2286456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286456 killed at Fri Nov 28 19:32:51 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286497 >/dev/null 2>/dev/null selfserv_9351 with PID 2286497 found at Fri Nov 28 19:32:51 CST 2025 selfserv_9351 with PID 2286497 started at Fri Nov 28 19:32:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2286497 at Fri Nov 28 19:32:51 CST 2025 kill -USR1 2286497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286497 killed at Fri Nov 28 19:32:51 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286542 >/dev/null 2>/dev/null selfserv_9351 with PID 2286542 found at Fri Nov 28 19:32:51 CST 2025 selfserv_9351 with PID 2286542 started at Fri Nov 28 19:32:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286542 at Fri Nov 28 19:32:52 CST 2025 kill -USR1 2286542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286542 killed at Fri Nov 28 19:32:52 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286583 >/dev/null 2>/dev/null selfserv_9351 with PID 2286583 found at Fri Nov 28 19:32:52 CST 2025 selfserv_9351 with PID 2286583 started at Fri Nov 28 19:32:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286583 at Fri Nov 28 19:32:52 CST 2025 kill -USR1 2286583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286583 killed at Fri Nov 28 19:32:52 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286624 >/dev/null 2>/dev/null selfserv_9351 with PID 2286624 found at Fri Nov 28 19:32:52 CST 2025 selfserv_9351 with PID 2286624 started at Fri Nov 28 19:32:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286624 at Fri Nov 28 19:32:53 CST 2025 kill -USR1 2286624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286624 killed at Fri Nov 28 19:32:53 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286666 >/dev/null 2>/dev/null selfserv_9351 with PID 2286666 found at Fri Nov 28 19:32:53 CST 2025 selfserv_9351 with PID 2286666 started at Fri Nov 28 19:32:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2286666 at Fri Nov 28 19:32:53 CST 2025 kill -USR1 2286666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286666 killed at Fri Nov 28 19:32:53 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286707 >/dev/null 2>/dev/null selfserv_9351 with PID 2286707 found at Fri Nov 28 19:32:53 CST 2025 selfserv_9351 with PID 2286707 started at Fri Nov 28 19:32:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286707 at Fri Nov 28 19:32:53 CST 2025 kill -USR1 2286707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286707 killed at Fri Nov 28 19:32:53 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286754 >/dev/null 2>/dev/null selfserv_9351 with PID 2286754 found at Fri Nov 28 19:32:53 CST 2025 selfserv_9351 with PID 2286754 started at Fri Nov 28 19:32:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286754 at Fri Nov 28 19:32:54 CST 2025 kill -USR1 2286754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286754 killed at Fri Nov 28 19:32:54 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286795 >/dev/null 2>/dev/null selfserv_9351 with PID 2286795 found at Fri Nov 28 19:32:54 CST 2025 selfserv_9351 with PID 2286795 started at Fri Nov 28 19:32:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286795 at Fri Nov 28 19:32:54 CST 2025 kill -USR1 2286795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286795 killed at Fri Nov 28 19:32:54 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:32:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286836 >/dev/null 2>/dev/null selfserv_9351 with PID 2286836 found at Fri Nov 28 19:32:54 CST 2025 selfserv_9351 with PID 2286836 started at Fri Nov 28 19:32:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2286836 at Fri Nov 28 19:32:54 CST 2025 kill -USR1 2286836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286836 killed at Fri Nov 28 19:32:54 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286883 >/dev/null 2>/dev/null selfserv_9351 with PID 2286883 found at Fri Nov 28 19:32:55 CST 2025 selfserv_9351 with PID 2286883 started at Fri Nov 28 19:32:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286883 at Fri Nov 28 19:32:55 CST 2025 kill -USR1 2286883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286883 killed at Fri Nov 28 19:32:55 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286924 >/dev/null 2>/dev/null selfserv_9351 with PID 2286924 found at Fri Nov 28 19:32:55 CST 2025 selfserv_9351 with PID 2286924 started at Fri Nov 28 19:32:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286924 at Fri Nov 28 19:32:55 CST 2025 kill -USR1 2286924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286924 killed at Fri Nov 28 19:32:55 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:32:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2286966 >/dev/null 2>/dev/null selfserv_9351 with PID 2286966 found at Fri Nov 28 19:32:55 CST 2025 selfserv_9351 with PID 2286966 started at Fri Nov 28 19:32:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1002: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2286966 at Fri Nov 28 19:32:56 CST 2025 kill -USR1 2286966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2286966 killed at Fri Nov 28 19:32:56 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287037 >/dev/null 2>/dev/null selfserv_9351 with PID 2287037 found at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 with PID 2287037 started at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287037 at Fri Nov 28 19:32:56 CST 2025 kill -USR1 2287037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287037 killed at Fri Nov 28 19:32:56 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287068 >/dev/null 2>/dev/null selfserv_9351 with PID 2287068 found at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 with PID 2287068 started at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287068 at Fri Nov 28 19:32:56 CST 2025 kill -USR1 2287068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287068 killed at Fri Nov 28 19:32:56 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287096 >/dev/null 2>/dev/null selfserv_9351 with PID 2287096 found at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 with PID 2287096 started at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2287096 at Fri Nov 28 19:32:56 CST 2025 kill -USR1 2287096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287096 killed at Fri Nov 28 19:32:56 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287124 >/dev/null 2>/dev/null selfserv_9351 with PID 2287124 found at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 with PID 2287124 started at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287124 at Fri Nov 28 19:32:57 CST 2025 kill -USR1 2287124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287124 killed at Fri Nov 28 19:32:57 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287152 >/dev/null 2>/dev/null selfserv_9351 with PID 2287152 found at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 with PID 2287152 started at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2287152 at Fri Nov 28 19:32:57 CST 2025 kill -USR1 2287152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287152 killed at Fri Nov 28 19:32:57 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287180 >/dev/null 2>/dev/null selfserv_9351 with PID 2287180 found at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 with PID 2287180 started at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287180 at Fri Nov 28 19:32:57 CST 2025 kill -USR1 2287180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287180 killed at Fri Nov 28 19:32:57 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287208 >/dev/null 2>/dev/null selfserv_9351 with PID 2287208 found at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 with PID 2287208 started at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287208 at Fri Nov 28 19:32:57 CST 2025 kill -USR1 2287208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287208 killed at Fri Nov 28 19:32:57 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287236 >/dev/null 2>/dev/null selfserv_9351 with PID 2287236 found at Fri Nov 28 19:32:57 CST 2025 selfserv_9351 with PID 2287236 started at Fri Nov 28 19:32:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287236 at Fri Nov 28 19:32:58 CST 2025 kill -USR1 2287236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287236 killed at Fri Nov 28 19:32:58 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287264 >/dev/null 2>/dev/null selfserv_9351 with PID 2287264 found at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 with PID 2287264 started at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287264 at Fri Nov 28 19:32:58 CST 2025 kill -USR1 2287264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287264 killed at Fri Nov 28 19:32:58 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287292 >/dev/null 2>/dev/null selfserv_9351 with PID 2287292 found at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 with PID 2287292 started at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287292 at Fri Nov 28 19:32:58 CST 2025 kill -USR1 2287292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287292 killed at Fri Nov 28 19:32:58 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287320 >/dev/null 2>/dev/null selfserv_9351 with PID 2287320 found at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 with PID 2287320 started at Fri Nov 28 19:32:58 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287320 at Fri Nov 28 19:32:58 CST 2025 kill -USR1 2287320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287320 killed at Fri Nov 28 19:32:58 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287349 >/dev/null 2>/dev/null selfserv_9351 with PID 2287349 found at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 with PID 2287349 started at Fri Nov 28 19:32:58 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2287349 at Fri Nov 28 19:32:58 CST 2025 kill -USR1 2287349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287349 killed at Fri Nov 28 19:32:58 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287382 >/dev/null 2>/dev/null selfserv_9351 with PID 2287382 found at Fri Nov 28 19:32:58 CST 2025 selfserv_9351 with PID 2287382 started at Fri Nov 28 19:32:58 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287382 at Fri Nov 28 19:32:59 CST 2025 kill -USR1 2287382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287382 killed at Fri Nov 28 19:32:59 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287411 >/dev/null 2>/dev/null selfserv_9351 with PID 2287411 found at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 with PID 2287411 started at Fri Nov 28 19:32:59 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2287411 at Fri Nov 28 19:32:59 CST 2025 kill -USR1 2287411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287411 killed at Fri Nov 28 19:32:59 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287452 >/dev/null 2>/dev/null selfserv_9351 with PID 2287452 found at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 with PID 2287452 started at Fri Nov 28 19:32:59 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287452 at Fri Nov 28 19:32:59 CST 2025 kill -USR1 2287452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287452 killed at Fri Nov 28 19:32:59 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287481 >/dev/null 2>/dev/null selfserv_9351 with PID 2287481 found at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 with PID 2287481 started at Fri Nov 28 19:32:59 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287481 at Fri Nov 28 19:32:59 CST 2025 kill -USR1 2287481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287481 killed at Fri Nov 28 19:32:59 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287510 >/dev/null 2>/dev/null selfserv_9351 with PID 2287510 found at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 with PID 2287510 started at Fri Nov 28 19:32:59 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287510 at Fri Nov 28 19:32:59 CST 2025 kill -USR1 2287510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287510 killed at Fri Nov 28 19:32:59 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:32:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287545 >/dev/null 2>/dev/null selfserv_9351 with PID 2287545 found at Fri Nov 28 19:32:59 CST 2025 selfserv_9351 with PID 2287545 started at Fri Nov 28 19:32:59 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287545 at Fri Nov 28 19:33:00 CST 2025 kill -USR1 2287545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287545 killed at Fri Nov 28 19:33:00 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:00 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2287574 >/dev/null 2>/dev/null selfserv_9351 with PID 2287574 found at Fri Nov 28 19:33:00 CST 2025 selfserv_9351 with PID 2287574 started at Fri Nov 28 19:33:00 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #963: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2287574 at Fri Nov 28 19:33:00 CST 2025 kill -USR1 2287574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287574 killed at Fri Nov 28 19:33:00 CST 2025 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -fips true -force FIPS mode enabled. ssl.sh: #964: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -list ssl.sh: #965: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #966: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -fips true -force FIPS mode enabled. ssl.sh: #967: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #968: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #969: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:33:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2287641 >/dev/null 2>/dev/null selfserv_9351 with PID 2287641 found at Fri Nov 28 19:33:00 CST 2025 selfserv_9351 with PID 2287641 started at Fri Nov 28 19:33:00 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2287641 at Fri Nov 28 19:33:04 CST 2025 kill -USR1 2287641 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2287641 killed at Fri Nov 28 19:33:04 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:33:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2288197 >/dev/null 2>/dev/null selfserv_9351 with PID 2288197 found at Fri Nov 28 19:33:04 CST 2025 selfserv_9351 with PID 2288197 started at Fri Nov 28 19:33:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1096: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2288197 at Fri Nov 28 19:33:10 CST 2025 kill -USR1 2288197 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2288197 killed at Fri Nov 28 19:33:10 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:33:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2288921 >/dev/null 2>/dev/null selfserv_9351 with PID 2288921 found at Fri Nov 28 19:33:10 CST 2025 selfserv_9351 with PID 2288921 started at Fri Nov 28 19:33:10 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2288921 at Fri Nov 28 19:33:10 CST 2025 kill -USR1 2288921 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2288921 killed at Fri Nov 28 19:33:10 CST 2025 ssl.sh: SSL Client Authentication - server fips/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2288975 >/dev/null 2>/dev/null selfserv_9351 with PID 2288975 found at Fri Nov 28 19:33:10 CST 2025 selfserv_9351 with PID 2288975 started at Fri Nov 28 19:33:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2288975 at Fri Nov 28 19:33:10 CST 2025 kill -USR1 2288975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2288975 killed at Fri Nov 28 19:33:10 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289020 >/dev/null 2>/dev/null selfserv_9351 with PID 2289020 found at Fri Nov 28 19:33:10 CST 2025 selfserv_9351 with PID 2289020 started at Fri Nov 28 19:33:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289020 at Fri Nov 28 19:33:11 CST 2025 kill -USR1 2289020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289020 killed at Fri Nov 28 19:33:11 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289061 >/dev/null 2>/dev/null selfserv_9351 with PID 2289061 found at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 with PID 2289061 started at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289061 at Fri Nov 28 19:33:11 CST 2025 kill -USR1 2289061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289061 killed at Fri Nov 28 19:33:11 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289102 >/dev/null 2>/dev/null selfserv_9351 with PID 2289102 found at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 with PID 2289102 started at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289102 at Fri Nov 28 19:33:11 CST 2025 kill -USR1 2289102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289102 killed at Fri Nov 28 19:33:11 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289143 >/dev/null 2>/dev/null selfserv_9351 with PID 2289143 found at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 with PID 2289143 started at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1101: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289143 at Fri Nov 28 19:33:11 CST 2025 kill -USR1 2289143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289143 killed at Fri Nov 28 19:33:11 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289188 >/dev/null 2>/dev/null selfserv_9351 with PID 2289188 found at Fri Nov 28 19:33:11 CST 2025 selfserv_9351 with PID 2289188 started at Fri Nov 28 19:33:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289188 at Fri Nov 28 19:33:12 CST 2025 kill -USR1 2289188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289188 killed at Fri Nov 28 19:33:12 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289229 >/dev/null 2>/dev/null selfserv_9351 with PID 2289229 found at Fri Nov 28 19:33:12 CST 2025 selfserv_9351 with PID 2289229 started at Fri Nov 28 19:33:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289229 at Fri Nov 28 19:33:12 CST 2025 kill -USR1 2289229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289229 killed at Fri Nov 28 19:33:12 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289270 >/dev/null 2>/dev/null selfserv_9351 with PID 2289270 found at Fri Nov 28 19:33:12 CST 2025 selfserv_9351 with PID 2289270 started at Fri Nov 28 19:33:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289270 at Fri Nov 28 19:33:12 CST 2025 kill -USR1 2289270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289270 killed at Fri Nov 28 19:33:12 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289311 >/dev/null 2>/dev/null selfserv_9351 with PID 2289311 found at Fri Nov 28 19:33:12 CST 2025 selfserv_9351 with PID 2289311 started at Fri Nov 28 19:33:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289311 at Fri Nov 28 19:33:13 CST 2025 kill -USR1 2289311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289311 killed at Fri Nov 28 19:33:13 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289353 >/dev/null 2>/dev/null selfserv_9351 with PID 2289353 found at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 with PID 2289353 started at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289353 at Fri Nov 28 19:33:13 CST 2025 kill -USR1 2289353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289353 killed at Fri Nov 28 19:33:13 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289394 >/dev/null 2>/dev/null selfserv_9351 with PID 2289394 found at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 with PID 2289394 started at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1107: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289394 at Fri Nov 28 19:33:13 CST 2025 kill -USR1 2289394 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289394 killed at Fri Nov 28 19:33:13 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289435 >/dev/null 2>/dev/null selfserv_9351 with PID 2289435 found at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 with PID 2289435 started at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289435 at Fri Nov 28 19:33:13 CST 2025 kill -USR1 2289435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289435 killed at Fri Nov 28 19:33:13 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289481 >/dev/null 2>/dev/null selfserv_9351 with PID 2289481 found at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 with PID 2289481 started at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289481 at Fri Nov 28 19:33:14 CST 2025 kill -USR1 2289481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289481 killed at Fri Nov 28 19:33:14 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289522 >/dev/null 2>/dev/null selfserv_9351 with PID 2289522 found at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 with PID 2289522 started at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289522 at Fri Nov 28 19:33:14 CST 2025 kill -USR1 2289522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289522 killed at Fri Nov 28 19:33:14 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289563 >/dev/null 2>/dev/null selfserv_9351 with PID 2289563 found at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 with PID 2289563 started at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289563 at Fri Nov 28 19:33:14 CST 2025 kill -USR1 2289563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289563 killed at Fri Nov 28 19:33:14 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289604 >/dev/null 2>/dev/null selfserv_9351 with PID 2289604 found at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 with PID 2289604 started at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289604 at Fri Nov 28 19:33:14 CST 2025 kill -USR1 2289604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289604 killed at Fri Nov 28 19:33:14 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289651 >/dev/null 2>/dev/null selfserv_9351 with PID 2289651 found at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 with PID 2289651 started at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1113: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289651 at Fri Nov 28 19:33:15 CST 2025 kill -USR1 2289651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289651 killed at Fri Nov 28 19:33:15 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289692 >/dev/null 2>/dev/null selfserv_9351 with PID 2289692 found at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 with PID 2289692 started at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289692 at Fri Nov 28 19:33:15 CST 2025 kill -USR1 2289692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289692 killed at Fri Nov 28 19:33:15 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289733 >/dev/null 2>/dev/null selfserv_9351 with PID 2289733 found at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 with PID 2289733 started at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289733 at Fri Nov 28 19:33:15 CST 2025 kill -USR1 2289733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289733 killed at Fri Nov 28 19:33:15 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289776 >/dev/null 2>/dev/null selfserv_9351 with PID 2289776 found at Fri Nov 28 19:33:15 CST 2025 selfserv_9351 with PID 2289776 started at Fri Nov 28 19:33:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289776 at Fri Nov 28 19:33:15 CST 2025 kill -USR1 2289776 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289776 killed at Fri Nov 28 19:33:16 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289817 >/dev/null 2>/dev/null selfserv_9351 with PID 2289817 found at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 with PID 2289817 started at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1117: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289817 at Fri Nov 28 19:33:16 CST 2025 kill -USR1 2289817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289817 killed at Fri Nov 28 19:33:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289858 >/dev/null 2>/dev/null selfserv_9351 with PID 2289858 found at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 with PID 2289858 started at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289858 at Fri Nov 28 19:33:16 CST 2025 kill -USR1 2289858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289858 killed at Fri Nov 28 19:33:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289899 >/dev/null 2>/dev/null selfserv_9351 with PID 2289899 found at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 with PID 2289899 started at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2289899 at Fri Nov 28 19:33:16 CST 2025 kill -USR1 2289899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289899 killed at Fri Nov 28 19:33:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289941 >/dev/null 2>/dev/null selfserv_9351 with PID 2289941 found at Fri Nov 28 19:33:16 CST 2025 selfserv_9351 with PID 2289941 started at Fri Nov 28 19:33:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289941 at Fri Nov 28 19:33:17 CST 2025 kill -USR1 2289941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289941 killed at Fri Nov 28 19:33:17 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2289982 >/dev/null 2>/dev/null selfserv_9351 with PID 2289982 found at Fri Nov 28 19:33:17 CST 2025 selfserv_9351 with PID 2289982 started at Fri Nov 28 19:33:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2289982 at Fri Nov 28 19:33:17 CST 2025 kill -USR1 2289982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2289982 killed at Fri Nov 28 19:33:17 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290023 >/dev/null 2>/dev/null selfserv_9351 with PID 2290023 found at Fri Nov 28 19:33:17 CST 2025 selfserv_9351 with PID 2290023 started at Fri Nov 28 19:33:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290023 at Fri Nov 28 19:33:17 CST 2025 kill -USR1 2290023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290023 killed at Fri Nov 28 19:33:17 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290065 >/dev/null 2>/dev/null selfserv_9351 with PID 2290065 found at Fri Nov 28 19:33:17 CST 2025 selfserv_9351 with PID 2290065 started at Fri Nov 28 19:33:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290065 at Fri Nov 28 19:33:18 CST 2025 kill -USR1 2290065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290065 killed at Fri Nov 28 19:33:18 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290106 >/dev/null 2>/dev/null selfserv_9351 with PID 2290106 found at Fri Nov 28 19:33:18 CST 2025 selfserv_9351 with PID 2290106 started at Fri Nov 28 19:33:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2290106 at Fri Nov 28 19:33:18 CST 2025 kill -USR1 2290106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290106 killed at Fri Nov 28 19:33:18 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290147 >/dev/null 2>/dev/null selfserv_9351 with PID 2290147 found at Fri Nov 28 19:33:18 CST 2025 selfserv_9351 with PID 2290147 started at Fri Nov 28 19:33:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1125: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2290147 at Fri Nov 28 19:33:18 CST 2025 kill -USR1 2290147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290147 killed at Fri Nov 28 19:33:18 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290192 >/dev/null 2>/dev/null selfserv_9351 with PID 2290192 found at Fri Nov 28 19:33:18 CST 2025 selfserv_9351 with PID 2290192 started at Fri Nov 28 19:33:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290192 at Fri Nov 28 19:33:19 CST 2025 kill -USR1 2290192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290192 killed at Fri Nov 28 19:33:19 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290233 >/dev/null 2>/dev/null selfserv_9351 with PID 2290233 found at Fri Nov 28 19:33:19 CST 2025 selfserv_9351 with PID 2290233 started at Fri Nov 28 19:33:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290233 at Fri Nov 28 19:33:19 CST 2025 kill -USR1 2290233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290233 killed at Fri Nov 28 19:33:19 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290274 >/dev/null 2>/dev/null selfserv_9351 with PID 2290274 found at Fri Nov 28 19:33:19 CST 2025 selfserv_9351 with PID 2290274 started at Fri Nov 28 19:33:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290274 at Fri Nov 28 19:33:19 CST 2025 kill -USR1 2290274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290274 killed at Fri Nov 28 19:33:19 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290315 >/dev/null 2>/dev/null selfserv_9351 with PID 2290315 found at Fri Nov 28 19:33:19 CST 2025 selfserv_9351 with PID 2290315 started at Fri Nov 28 19:33:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290315 at Fri Nov 28 19:33:19 CST 2025 kill -USR1 2290315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290315 killed at Fri Nov 28 19:33:19 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290362 >/dev/null 2>/dev/null selfserv_9351 with PID 2290362 found at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 with PID 2290362 started at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1130: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2290362 at Fri Nov 28 19:33:20 CST 2025 kill -USR1 2290362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290362 killed at Fri Nov 28 19:33:20 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290403 >/dev/null 2>/dev/null selfserv_9351 with PID 2290403 found at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 with PID 2290403 started at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290403 at Fri Nov 28 19:33:20 CST 2025 kill -USR1 2290403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290403 killed at Fri Nov 28 19:33:20 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290444 >/dev/null 2>/dev/null selfserv_9351 with PID 2290444 found at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 with PID 2290444 started at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290444 at Fri Nov 28 19:33:20 CST 2025 kill -USR1 2290444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290444 killed at Fri Nov 28 19:33:20 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290490 >/dev/null 2>/dev/null selfserv_9351 with PID 2290490 found at Fri Nov 28 19:33:20 CST 2025 selfserv_9351 with PID 2290490 started at Fri Nov 28 19:33:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290490 at Fri Nov 28 19:33:21 CST 2025 kill -USR1 2290490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290490 killed at Fri Nov 28 19:33:21 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290531 >/dev/null 2>/dev/null selfserv_9351 with PID 2290531 found at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 with PID 2290531 started at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290531 at Fri Nov 28 19:33:21 CST 2025 kill -USR1 2290531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290531 killed at Fri Nov 28 19:33:21 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290572 >/dev/null 2>/dev/null selfserv_9351 with PID 2290572 found at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 with PID 2290572 started at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1135: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2290572 at Fri Nov 28 19:33:21 CST 2025 kill -USR1 2290572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290572 killed at Fri Nov 28 19:33:21 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290613 >/dev/null 2>/dev/null selfserv_9351 with PID 2290613 found at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 with PID 2290613 started at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290613 at Fri Nov 28 19:33:21 CST 2025 kill -USR1 2290613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290613 killed at Fri Nov 28 19:33:21 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290660 >/dev/null 2>/dev/null selfserv_9351 with PID 2290660 found at Fri Nov 28 19:33:21 CST 2025 selfserv_9351 with PID 2290660 started at Fri Nov 28 19:33:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290660 at Fri Nov 28 19:33:22 CST 2025 kill -USR1 2290660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290660 killed at Fri Nov 28 19:33:22 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290702 >/dev/null 2>/dev/null selfserv_9351 with PID 2290702 found at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 with PID 2290702 started at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290702 at Fri Nov 28 19:33:22 CST 2025 kill -USR1 2290702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290702 killed at Fri Nov 28 19:33:22 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290743 >/dev/null 2>/dev/null selfserv_9351 with PID 2290743 found at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 with PID 2290743 started at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1139: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2290743 at Fri Nov 28 19:33:22 CST 2025 kill -USR1 2290743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290743 killed at Fri Nov 28 19:33:22 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290784 >/dev/null 2>/dev/null selfserv_9351 with PID 2290784 found at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 with PID 2290784 started at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290784 at Fri Nov 28 19:33:22 CST 2025 kill -USR1 2290784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290784 killed at Fri Nov 28 19:33:22 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290826 >/dev/null 2>/dev/null selfserv_9351 with PID 2290826 found at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 with PID 2290826 started at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290826 at Fri Nov 28 19:33:23 CST 2025 kill -USR1 2290826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290826 killed at Fri Nov 28 19:33:23 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290875 >/dev/null 2>/dev/null selfserv_9351 with PID 2290875 found at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 with PID 2290875 started at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290875 at Fri Nov 28 19:33:23 CST 2025 kill -USR1 2290875 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290875 killed at Fri Nov 28 19:33:23 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290926 >/dev/null 2>/dev/null selfserv_9351 with PID 2290926 found at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 with PID 2290926 started at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2290926 at Fri Nov 28 19:33:23 CST 2025 kill -USR1 2290926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290926 killed at Fri Nov 28 19:33:23 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2290967 >/dev/null 2>/dev/null selfserv_9351 with PID 2290967 found at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 with PID 2290967 started at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2290967 at Fri Nov 28 19:33:23 CST 2025 kill -USR1 2290967 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2290967 killed at Fri Nov 28 19:33:23 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291014 >/dev/null 2>/dev/null selfserv_9351 with PID 2291014 found at Fri Nov 28 19:33:23 CST 2025 selfserv_9351 with PID 2291014 started at Fri Nov 28 19:33:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291014 at Fri Nov 28 19:33:24 CST 2025 kill -USR1 2291014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291014 killed at Fri Nov 28 19:33:24 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291055 >/dev/null 2>/dev/null selfserv_9351 with PID 2291055 found at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 with PID 2291055 started at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291055 at Fri Nov 28 19:33:24 CST 2025 kill -USR1 2291055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291055 killed at Fri Nov 28 19:33:24 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291096 >/dev/null 2>/dev/null selfserv_9351 with PID 2291096 found at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 with PID 2291096 started at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291096 at Fri Nov 28 19:33:24 CST 2025 kill -USR1 2291096 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291096 killed at Fri Nov 28 19:33:24 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291137 >/dev/null 2>/dev/null selfserv_9351 with PID 2291137 found at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 with PID 2291137 started at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291137 at Fri Nov 28 19:33:24 CST 2025 kill -USR1 2291137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291137 killed at Fri Nov 28 19:33:24 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291184 >/dev/null 2>/dev/null selfserv_9351 with PID 2291184 found at Fri Nov 28 19:33:24 CST 2025 selfserv_9351 with PID 2291184 started at Fri Nov 28 19:33:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291184 at Fri Nov 28 19:33:25 CST 2025 kill -USR1 2291184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291184 killed at Fri Nov 28 19:33:25 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291225 >/dev/null 2>/dev/null selfserv_9351 with PID 2291225 found at Fri Nov 28 19:33:25 CST 2025 selfserv_9351 with PID 2291225 started at Fri Nov 28 19:33:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1150: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291225 at Fri Nov 28 19:33:25 CST 2025 kill -USR1 2291225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291225 killed at Fri Nov 28 19:33:25 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291266 >/dev/null 2>/dev/null selfserv_9351 with PID 2291266 found at Fri Nov 28 19:33:25 CST 2025 selfserv_9351 with PID 2291266 started at Fri Nov 28 19:33:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291266 at Fri Nov 28 19:33:25 CST 2025 kill -USR1 2291266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291266 killed at Fri Nov 28 19:33:25 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291308 >/dev/null 2>/dev/null selfserv_9351 with PID 2291308 found at Fri Nov 28 19:33:25 CST 2025 selfserv_9351 with PID 2291308 started at Fri Nov 28 19:33:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291308 at Fri Nov 28 19:33:26 CST 2025 kill -USR1 2291308 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291308 killed at Fri Nov 28 19:33:26 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291349 >/dev/null 2>/dev/null selfserv_9351 with PID 2291349 found at Fri Nov 28 19:33:26 CST 2025 selfserv_9351 with PID 2291349 started at Fri Nov 28 19:33:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291349 at Fri Nov 28 19:33:26 CST 2025 kill -USR1 2291349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291349 killed at Fri Nov 28 19:33:26 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291390 >/dev/null 2>/dev/null selfserv_9351 with PID 2291390 found at Fri Nov 28 19:33:26 CST 2025 selfserv_9351 with PID 2291390 started at Fri Nov 28 19:33:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291390 at Fri Nov 28 19:33:26 CST 2025 kill -USR1 2291390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291390 killed at Fri Nov 28 19:33:26 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:33:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291437 >/dev/null 2>/dev/null selfserv_9351 with PID 2291437 found at Fri Nov 28 19:33:26 CST 2025 selfserv_9351 with PID 2291437 started at Fri Nov 28 19:33:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291437 at Fri Nov 28 19:33:27 CST 2025 kill -USR1 2291437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291437 killed at Fri Nov 28 19:33:27 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291484 >/dev/null 2>/dev/null selfserv_9351 with PID 2291484 found at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 with PID 2291484 started at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1156: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291484 at Fri Nov 28 19:33:27 CST 2025 kill -USR1 2291484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291484 killed at Fri Nov 28 19:33:27 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291531 >/dev/null 2>/dev/null selfserv_9351 with PID 2291531 found at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 with PID 2291531 started at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291531 at Fri Nov 28 19:33:27 CST 2025 kill -USR1 2291531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291531 killed at Fri Nov 28 19:33:27 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291578 >/dev/null 2>/dev/null selfserv_9351 with PID 2291578 found at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 with PID 2291578 started at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1158: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291578 at Fri Nov 28 19:33:27 CST 2025 kill -USR1 2291578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291578 killed at Fri Nov 28 19:33:27 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:33:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291625 >/dev/null 2>/dev/null selfserv_9351 with PID 2291625 found at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 with PID 2291625 started at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1159: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291625 at Fri Nov 28 19:33:28 CST 2025 kill -USR1 2291625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291625 killed at Fri Nov 28 19:33:28 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291672 >/dev/null 2>/dev/null selfserv_9351 with PID 2291672 found at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 with PID 2291672 started at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291672 at Fri Nov 28 19:33:28 CST 2025 kill -USR1 2291672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291672 killed at Fri Nov 28 19:33:28 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291719 >/dev/null 2>/dev/null selfserv_9351 with PID 2291719 found at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 with PID 2291719 started at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1161: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291719 at Fri Nov 28 19:33:28 CST 2025 kill -USR1 2291719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291719 killed at Fri Nov 28 19:33:28 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291770 >/dev/null 2>/dev/null selfserv_9351 with PID 2291770 found at Fri Nov 28 19:33:28 CST 2025 selfserv_9351 with PID 2291770 started at Fri Nov 28 19:33:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1162: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291770 at Fri Nov 28 19:33:28 CST 2025 kill -USR1 2291770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291770 killed at Fri Nov 28 19:33:28 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291817 >/dev/null 2>/dev/null selfserv_9351 with PID 2291817 found at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 with PID 2291817 started at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1163: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291817 at Fri Nov 28 19:33:29 CST 2025 kill -USR1 2291817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291817 killed at Fri Nov 28 19:33:29 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291864 >/dev/null 2>/dev/null selfserv_9351 with PID 2291864 found at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 with PID 2291864 started at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1164: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2291864 at Fri Nov 28 19:33:29 CST 2025 kill -USR1 2291864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291864 killed at Fri Nov 28 19:33:29 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291895 >/dev/null 2>/dev/null selfserv_9351 with PID 2291895 found at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 with PID 2291895 started at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2291895 at Fri Nov 28 19:33:29 CST 2025 kill -USR1 2291895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291895 killed at Fri Nov 28 19:33:29 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291926 >/dev/null 2>/dev/null selfserv_9351 with PID 2291926 found at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 with PID 2291926 started at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2291926 at Fri Nov 28 19:33:29 CST 2025 kill -USR1 2291926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291926 killed at Fri Nov 28 19:33:29 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:33:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291963 >/dev/null 2>/dev/null selfserv_9351 with PID 2291963 found at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 with PID 2291963 started at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2291963 at Fri Nov 28 19:33:30 CST 2025 kill -USR1 2291963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291963 killed at Fri Nov 28 19:33:30 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2291994 >/dev/null 2>/dev/null selfserv_9351 with PID 2291994 found at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 with PID 2291994 started at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2291994 at Fri Nov 28 19:33:30 CST 2025 kill -USR1 2291994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2291994 killed at Fri Nov 28 19:33:30 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292025 >/dev/null 2>/dev/null selfserv_9351 with PID 2292025 found at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 with PID 2292025 started at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2292025 at Fri Nov 28 19:33:30 CST 2025 kill -USR1 2292025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292025 killed at Fri Nov 28 19:33:30 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292056 >/dev/null 2>/dev/null selfserv_9351 with PID 2292056 found at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 with PID 2292056 started at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1102: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2292056 at Fri Nov 28 19:33:30 CST 2025 kill -USR1 2292056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292056 killed at Fri Nov 28 19:33:30 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292087 >/dev/null 2>/dev/null selfserv_9351 with PID 2292087 found at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 with PID 2292087 started at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1103: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2292087 at Fri Nov 28 19:33:30 CST 2025 kill -USR1 2292087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292087 killed at Fri Nov 28 19:33:30 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292122 >/dev/null 2>/dev/null selfserv_9351 with PID 2292122 found at Fri Nov 28 19:33:30 CST 2025 selfserv_9351 with PID 2292122 started at Fri Nov 28 19:33:30 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:33:30 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:33:32 CST 2025 ssl.sh: #1104: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2292122 at Fri Nov 28 19:33:32 CST 2025 kill -USR1 2292122 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292122 killed at Fri Nov 28 19:33:32 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292164 >/dev/null 2>/dev/null selfserv_9351 with PID 2292164 found at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 with PID 2292164 started at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292164 at Fri Nov 28 19:33:32 CST 2025 kill -USR1 2292164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292164 killed at Fri Nov 28 19:33:32 CST 2025 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292195 >/dev/null 2>/dev/null selfserv_9351 with PID 2292195 found at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 with PID 2292195 started at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292195 at Fri Nov 28 19:33:32 CST 2025 kill -USR1 2292195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292195 killed at Fri Nov 28 19:33:32 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292223 >/dev/null 2>/dev/null selfserv_9351 with PID 2292223 found at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 with PID 2292223 started at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2292223 at Fri Nov 28 19:33:32 CST 2025 kill -USR1 2292223 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292223 killed at Fri Nov 28 19:33:32 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292251 >/dev/null 2>/dev/null selfserv_9351 with PID 2292251 found at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 with PID 2292251 started at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292251 at Fri Nov 28 19:33:32 CST 2025 kill -USR1 2292251 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292251 killed at Fri Nov 28 19:33:32 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292280 >/dev/null 2>/dev/null selfserv_9351 with PID 2292280 found at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 with PID 2292280 started at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2292280 at Fri Nov 28 19:33:32 CST 2025 kill -USR1 2292280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292280 killed at Fri Nov 28 19:33:32 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292308 >/dev/null 2>/dev/null selfserv_9351 with PID 2292308 found at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 with PID 2292308 started at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292308 at Fri Nov 28 19:33:33 CST 2025 kill -USR1 2292308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292308 killed at Fri Nov 28 19:33:33 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292336 >/dev/null 2>/dev/null selfserv_9351 with PID 2292336 found at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 with PID 2292336 started at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292336 at Fri Nov 28 19:33:33 CST 2025 kill -USR1 2292336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292336 killed at Fri Nov 28 19:33:33 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292364 >/dev/null 2>/dev/null selfserv_9351 with PID 2292364 found at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 with PID 2292364 started at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292364 at Fri Nov 28 19:33:33 CST 2025 kill -USR1 2292364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292364 killed at Fri Nov 28 19:33:33 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292392 >/dev/null 2>/dev/null selfserv_9351 with PID 2292392 found at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 with PID 2292392 started at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292392 at Fri Nov 28 19:33:33 CST 2025 kill -USR1 2292392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292392 killed at Fri Nov 28 19:33:33 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292420 >/dev/null 2>/dev/null selfserv_9351 with PID 2292420 found at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 with PID 2292420 started at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292420 at Fri Nov 28 19:33:33 CST 2025 kill -USR1 2292420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292420 killed at Fri Nov 28 19:33:33 CST 2025 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292453 >/dev/null 2>/dev/null selfserv_9351 with PID 2292453 found at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 with PID 2292453 started at Fri Nov 28 19:33:34 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292453 at Fri Nov 28 19:33:34 CST 2025 kill -USR1 2292453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292453 killed at Fri Nov 28 19:33:34 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292482 >/dev/null 2>/dev/null selfserv_9351 with PID 2292482 found at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 with PID 2292482 started at Fri Nov 28 19:33:34 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2292482 at Fri Nov 28 19:33:34 CST 2025 kill -USR1 2292482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292482 killed at Fri Nov 28 19:33:34 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292511 >/dev/null 2>/dev/null selfserv_9351 with PID 2292511 found at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 with PID 2292511 started at Fri Nov 28 19:33:34 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292511 at Fri Nov 28 19:33:34 CST 2025 kill -USR1 2292511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292511 killed at Fri Nov 28 19:33:34 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292540 >/dev/null 2>/dev/null selfserv_9351 with PID 2292540 found at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 with PID 2292540 started at Fri Nov 28 19:33:34 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2292540 at Fri Nov 28 19:33:34 CST 2025 kill -USR1 2292540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292540 killed at Fri Nov 28 19:33:34 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292569 >/dev/null 2>/dev/null selfserv_9351 with PID 2292569 found at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 with PID 2292569 started at Fri Nov 28 19:33:34 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292569 at Fri Nov 28 19:33:34 CST 2025 kill -USR1 2292569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292569 killed at Fri Nov 28 19:33:34 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292604 >/dev/null 2>/dev/null selfserv_9351 with PID 2292604 found at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 with PID 2292604 started at Fri Nov 28 19:33:34 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292604 at Fri Nov 28 19:33:34 CST 2025 kill -USR1 2292604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292604 killed at Fri Nov 28 19:33:34 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292633 >/dev/null 2>/dev/null selfserv_9351 with PID 2292633 found at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 with PID 2292633 started at Fri Nov 28 19:33:35 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292633 at Fri Nov 28 19:33:35 CST 2025 kill -USR1 2292633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292633 killed at Fri Nov 28 19:33:35 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292662 >/dev/null 2>/dev/null selfserv_9351 with PID 2292662 found at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 with PID 2292662 started at Fri Nov 28 19:33:35 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292662 at Fri Nov 28 19:33:35 CST 2025 kill -USR1 2292662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292662 killed at Fri Nov 28 19:33:35 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2292691 >/dev/null 2>/dev/null selfserv_9351 with PID 2292691 found at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 with PID 2292691 started at Fri Nov 28 19:33:35 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1123: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2292691 at Fri Nov 28 19:33:35 CST 2025 kill -USR1 2292691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292691 killed at Fri Nov 28 19:33:35 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2292720 >/dev/null 2>/dev/null selfserv_9351 with PID 2292720 found at Fri Nov 28 19:33:35 CST 2025 selfserv_9351 with PID 2292720 started at Fri Nov 28 19:33:35 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2292720 at Fri Nov 28 19:33:39 CST 2025 kill -USR1 2292720 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2292720 killed at Fri Nov 28 19:33:39 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:33:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2293218 >/dev/null 2>/dev/null selfserv_9351 with PID 2293218 found at Fri Nov 28 19:33:40 CST 2025 selfserv_9351 with PID 2293218 started at Fri Nov 28 19:33:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1250: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2293218 at Fri Nov 28 19:33:45 CST 2025 kill -USR1 2293218 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2293218 killed at Fri Nov 28 19:33:45 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2293963 >/dev/null 2>/dev/null selfserv_9351 with PID 2293963 found at Fri Nov 28 19:33:46 CST 2025 selfserv_9351 with PID 2293963 started at Fri Nov 28 19:33:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2293963 at Fri Nov 28 19:33:46 CST 2025 kill -USR1 2293963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2293963 killed at Fri Nov 28 19:33:46 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294004 >/dev/null 2>/dev/null selfserv_9351 with PID 2294004 found at Fri Nov 28 19:33:46 CST 2025 selfserv_9351 with PID 2294004 started at Fri Nov 28 19:33:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294004 at Fri Nov 28 19:33:46 CST 2025 kill -USR1 2294004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294004 killed at Fri Nov 28 19:33:46 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294045 >/dev/null 2>/dev/null selfserv_9351 with PID 2294045 found at Fri Nov 28 19:33:46 CST 2025 selfserv_9351 with PID 2294045 started at Fri Nov 28 19:33:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294045 at Fri Nov 28 19:33:47 CST 2025 kill -USR1 2294045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294045 killed at Fri Nov 28 19:33:47 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294086 >/dev/null 2>/dev/null selfserv_9351 with PID 2294086 found at Fri Nov 28 19:33:47 CST 2025 selfserv_9351 with PID 2294086 started at Fri Nov 28 19:33:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294086 at Fri Nov 28 19:33:47 CST 2025 kill -USR1 2294086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294086 killed at Fri Nov 28 19:33:47 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294127 >/dev/null 2>/dev/null selfserv_9351 with PID 2294127 found at Fri Nov 28 19:33:47 CST 2025 selfserv_9351 with PID 2294127 started at Fri Nov 28 19:33:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1255: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294127 at Fri Nov 28 19:33:47 CST 2025 kill -USR1 2294127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294127 killed at Fri Nov 28 19:33:47 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294168 >/dev/null 2>/dev/null selfserv_9351 with PID 2294168 found at Fri Nov 28 19:33:47 CST 2025 selfserv_9351 with PID 2294168 started at Fri Nov 28 19:33:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294168 at Fri Nov 28 19:33:48 CST 2025 kill -USR1 2294168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294168 killed at Fri Nov 28 19:33:48 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294209 >/dev/null 2>/dev/null selfserv_9351 with PID 2294209 found at Fri Nov 28 19:33:48 CST 2025 selfserv_9351 with PID 2294209 started at Fri Nov 28 19:33:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294209 at Fri Nov 28 19:33:48 CST 2025 kill -USR1 2294209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294209 killed at Fri Nov 28 19:33:48 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294250 >/dev/null 2>/dev/null selfserv_9351 with PID 2294250 found at Fri Nov 28 19:33:48 CST 2025 selfserv_9351 with PID 2294250 started at Fri Nov 28 19:33:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294250 at Fri Nov 28 19:33:49 CST 2025 kill -USR1 2294250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294250 killed at Fri Nov 28 19:33:49 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294295 >/dev/null 2>/dev/null selfserv_9351 with PID 2294295 found at Fri Nov 28 19:33:49 CST 2025 selfserv_9351 with PID 2294295 started at Fri Nov 28 19:33:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294295 at Fri Nov 28 19:33:49 CST 2025 kill -USR1 2294295 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294295 killed at Fri Nov 28 19:33:49 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294336 >/dev/null 2>/dev/null selfserv_9351 with PID 2294336 found at Fri Nov 28 19:33:49 CST 2025 selfserv_9351 with PID 2294336 started at Fri Nov 28 19:33:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294336 at Fri Nov 28 19:33:49 CST 2025 kill -USR1 2294336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294336 killed at Fri Nov 28 19:33:49 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294383 >/dev/null 2>/dev/null selfserv_9351 with PID 2294383 found at Fri Nov 28 19:33:50 CST 2025 selfserv_9351 with PID 2294383 started at Fri Nov 28 19:33:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1261: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294383 at Fri Nov 28 19:33:50 CST 2025 kill -USR1 2294383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294383 killed at Fri Nov 28 19:33:50 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294424 >/dev/null 2>/dev/null selfserv_9351 with PID 2294424 found at Fri Nov 28 19:33:50 CST 2025 selfserv_9351 with PID 2294424 started at Fri Nov 28 19:33:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294424 at Fri Nov 28 19:33:50 CST 2025 kill -USR1 2294424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294424 killed at Fri Nov 28 19:33:50 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294469 >/dev/null 2>/dev/null selfserv_9351 with PID 2294469 found at Fri Nov 28 19:33:50 CST 2025 selfserv_9351 with PID 2294469 started at Fri Nov 28 19:33:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294469 at Fri Nov 28 19:33:51 CST 2025 kill -USR1 2294469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294469 killed at Fri Nov 28 19:33:51 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294510 >/dev/null 2>/dev/null selfserv_9351 with PID 2294510 found at Fri Nov 28 19:33:51 CST 2025 selfserv_9351 with PID 2294510 started at Fri Nov 28 19:33:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294510 at Fri Nov 28 19:33:51 CST 2025 kill -USR1 2294510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294510 killed at Fri Nov 28 19:33:51 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294551 >/dev/null 2>/dev/null selfserv_9351 with PID 2294551 found at Fri Nov 28 19:33:51 CST 2025 selfserv_9351 with PID 2294551 started at Fri Nov 28 19:33:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294551 at Fri Nov 28 19:33:51 CST 2025 kill -USR1 2294551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294551 killed at Fri Nov 28 19:33:52 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294596 >/dev/null 2>/dev/null selfserv_9351 with PID 2294596 found at Fri Nov 28 19:33:52 CST 2025 selfserv_9351 with PID 2294596 started at Fri Nov 28 19:33:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294596 at Fri Nov 28 19:33:52 CST 2025 kill -USR1 2294596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294596 killed at Fri Nov 28 19:33:52 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294637 >/dev/null 2>/dev/null selfserv_9351 with PID 2294637 found at Fri Nov 28 19:33:52 CST 2025 selfserv_9351 with PID 2294637 started at Fri Nov 28 19:33:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1267: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294637 at Fri Nov 28 19:33:52 CST 2025 kill -USR1 2294637 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294637 killed at Fri Nov 28 19:33:52 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294678 >/dev/null 2>/dev/null selfserv_9351 with PID 2294678 found at Fri Nov 28 19:33:52 CST 2025 selfserv_9351 with PID 2294678 started at Fri Nov 28 19:33:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294678 at Fri Nov 28 19:33:53 CST 2025 kill -USR1 2294678 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294678 killed at Fri Nov 28 19:33:53 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294720 >/dev/null 2>/dev/null selfserv_9351 with PID 2294720 found at Fri Nov 28 19:33:53 CST 2025 selfserv_9351 with PID 2294720 started at Fri Nov 28 19:33:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294720 at Fri Nov 28 19:33:53 CST 2025 kill -USR1 2294720 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294720 killed at Fri Nov 28 19:33:53 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294761 >/dev/null 2>/dev/null selfserv_9351 with PID 2294761 found at Fri Nov 28 19:33:53 CST 2025 selfserv_9351 with PID 2294761 started at Fri Nov 28 19:33:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294761 at Fri Nov 28 19:33:53 CST 2025 kill -USR1 2294761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294761 killed at Fri Nov 28 19:33:53 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294808 >/dev/null 2>/dev/null selfserv_9351 with PID 2294808 found at Fri Nov 28 19:33:53 CST 2025 selfserv_9351 with PID 2294808 started at Fri Nov 28 19:33:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1271: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294808 at Fri Nov 28 19:33:54 CST 2025 kill -USR1 2294808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294808 killed at Fri Nov 28 19:33:54 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294849 >/dev/null 2>/dev/null selfserv_9351 with PID 2294849 found at Fri Nov 28 19:33:54 CST 2025 selfserv_9351 with PID 2294849 started at Fri Nov 28 19:33:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294849 at Fri Nov 28 19:33:54 CST 2025 kill -USR1 2294849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294849 killed at Fri Nov 28 19:33:54 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294890 >/dev/null 2>/dev/null selfserv_9351 with PID 2294890 found at Fri Nov 28 19:33:54 CST 2025 selfserv_9351 with PID 2294890 started at Fri Nov 28 19:33:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2294890 at Fri Nov 28 19:33:55 CST 2025 kill -USR1 2294890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294890 killed at Fri Nov 28 19:33:55 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294937 >/dev/null 2>/dev/null selfserv_9351 with PID 2294937 found at Fri Nov 28 19:33:55 CST 2025 selfserv_9351 with PID 2294937 started at Fri Nov 28 19:33:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294937 at Fri Nov 28 19:33:55 CST 2025 kill -USR1 2294937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294937 killed at Fri Nov 28 19:33:55 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2294978 >/dev/null 2>/dev/null selfserv_9351 with PID 2294978 found at Fri Nov 28 19:33:55 CST 2025 selfserv_9351 with PID 2294978 started at Fri Nov 28 19:33:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2294978 at Fri Nov 28 19:33:55 CST 2025 kill -USR1 2294978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2294978 killed at Fri Nov 28 19:33:55 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295020 >/dev/null 2>/dev/null selfserv_9351 with PID 2295020 found at Fri Nov 28 19:33:56 CST 2025 selfserv_9351 with PID 2295020 started at Fri Nov 28 19:33:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295020 at Fri Nov 28 19:33:56 CST 2025 kill -USR1 2295020 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295020 killed at Fri Nov 28 19:33:56 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295061 >/dev/null 2>/dev/null selfserv_9351 with PID 2295061 found at Fri Nov 28 19:33:56 CST 2025 selfserv_9351 with PID 2295061 started at Fri Nov 28 19:33:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1277: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295061 at Fri Nov 28 19:33:56 CST 2025 kill -USR1 2295061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295061 killed at Fri Nov 28 19:33:56 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295102 >/dev/null 2>/dev/null selfserv_9351 with PID 2295102 found at Fri Nov 28 19:33:57 CST 2025 selfserv_9351 with PID 2295102 started at Fri Nov 28 19:33:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2295102 at Fri Nov 28 19:33:57 CST 2025 kill -USR1 2295102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295102 killed at Fri Nov 28 19:33:57 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:33:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295143 >/dev/null 2>/dev/null selfserv_9351 with PID 2295143 found at Fri Nov 28 19:33:57 CST 2025 selfserv_9351 with PID 2295143 started at Fri Nov 28 19:33:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1279: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2295143 at Fri Nov 28 19:33:57 CST 2025 kill -USR1 2295143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295143 killed at Fri Nov 28 19:33:57 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295184 >/dev/null 2>/dev/null selfserv_9351 with PID 2295184 found at Fri Nov 28 19:33:57 CST 2025 selfserv_9351 with PID 2295184 started at Fri Nov 28 19:33:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295184 at Fri Nov 28 19:33:58 CST 2025 kill -USR1 2295184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295184 killed at Fri Nov 28 19:33:58 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295225 >/dev/null 2>/dev/null selfserv_9351 with PID 2295225 found at Fri Nov 28 19:33:58 CST 2025 selfserv_9351 with PID 2295225 started at Fri Nov 28 19:33:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295225 at Fri Nov 28 19:33:58 CST 2025 kill -USR1 2295225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295225 killed at Fri Nov 28 19:33:58 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295270 >/dev/null 2>/dev/null selfserv_9351 with PID 2295270 found at Fri Nov 28 19:33:58 CST 2025 selfserv_9351 with PID 2295270 started at Fri Nov 28 19:33:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295270 at Fri Nov 28 19:33:59 CST 2025 kill -USR1 2295270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295270 killed at Fri Nov 28 19:33:59 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295323 >/dev/null 2>/dev/null selfserv_9351 with PID 2295323 found at Fri Nov 28 19:33:59 CST 2025 selfserv_9351 with PID 2295323 started at Fri Nov 28 19:33:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295323 at Fri Nov 28 19:33:59 CST 2025 kill -USR1 2295323 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295323 killed at Fri Nov 28 19:33:59 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295364 >/dev/null 2>/dev/null selfserv_9351 with PID 2295364 found at Fri Nov 28 19:33:59 CST 2025 selfserv_9351 with PID 2295364 started at Fri Nov 28 19:33:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1284: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2295364 at Fri Nov 28 19:33:59 CST 2025 kill -USR1 2295364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295364 killed at Fri Nov 28 19:33:59 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:33:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:33:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295411 >/dev/null 2>/dev/null selfserv_9351 with PID 2295411 found at Fri Nov 28 19:33:59 CST 2025 selfserv_9351 with PID 2295411 started at Fri Nov 28 19:33:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295411 at Fri Nov 28 19:34:00 CST 2025 kill -USR1 2295411 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295411 killed at Fri Nov 28 19:34:00 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:00 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295452 >/dev/null 2>/dev/null selfserv_9351 with PID 2295452 found at Fri Nov 28 19:34:00 CST 2025 selfserv_9351 with PID 2295452 started at Fri Nov 28 19:34:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295452 at Fri Nov 28 19:34:00 CST 2025 kill -USR1 2295452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295452 killed at Fri Nov 28 19:34:00 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:00 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295497 >/dev/null 2>/dev/null selfserv_9351 with PID 2295497 found at Fri Nov 28 19:34:00 CST 2025 selfserv_9351 with PID 2295497 started at Fri Nov 28 19:34:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295497 at Fri Nov 28 19:34:01 CST 2025 kill -USR1 2295497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295497 killed at Fri Nov 28 19:34:01 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295538 >/dev/null 2>/dev/null selfserv_9351 with PID 2295538 found at Fri Nov 28 19:34:01 CST 2025 selfserv_9351 with PID 2295538 started at Fri Nov 28 19:34:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295538 at Fri Nov 28 19:34:01 CST 2025 kill -USR1 2295538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295538 killed at Fri Nov 28 19:34:01 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295611 >/dev/null 2>/dev/null selfserv_9351 with PID 2295611 found at Fri Nov 28 19:34:01 CST 2025 selfserv_9351 with PID 2295611 started at Fri Nov 28 19:34:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1289: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2295611 at Fri Nov 28 19:34:01 CST 2025 kill -USR1 2295611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295611 killed at Fri Nov 28 19:34:01 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295672 >/dev/null 2>/dev/null selfserv_9351 with PID 2295672 found at Fri Nov 28 19:34:02 CST 2025 selfserv_9351 with PID 2295672 started at Fri Nov 28 19:34:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295672 at Fri Nov 28 19:34:02 CST 2025 kill -USR1 2295672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295672 killed at Fri Nov 28 19:34:02 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295713 >/dev/null 2>/dev/null selfserv_9351 with PID 2295713 found at Fri Nov 28 19:34:02 CST 2025 selfserv_9351 with PID 2295713 started at Fri Nov 28 19:34:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295713 at Fri Nov 28 19:34:02 CST 2025 kill -USR1 2295713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295713 killed at Fri Nov 28 19:34:02 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295754 >/dev/null 2>/dev/null selfserv_9351 with PID 2295754 found at Fri Nov 28 19:34:02 CST 2025 selfserv_9351 with PID 2295754 started at Fri Nov 28 19:34:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295754 at Fri Nov 28 19:34:03 CST 2025 kill -USR1 2295754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295754 killed at Fri Nov 28 19:34:03 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295797 >/dev/null 2>/dev/null selfserv_9351 with PID 2295797 found at Fri Nov 28 19:34:03 CST 2025 selfserv_9351 with PID 2295797 started at Fri Nov 28 19:34:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1293: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2295797 at Fri Nov 28 19:34:03 CST 2025 kill -USR1 2295797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295797 killed at Fri Nov 28 19:34:03 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295838 >/dev/null 2>/dev/null selfserv_9351 with PID 2295838 found at Fri Nov 28 19:34:03 CST 2025 selfserv_9351 with PID 2295838 started at Fri Nov 28 19:34:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295838 at Fri Nov 28 19:34:04 CST 2025 kill -USR1 2295838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295838 killed at Fri Nov 28 19:34:04 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295884 >/dev/null 2>/dev/null selfserv_9351 with PID 2295884 found at Fri Nov 28 19:34:04 CST 2025 selfserv_9351 with PID 2295884 started at Fri Nov 28 19:34:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295884 at Fri Nov 28 19:34:04 CST 2025 kill -USR1 2295884 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295884 killed at Fri Nov 28 19:34:04 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295925 >/dev/null 2>/dev/null selfserv_9351 with PID 2295925 found at Fri Nov 28 19:34:04 CST 2025 selfserv_9351 with PID 2295925 started at Fri Nov 28 19:34:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2295925 at Fri Nov 28 19:34:04 CST 2025 kill -USR1 2295925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295925 killed at Fri Nov 28 19:34:04 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2295972 >/dev/null 2>/dev/null selfserv_9351 with PID 2295972 found at Fri Nov 28 19:34:04 CST 2025 selfserv_9351 with PID 2295972 started at Fri Nov 28 19:34:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2295972 at Fri Nov 28 19:34:05 CST 2025 kill -USR1 2295972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2295972 killed at Fri Nov 28 19:34:05 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296013 >/dev/null 2>/dev/null selfserv_9351 with PID 2296013 found at Fri Nov 28 19:34:05 CST 2025 selfserv_9351 with PID 2296013 started at Fri Nov 28 19:34:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296013 at Fri Nov 28 19:34:05 CST 2025 kill -USR1 2296013 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296013 killed at Fri Nov 28 19:34:05 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296054 >/dev/null 2>/dev/null selfserv_9351 with PID 2296054 found at Fri Nov 28 19:34:05 CST 2025 selfserv_9351 with PID 2296054 started at Fri Nov 28 19:34:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296054 at Fri Nov 28 19:34:05 CST 2025 kill -USR1 2296054 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296054 killed at Fri Nov 28 19:34:05 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296096 >/dev/null 2>/dev/null selfserv_9351 with PID 2296096 found at Fri Nov 28 19:34:06 CST 2025 selfserv_9351 with PID 2296096 started at Fri Nov 28 19:34:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296096 at Fri Nov 28 19:34:06 CST 2025 kill -USR1 2296096 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296096 killed at Fri Nov 28 19:34:06 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296137 >/dev/null 2>/dev/null selfserv_9351 with PID 2296137 found at Fri Nov 28 19:34:06 CST 2025 selfserv_9351 with PID 2296137 started at Fri Nov 28 19:34:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2296137 at Fri Nov 28 19:34:06 CST 2025 kill -USR1 2296137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296137 killed at Fri Nov 28 19:34:06 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:06 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296178 >/dev/null 2>/dev/null selfserv_9351 with PID 2296178 found at Fri Nov 28 19:34:06 CST 2025 selfserv_9351 with PID 2296178 started at Fri Nov 28 19:34:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296178 at Fri Nov 28 19:34:07 CST 2025 kill -USR1 2296178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296178 killed at Fri Nov 28 19:34:07 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296219 >/dev/null 2>/dev/null selfserv_9351 with PID 2296219 found at Fri Nov 28 19:34:07 CST 2025 selfserv_9351 with PID 2296219 started at Fri Nov 28 19:34:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296219 at Fri Nov 28 19:34:07 CST 2025 kill -USR1 2296219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296219 killed at Fri Nov 28 19:34:07 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296260 >/dev/null 2>/dev/null selfserv_9351 with PID 2296260 found at Fri Nov 28 19:34:07 CST 2025 selfserv_9351 with PID 2296260 started at Fri Nov 28 19:34:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1304: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296260 at Fri Nov 28 19:34:08 CST 2025 kill -USR1 2296260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296260 killed at Fri Nov 28 19:34:08 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:08 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296302 >/dev/null 2>/dev/null selfserv_9351 with PID 2296302 found at Fri Nov 28 19:34:08 CST 2025 selfserv_9351 with PID 2296302 started at Fri Nov 28 19:34:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2296302 at Fri Nov 28 19:34:08 CST 2025 kill -USR1 2296302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296302 killed at Fri Nov 28 19:34:08 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:08 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296343 >/dev/null 2>/dev/null selfserv_9351 with PID 2296343 found at Fri Nov 28 19:34:08 CST 2025 selfserv_9351 with PID 2296343 started at Fri Nov 28 19:34:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296343 at Fri Nov 28 19:34:09 CST 2025 kill -USR1 2296343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296343 killed at Fri Nov 28 19:34:09 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296389 >/dev/null 2>/dev/null selfserv_9351 with PID 2296389 found at Fri Nov 28 19:34:09 CST 2025 selfserv_9351 with PID 2296389 started at Fri Nov 28 19:34:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296389 at Fri Nov 28 19:34:09 CST 2025 kill -USR1 2296389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296389 killed at Fri Nov 28 19:34:09 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296430 >/dev/null 2>/dev/null selfserv_9351 with PID 2296430 found at Fri Nov 28 19:34:09 CST 2025 selfserv_9351 with PID 2296430 started at Fri Nov 28 19:34:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1308: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296430 at Fri Nov 28 19:34:09 CST 2025 kill -USR1 2296430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296430 killed at Fri Nov 28 19:34:09 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:34:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296507 >/dev/null 2>/dev/null selfserv_9351 with PID 2296507 found at Fri Nov 28 19:34:09 CST 2025 selfserv_9351 with PID 2296507 started at Fri Nov 28 19:34:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296507 at Fri Nov 28 19:34:10 CST 2025 kill -USR1 2296507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296507 killed at Fri Nov 28 19:34:10 CST 2025 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296538 >/dev/null 2>/dev/null selfserv_9351 with PID 2296538 found at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 with PID 2296538 started at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296538 at Fri Nov 28 19:34:10 CST 2025 kill -USR1 2296538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296538 killed at Fri Nov 28 19:34:10 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296566 >/dev/null 2>/dev/null selfserv_9351 with PID 2296566 found at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 with PID 2296566 started at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2296566 at Fri Nov 28 19:34:10 CST 2025 kill -USR1 2296566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296566 killed at Fri Nov 28 19:34:10 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296594 >/dev/null 2>/dev/null selfserv_9351 with PID 2296594 found at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 with PID 2296594 started at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296594 at Fri Nov 28 19:34:10 CST 2025 kill -USR1 2296594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296594 killed at Fri Nov 28 19:34:10 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296626 >/dev/null 2>/dev/null selfserv_9351 with PID 2296626 found at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 with PID 2296626 started at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2296626 at Fri Nov 28 19:34:10 CST 2025 kill -USR1 2296626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296626 killed at Fri Nov 28 19:34:10 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:10 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296654 >/dev/null 2>/dev/null selfserv_9351 with PID 2296654 found at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 with PID 2296654 started at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296654 at Fri Nov 28 19:34:11 CST 2025 kill -USR1 2296654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296654 killed at Fri Nov 28 19:34:11 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296682 >/dev/null 2>/dev/null selfserv_9351 with PID 2296682 found at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 with PID 2296682 started at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296682 at Fri Nov 28 19:34:11 CST 2025 kill -USR1 2296682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296682 killed at Fri Nov 28 19:34:11 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296710 >/dev/null 2>/dev/null selfserv_9351 with PID 2296710 found at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 with PID 2296710 started at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296710 at Fri Nov 28 19:34:11 CST 2025 kill -USR1 2296710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296710 killed at Fri Nov 28 19:34:11 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296738 >/dev/null 2>/dev/null selfserv_9351 with PID 2296738 found at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 with PID 2296738 started at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296738 at Fri Nov 28 19:34:11 CST 2025 kill -USR1 2296738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296738 killed at Fri Nov 28 19:34:11 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296771 >/dev/null 2>/dev/null selfserv_9351 with PID 2296771 found at Fri Nov 28 19:34:11 CST 2025 selfserv_9351 with PID 2296771 started at Fri Nov 28 19:34:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296771 at Fri Nov 28 19:34:12 CST 2025 kill -USR1 2296771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296771 killed at Fri Nov 28 19:34:12 CST 2025 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296799 >/dev/null 2>/dev/null selfserv_9351 with PID 2296799 found at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 with PID 2296799 started at Fri Nov 28 19:34:12 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296799 at Fri Nov 28 19:34:12 CST 2025 kill -USR1 2296799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296799 killed at Fri Nov 28 19:34:12 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296828 >/dev/null 2>/dev/null selfserv_9351 with PID 2296828 found at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 with PID 2296828 started at Fri Nov 28 19:34:12 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2296828 at Fri Nov 28 19:34:12 CST 2025 kill -USR1 2296828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296828 killed at Fri Nov 28 19:34:12 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296857 >/dev/null 2>/dev/null selfserv_9351 with PID 2296857 found at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 with PID 2296857 started at Fri Nov 28 19:34:12 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296857 at Fri Nov 28 19:34:12 CST 2025 kill -USR1 2296857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296857 killed at Fri Nov 28 19:34:12 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296886 >/dev/null 2>/dev/null selfserv_9351 with PID 2296886 found at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 with PID 2296886 started at Fri Nov 28 19:34:12 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2296886 at Fri Nov 28 19:34:12 CST 2025 kill -USR1 2296886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296886 killed at Fri Nov 28 19:34:12 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296916 >/dev/null 2>/dev/null selfserv_9351 with PID 2296916 found at Fri Nov 28 19:34:12 CST 2025 selfserv_9351 with PID 2296916 started at Fri Nov 28 19:34:12 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296916 at Fri Nov 28 19:34:13 CST 2025 kill -USR1 2296916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296916 killed at Fri Nov 28 19:34:13 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296945 >/dev/null 2>/dev/null selfserv_9351 with PID 2296945 found at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 with PID 2296945 started at Fri Nov 28 19:34:13 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296945 at Fri Nov 28 19:34:13 CST 2025 kill -USR1 2296945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296945 killed at Fri Nov 28 19:34:13 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2296974 >/dev/null 2>/dev/null selfserv_9351 with PID 2296974 found at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 with PID 2296974 started at Fri Nov 28 19:34:13 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2296974 at Fri Nov 28 19:34:13 CST 2025 kill -USR1 2296974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2296974 killed at Fri Nov 28 19:34:13 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2297003 >/dev/null 2>/dev/null selfserv_9351 with PID 2297003 found at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 with PID 2297003 started at Fri Nov 28 19:34:13 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2297003 at Fri Nov 28 19:34:13 CST 2025 kill -USR1 2297003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2297003 killed at Fri Nov 28 19:34:13 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2297032 >/dev/null 2>/dev/null selfserv_9351 with PID 2297032 found at Fri Nov 28 19:34:13 CST 2025 selfserv_9351 with PID 2297032 started at Fri Nov 28 19:34:13 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1269: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2297032 at Fri Nov 28 19:34:13 CST 2025 kill -USR1 2297032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2297032 killed at Fri Nov 28 19:34:13 CST 2025 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -fips false -force FIPS mode disabled. ssl.sh: #1270: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/server -list ssl.sh: #1271: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1272: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1273: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #1274: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1275: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -fips true -force FIPS mode enabled. ssl.sh: #1276: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1277: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1278: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1279: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1280: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1281: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:34:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2297136 >/dev/null 2>/dev/null selfserv_9351 with PID 2297136 found at Fri Nov 28 19:34:14 CST 2025 selfserv_9351 with PID 2297136 started at Fri Nov 28 19:34:14 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2297136 at Fri Nov 28 19:34:19 CST 2025 kill -USR1 2297136 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2297136 killed at Fri Nov 28 19:34:19 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:34:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2297637 >/dev/null 2>/dev/null selfserv_9351 with PID 2297637 found at Fri Nov 28 19:34:19 CST 2025 selfserv_9351 with PID 2297637 started at Fri Nov 28 19:34:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2297637 at Fri Nov 28 19:34:26 CST 2025 kill -USR1 2297637 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2297637 killed at Fri Nov 28 19:34:26 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:34:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298398 >/dev/null 2>/dev/null selfserv_9351 with PID 2298398 found at Fri Nov 28 19:34:26 CST 2025 selfserv_9351 with PID 2298398 started at Fri Nov 28 19:34:26 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2298398 at Fri Nov 28 19:34:26 CST 2025 kill -USR1 2298398 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298398 killed at Fri Nov 28 19:34:26 CST 2025 ssl.sh: SSL Client Authentication - server normal/client fips =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298464 >/dev/null 2>/dev/null selfserv_9351 with PID 2298464 found at Fri Nov 28 19:34:26 CST 2025 selfserv_9351 with PID 2298464 started at Fri Nov 28 19:34:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1409: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2298464 at Fri Nov 28 19:34:26 CST 2025 kill -USR1 2298464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298464 killed at Fri Nov 28 19:34:26 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298505 >/dev/null 2>/dev/null selfserv_9351 with PID 2298505 found at Fri Nov 28 19:34:26 CST 2025 selfserv_9351 with PID 2298505 started at Fri Nov 28 19:34:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1410: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2298505 at Fri Nov 28 19:34:51 CST 2025 kill -USR1 2298505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298505 killed at Fri Nov 28 19:34:51 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298622 >/dev/null 2>/dev/null selfserv_9351 with PID 2298622 found at Fri Nov 28 19:34:51 CST 2025 selfserv_9351 with PID 2298622 started at Fri Nov 28 19:34:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2298622 at Fri Nov 28 19:34:51 CST 2025 kill -USR1 2298622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298622 killed at Fri Nov 28 19:34:51 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:34:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298675 >/dev/null 2>/dev/null selfserv_9351 with PID 2298675 found at Fri Nov 28 19:34:51 CST 2025 selfserv_9351 with PID 2298675 started at Fri Nov 28 19:34:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1412: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2298675 at Fri Nov 28 19:34:51 CST 2025 kill -USR1 2298675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298675 killed at Fri Nov 28 19:34:51 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:34:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:34:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298716 >/dev/null 2>/dev/null selfserv_9351 with PID 2298716 found at Fri Nov 28 19:34:51 CST 2025 selfserv_9351 with PID 2298716 started at Fri Nov 28 19:34:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1413: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2298716 at Fri Nov 28 19:35:14 CST 2025 kill -USR1 2298716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298716 killed at Fri Nov 28 19:35:14 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:35:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:35:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298910 >/dev/null 2>/dev/null selfserv_9351 with PID 2298910 found at Fri Nov 28 19:35:15 CST 2025 selfserv_9351 with PID 2298910 started at Fri Nov 28 19:35:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1414: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2298910 at Fri Nov 28 19:35:15 CST 2025 kill -USR1 2298910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298910 killed at Fri Nov 28 19:35:15 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:35:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:35:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2298963 >/dev/null 2>/dev/null selfserv_9351 with PID 2298963 found at Fri Nov 28 19:35:15 CST 2025 selfserv_9351 with PID 2298963 started at Fri Nov 28 19:35:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1415: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2298963 at Fri Nov 28 19:35:15 CST 2025 kill -USR1 2298963 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2298963 killed at Fri Nov 28 19:35:15 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:35:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:35:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299004 >/dev/null 2>/dev/null selfserv_9351 with PID 2299004 found at Fri Nov 28 19:35:15 CST 2025 selfserv_9351 with PID 2299004 started at Fri Nov 28 19:35:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1416: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299004 at Fri Nov 28 19:35:39 CST 2025 kill -USR1 2299004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299004 killed at Fri Nov 28 19:35:39 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:35:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:35:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299144 >/dev/null 2>/dev/null selfserv_9351 with PID 2299144 found at Fri Nov 28 19:35:39 CST 2025 selfserv_9351 with PID 2299144 started at Fri Nov 28 19:35:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2299144 at Fri Nov 28 19:35:40 CST 2025 kill -USR1 2299144 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299144 killed at Fri Nov 28 19:35:40 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:35:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:35:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299197 >/dev/null 2>/dev/null selfserv_9351 with PID 2299197 found at Fri Nov 28 19:35:40 CST 2025 selfserv_9351 with PID 2299197 started at Fri Nov 28 19:35:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299197 at Fri Nov 28 19:35:40 CST 2025 kill -USR1 2299197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299197 killed at Fri Nov 28 19:35:40 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:35:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:35:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299238 >/dev/null 2>/dev/null selfserv_9351 with PID 2299238 found at Fri Nov 28 19:35:40 CST 2025 selfserv_9351 with PID 2299238 started at Fri Nov 28 19:35:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299238 at Fri Nov 28 19:36:04 CST 2025 kill -USR1 2299238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299238 killed at Fri Nov 28 19:36:04 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299417 >/dev/null 2>/dev/null selfserv_9351 with PID 2299417 found at Fri Nov 28 19:36:04 CST 2025 selfserv_9351 with PID 2299417 started at Fri Nov 28 19:36:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1420: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2299417 at Fri Nov 28 19:36:04 CST 2025 kill -USR1 2299417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299417 killed at Fri Nov 28 19:36:04 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299476 >/dev/null 2>/dev/null selfserv_9351 with PID 2299476 found at Fri Nov 28 19:36:05 CST 2025 selfserv_9351 with PID 2299476 started at Fri Nov 28 19:36:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299476 at Fri Nov 28 19:36:05 CST 2025 kill -USR1 2299476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299476 killed at Fri Nov 28 19:36:05 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:36:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299517 >/dev/null 2>/dev/null selfserv_9351 with PID 2299517 found at Fri Nov 28 19:36:05 CST 2025 selfserv_9351 with PID 2299517 started at Fri Nov 28 19:36:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299517 at Fri Nov 28 19:36:28 CST 2025 kill -USR1 2299517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299517 killed at Fri Nov 28 19:36:28 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299651 >/dev/null 2>/dev/null selfserv_9351 with PID 2299651 found at Fri Nov 28 19:36:28 CST 2025 selfserv_9351 with PID 2299651 started at Fri Nov 28 19:36:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2299651 at Fri Nov 28 19:36:29 CST 2025 kill -USR1 2299651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299651 killed at Fri Nov 28 19:36:29 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299700 >/dev/null 2>/dev/null selfserv_9351 with PID 2299700 found at Fri Nov 28 19:36:29 CST 2025 selfserv_9351 with PID 2299700 started at Fri Nov 28 19:36:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2299700 at Fri Nov 28 19:36:29 CST 2025 kill -USR1 2299700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299700 killed at Fri Nov 28 19:36:29 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299745 >/dev/null 2>/dev/null selfserv_9351 with PID 2299745 found at Fri Nov 28 19:36:29 CST 2025 selfserv_9351 with PID 2299745 started at Fri Nov 28 19:36:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1425: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299745 at Fri Nov 28 19:36:29 CST 2025 kill -USR1 2299745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299745 killed at Fri Nov 28 19:36:29 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299790 >/dev/null 2>/dev/null selfserv_9351 with PID 2299790 found at Fri Nov 28 19:36:29 CST 2025 selfserv_9351 with PID 2299790 started at Fri Nov 28 19:36:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1426: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2299790 at Fri Nov 28 19:36:29 CST 2025 kill -USR1 2299790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299790 killed at Fri Nov 28 19:36:29 CST 2025 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:36:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299845 >/dev/null 2>/dev/null selfserv_9351 with PID 2299845 found at Fri Nov 28 19:36:30 CST 2025 selfserv_9351 with PID 2299845 started at Fri Nov 28 19:36:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1427: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2299845 at Fri Nov 28 19:36:54 CST 2025 kill -USR1 2299845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299845 killed at Fri Nov 28 19:36:54 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:36:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2299964 >/dev/null 2>/dev/null selfserv_9351 with PID 2299964 found at Fri Nov 28 19:36:54 CST 2025 selfserv_9351 with PID 2299964 started at Fri Nov 28 19:36:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1428: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2299964 at Fri Nov 28 19:36:54 CST 2025 kill -USR1 2299964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2299964 killed at Fri Nov 28 19:36:54 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:36:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:36:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300013 >/dev/null 2>/dev/null selfserv_9351 with PID 2300013 found at Fri Nov 28 19:36:54 CST 2025 selfserv_9351 with PID 2300013 started at Fri Nov 28 19:36:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1429: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2300013 at Fri Nov 28 19:37:17 CST 2025 kill -USR1 2300013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300013 killed at Fri Nov 28 19:37:17 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:37:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:37:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300188 >/dev/null 2>/dev/null selfserv_9351 with PID 2300188 found at Fri Nov 28 19:37:17 CST 2025 selfserv_9351 with PID 2300188 started at Fri Nov 28 19:37:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300188 at Fri Nov 28 19:37:18 CST 2025 kill -USR1 2300188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300188 killed at Fri Nov 28 19:37:18 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:37:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:37:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300238 >/dev/null 2>/dev/null selfserv_9351 with PID 2300238 found at Fri Nov 28 19:37:18 CST 2025 selfserv_9351 with PID 2300238 started at Fri Nov 28 19:37:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2300238 at Fri Nov 28 19:37:42 CST 2025 kill -USR1 2300238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300238 killed at Fri Nov 28 19:37:42 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:37:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:37:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300382 >/dev/null 2>/dev/null selfserv_9351 with PID 2300382 found at Fri Nov 28 19:37:42 CST 2025 selfserv_9351 with PID 2300382 started at Fri Nov 28 19:37:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300382 at Fri Nov 28 19:37:42 CST 2025 kill -USR1 2300382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300382 killed at Fri Nov 28 19:37:42 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:37:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:37:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300431 >/dev/null 2>/dev/null selfserv_9351 with PID 2300431 found at Fri Nov 28 19:37:42 CST 2025 selfserv_9351 with PID 2300431 started at Fri Nov 28 19:37:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2300431 at Fri Nov 28 19:38:06 CST 2025 kill -USR1 2300431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300431 killed at Fri Nov 28 19:38:06 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:38:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300609 >/dev/null 2>/dev/null selfserv_9351 with PID 2300609 found at Fri Nov 28 19:38:06 CST 2025 selfserv_9351 with PID 2300609 started at Fri Nov 28 19:38:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1434: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300609 at Fri Nov 28 19:38:06 CST 2025 kill -USR1 2300609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300609 killed at Fri Nov 28 19:38:06 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:38:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300658 >/dev/null 2>/dev/null selfserv_9351 with PID 2300658 found at Fri Nov 28 19:38:07 CST 2025 selfserv_9351 with PID 2300658 started at Fri Nov 28 19:38:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2300658 at Fri Nov 28 19:38:30 CST 2025 kill -USR1 2300658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300658 killed at Fri Nov 28 19:38:30 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:38:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300799 >/dev/null 2>/dev/null selfserv_9351 with PID 2300799 found at Fri Nov 28 19:38:30 CST 2025 selfserv_9351 with PID 2300799 started at Fri Nov 28 19:38:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300799 at Fri Nov 28 19:38:30 CST 2025 kill -USR1 2300799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300799 killed at Fri Nov 28 19:38:30 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:38:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300840 >/dev/null 2>/dev/null selfserv_9351 with PID 2300840 found at Fri Nov 28 19:38:30 CST 2025 selfserv_9351 with PID 2300840 started at Fri Nov 28 19:38:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300840 at Fri Nov 28 19:38:30 CST 2025 kill -USR1 2300840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300840 killed at Fri Nov 28 19:38:30 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:38:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300885 >/dev/null 2>/dev/null selfserv_9351 with PID 2300885 found at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 with PID 2300885 started at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300885 at Fri Nov 28 19:38:31 CST 2025 kill -USR1 2300885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300885 killed at Fri Nov 28 19:38:31 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300932 >/dev/null 2>/dev/null selfserv_9351 with PID 2300932 found at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 with PID 2300932 started at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300932 at Fri Nov 28 19:38:31 CST 2025 kill -USR1 2300932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300932 killed at Fri Nov 28 19:38:31 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2300979 >/dev/null 2>/dev/null selfserv_9351 with PID 2300979 found at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 with PID 2300979 started at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1440: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2300979 at Fri Nov 28 19:38:31 CST 2025 kill -USR1 2300979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2300979 killed at Fri Nov 28 19:38:31 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301030 >/dev/null 2>/dev/null selfserv_9351 with PID 2301030 found at Fri Nov 28 19:38:31 CST 2025 selfserv_9351 with PID 2301030 started at Fri Nov 28 19:38:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2301030 at Fri Nov 28 19:38:32 CST 2025 kill -USR1 2301030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301030 killed at Fri Nov 28 19:38:32 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301077 >/dev/null 2>/dev/null selfserv_9351 with PID 2301077 found at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 with PID 2301077 started at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1442: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301077 at Fri Nov 28 19:38:32 CST 2025 kill -USR1 2301077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301077 killed at Fri Nov 28 19:38:32 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301124 >/dev/null 2>/dev/null selfserv_9351 with PID 2301124 found at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 with PID 2301124 started at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1443: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2301124 at Fri Nov 28 19:38:32 CST 2025 kill -USR1 2301124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301124 killed at Fri Nov 28 19:38:32 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301171 >/dev/null 2>/dev/null selfserv_9351 with PID 2301171 found at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 with PID 2301171 started at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301171 at Fri Nov 28 19:38:32 CST 2025 kill -USR1 2301171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301171 killed at Fri Nov 28 19:38:32 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301219 >/dev/null 2>/dev/null selfserv_9351 with PID 2301219 found at Fri Nov 28 19:38:32 CST 2025 selfserv_9351 with PID 2301219 started at Fri Nov 28 19:38:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1445: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301219 at Fri Nov 28 19:38:33 CST 2025 kill -USR1 2301219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301219 killed at Fri Nov 28 19:38:33 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301266 >/dev/null 2>/dev/null selfserv_9351 with PID 2301266 found at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 with PID 2301266 started at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1446: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2301266 at Fri Nov 28 19:38:33 CST 2025 kill -USR1 2301266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301266 killed at Fri Nov 28 19:38:33 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301313 >/dev/null 2>/dev/null selfserv_9351 with PID 2301313 found at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 with PID 2301313 started at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1447: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2301313 at Fri Nov 28 19:38:33 CST 2025 kill -USR1 2301313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301313 killed at Fri Nov 28 19:38:33 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301360 >/dev/null 2>/dev/null selfserv_9351 with PID 2301360 found at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 with PID 2301360 started at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1448: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2301360 at Fri Nov 28 19:38:33 CST 2025 kill -USR1 2301360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301360 killed at Fri Nov 28 19:38:33 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301396 >/dev/null 2>/dev/null selfserv_9351 with PID 2301396 found at Fri Nov 28 19:38:33 CST 2025 selfserv_9351 with PID 2301396 started at Fri Nov 28 19:38:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301396 at Fri Nov 28 19:38:34 CST 2025 kill -USR1 2301396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301396 killed at Fri Nov 28 19:38:34 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301427 >/dev/null 2>/dev/null selfserv_9351 with PID 2301427 found at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 with PID 2301427 started at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2301427 at Fri Nov 28 19:38:34 CST 2025 kill -USR1 2301427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301427 killed at Fri Nov 28 19:38:34 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301458 >/dev/null 2>/dev/null selfserv_9351 with PID 2301458 found at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 with PID 2301458 started at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2301458 at Fri Nov 28 19:38:34 CST 2025 kill -USR1 2301458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301458 killed at Fri Nov 28 19:38:34 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301489 >/dev/null 2>/dev/null selfserv_9351 with PID 2301489 found at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 with PID 2301489 started at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2301489 at Fri Nov 28 19:38:34 CST 2025 kill -USR1 2301489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301489 killed at Fri Nov 28 19:38:34 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301526 >/dev/null 2>/dev/null selfserv_9351 with PID 2301526 found at Fri Nov 28 19:38:34 CST 2025 selfserv_9351 with PID 2301526 started at Fri Nov 28 19:38:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2301526 at Fri Nov 28 19:38:35 CST 2025 kill -USR1 2301526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301526 killed at Fri Nov 28 19:38:35 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:38:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301557 >/dev/null 2>/dev/null selfserv_9351 with PID 2301557 found at Fri Nov 28 19:38:35 CST 2025 selfserv_9351 with PID 2301557 started at Fri Nov 28 19:38:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1414: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2301557 at Fri Nov 28 19:38:35 CST 2025 kill -USR1 2301557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301557 killed at Fri Nov 28 19:38:35 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:38:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301588 >/dev/null 2>/dev/null selfserv_9351 with PID 2301588 found at Fri Nov 28 19:38:35 CST 2025 selfserv_9351 with PID 2301588 started at Fri Nov 28 19:38:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1415: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2301588 at Fri Nov 28 19:38:35 CST 2025 kill -USR1 2301588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301588 killed at Fri Nov 28 19:38:35 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:38:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301619 >/dev/null 2>/dev/null selfserv_9351 with PID 2301619 found at Fri Nov 28 19:38:35 CST 2025 selfserv_9351 with PID 2301619 started at Fri Nov 28 19:38:35 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:38:35 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:38:36 CST 2025 ssl.sh: #1416: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2301619 at Fri Nov 28 19:38:36 CST 2025 kill -USR1 2301619 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301619 killed at Fri Nov 28 19:38:36 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:38:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301658 >/dev/null 2>/dev/null selfserv_9351 with PID 2301658 found at Fri Nov 28 19:38:36 CST 2025 selfserv_9351 with PID 2301658 started at Fri Nov 28 19:38:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301658 at Fri Nov 28 19:38:36 CST 2025 kill -USR1 2301658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301658 killed at Fri Nov 28 19:38:36 CST 2025 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301689 >/dev/null 2>/dev/null selfserv_9351 with PID 2301689 found at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 with PID 2301689 started at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301689 at Fri Nov 28 19:38:37 CST 2025 kill -USR1 2301689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301689 killed at Fri Nov 28 19:38:37 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301717 >/dev/null 2>/dev/null selfserv_9351 with PID 2301717 found at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 with PID 2301717 started at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2301717 at Fri Nov 28 19:38:37 CST 2025 kill -USR1 2301717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301717 killed at Fri Nov 28 19:38:37 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301745 >/dev/null 2>/dev/null selfserv_9351 with PID 2301745 found at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 with PID 2301745 started at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301745 at Fri Nov 28 19:38:37 CST 2025 kill -USR1 2301745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301745 killed at Fri Nov 28 19:38:37 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301773 >/dev/null 2>/dev/null selfserv_9351 with PID 2301773 found at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 with PID 2301773 started at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2301773 at Fri Nov 28 19:38:37 CST 2025 kill -USR1 2301773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301773 killed at Fri Nov 28 19:38:37 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301801 >/dev/null 2>/dev/null selfserv_9351 with PID 2301801 found at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 with PID 2301801 started at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301801 at Fri Nov 28 19:38:37 CST 2025 kill -USR1 2301801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301801 killed at Fri Nov 28 19:38:37 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301829 >/dev/null 2>/dev/null selfserv_9351 with PID 2301829 found at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 with PID 2301829 started at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301829 at Fri Nov 28 19:38:38 CST 2025 kill -USR1 2301829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301829 killed at Fri Nov 28 19:38:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301857 >/dev/null 2>/dev/null selfserv_9351 with PID 2301857 found at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 with PID 2301857 started at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301857 at Fri Nov 28 19:38:38 CST 2025 kill -USR1 2301857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301857 killed at Fri Nov 28 19:38:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301885 >/dev/null 2>/dev/null selfserv_9351 with PID 2301885 found at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 with PID 2301885 started at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301885 at Fri Nov 28 19:38:38 CST 2025 kill -USR1 2301885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301885 killed at Fri Nov 28 19:38:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301913 >/dev/null 2>/dev/null selfserv_9351 with PID 2301913 found at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 with PID 2301913 started at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301913 at Fri Nov 28 19:38:38 CST 2025 kill -USR1 2301913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301913 killed at Fri Nov 28 19:38:38 CST 2025 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301941 >/dev/null 2>/dev/null selfserv_9351 with PID 2301941 found at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 with PID 2301941 started at Fri Nov 28 19:38:38 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2301941 at Fri Nov 28 19:38:38 CST 2025 kill -USR1 2301941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301941 killed at Fri Nov 28 19:38:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2301974 >/dev/null 2>/dev/null selfserv_9351 with PID 2301974 found at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 with PID 2301974 started at Fri Nov 28 19:38:39 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2301974 at Fri Nov 28 19:38:39 CST 2025 kill -USR1 2301974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2301974 killed at Fri Nov 28 19:38:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302003 >/dev/null 2>/dev/null selfserv_9351 with PID 2302003 found at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 with PID 2302003 started at Fri Nov 28 19:38:39 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302003 at Fri Nov 28 19:38:39 CST 2025 kill -USR1 2302003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302003 killed at Fri Nov 28 19:38:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302032 >/dev/null 2>/dev/null selfserv_9351 with PID 2302032 found at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 with PID 2302032 started at Fri Nov 28 19:38:39 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2302032 at Fri Nov 28 19:38:39 CST 2025 kill -USR1 2302032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302032 killed at Fri Nov 28 19:38:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302061 >/dev/null 2>/dev/null selfserv_9351 with PID 2302061 found at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 with PID 2302061 started at Fri Nov 28 19:38:39 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302061 at Fri Nov 28 19:38:39 CST 2025 kill -USR1 2302061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302061 killed at Fri Nov 28 19:38:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302090 >/dev/null 2>/dev/null selfserv_9351 with PID 2302090 found at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 with PID 2302090 started at Fri Nov 28 19:38:39 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302090 at Fri Nov 28 19:38:39 CST 2025 kill -USR1 2302090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302090 killed at Fri Nov 28 19:38:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302125 >/dev/null 2>/dev/null selfserv_9351 with PID 2302125 found at Fri Nov 28 19:38:39 CST 2025 selfserv_9351 with PID 2302125 started at Fri Nov 28 19:38:39 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302125 at Fri Nov 28 19:38:40 CST 2025 kill -USR1 2302125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302125 killed at Fri Nov 28 19:38:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302154 >/dev/null 2>/dev/null selfserv_9351 with PID 2302154 found at Fri Nov 28 19:38:40 CST 2025 selfserv_9351 with PID 2302154 started at Fri Nov 28 19:38:40 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302154 at Fri Nov 28 19:38:40 CST 2025 kill -USR1 2302154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302154 killed at Fri Nov 28 19:38:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:38:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2302183 >/dev/null 2>/dev/null selfserv_9351 with PID 2302183 found at Fri Nov 28 19:38:40 CST 2025 selfserv_9351 with PID 2302183 started at Fri Nov 28 19:38:40 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1435: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302183 at Fri Nov 28 19:38:40 CST 2025 kill -USR1 2302183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302183 killed at Fri Nov 28 19:38:40 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:38:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2302212 >/dev/null 2>/dev/null selfserv_9351 with PID 2302212 found at Fri Nov 28 19:38:40 CST 2025 selfserv_9351 with PID 2302212 started at Fri Nov 28 19:38:40 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2302212 at Fri Nov 28 19:38:45 CST 2025 kill -USR1 2302212 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302212 killed at Fri Nov 28 19:38:45 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:38:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2302719 >/dev/null 2>/dev/null selfserv_9351 with PID 2302719 found at Fri Nov 28 19:38:45 CST 2025 selfserv_9351 with PID 2302719 started at Fri Nov 28 19:38:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2302719 at Fri Nov 28 19:38:52 CST 2025 kill -USR1 2302719 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2302719 killed at Fri Nov 28 19:38:52 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:38:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303475 >/dev/null 2>/dev/null selfserv_9351 with PID 2303475 found at Fri Nov 28 19:38:53 CST 2025 selfserv_9351 with PID 2303475 started at Fri Nov 28 19:38:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1563: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2303475 at Fri Nov 28 19:38:53 CST 2025 kill -USR1 2303475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303475 killed at Fri Nov 28 19:38:53 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:38:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:38:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303516 >/dev/null 2>/dev/null selfserv_9351 with PID 2303516 found at Fri Nov 28 19:38:53 CST 2025 selfserv_9351 with PID 2303516 started at Fri Nov 28 19:38:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1564: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2303516 at Fri Nov 28 19:39:19 CST 2025 kill -USR1 2303516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303516 killed at Fri Nov 28 19:39:19 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:39:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:39:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303710 >/dev/null 2>/dev/null selfserv_9351 with PID 2303710 found at Fri Nov 28 19:39:19 CST 2025 selfserv_9351 with PID 2303710 started at Fri Nov 28 19:39:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2303710 at Fri Nov 28 19:39:20 CST 2025 kill -USR1 2303710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303710 killed at Fri Nov 28 19:39:20 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:39:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:39:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303763 >/dev/null 2>/dev/null selfserv_9351 with PID 2303763 found at Fri Nov 28 19:39:20 CST 2025 selfserv_9351 with PID 2303763 started at Fri Nov 28 19:39:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1566: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2303763 at Fri Nov 28 19:39:20 CST 2025 kill -USR1 2303763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303763 killed at Fri Nov 28 19:39:20 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:39:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:39:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303809 >/dev/null 2>/dev/null selfserv_9351 with PID 2303809 found at Fri Nov 28 19:39:20 CST 2025 selfserv_9351 with PID 2303809 started at Fri Nov 28 19:39:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1567: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2303809 at Fri Nov 28 19:39:44 CST 2025 kill -USR1 2303809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303809 killed at Fri Nov 28 19:39:44 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:39:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:39:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303944 >/dev/null 2>/dev/null selfserv_9351 with PID 2303944 found at Fri Nov 28 19:39:44 CST 2025 selfserv_9351 with PID 2303944 started at Fri Nov 28 19:39:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2303944 at Fri Nov 28 19:39:44 CST 2025 kill -USR1 2303944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303944 killed at Fri Nov 28 19:39:44 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:39:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:39:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2303997 >/dev/null 2>/dev/null selfserv_9351 with PID 2303997 found at Fri Nov 28 19:39:44 CST 2025 selfserv_9351 with PID 2303997 started at Fri Nov 28 19:39:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1569: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2303997 at Fri Nov 28 19:39:45 CST 2025 kill -USR1 2303997 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2303997 killed at Fri Nov 28 19:39:45 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:39:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:39:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304044 >/dev/null 2>/dev/null selfserv_9351 with PID 2304044 found at Fri Nov 28 19:39:45 CST 2025 selfserv_9351 with PID 2304044 started at Fri Nov 28 19:39:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1570: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304044 at Fri Nov 28 19:40:11 CST 2025 kill -USR1 2304044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304044 killed at Fri Nov 28 19:40:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:40:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:40:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304238 >/dev/null 2>/dev/null selfserv_9351 with PID 2304238 found at Fri Nov 28 19:40:11 CST 2025 selfserv_9351 with PID 2304238 started at Fri Nov 28 19:40:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2304238 at Fri Nov 28 19:40:11 CST 2025 kill -USR1 2304238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304238 killed at Fri Nov 28 19:40:11 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:40:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:40:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304291 >/dev/null 2>/dev/null selfserv_9351 with PID 2304291 found at Fri Nov 28 19:40:11 CST 2025 selfserv_9351 with PID 2304291 started at Fri Nov 28 19:40:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304291 at Fri Nov 28 19:40:12 CST 2025 kill -USR1 2304291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304291 killed at Fri Nov 28 19:40:12 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:40:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:40:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304336 >/dev/null 2>/dev/null selfserv_9351 with PID 2304336 found at Fri Nov 28 19:40:12 CST 2025 selfserv_9351 with PID 2304336 started at Fri Nov 28 19:40:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304336 at Fri Nov 28 19:40:38 CST 2025 kill -USR1 2304336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304336 killed at Fri Nov 28 19:40:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:40:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:40:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304478 >/dev/null 2>/dev/null selfserv_9351 with PID 2304478 found at Fri Nov 28 19:40:38 CST 2025 selfserv_9351 with PID 2304478 started at Fri Nov 28 19:40:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1574: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2304478 at Fri Nov 28 19:40:38 CST 2025 kill -USR1 2304478 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304478 killed at Fri Nov 28 19:40:38 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:40:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:40:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304535 >/dev/null 2>/dev/null selfserv_9351 with PID 2304535 found at Fri Nov 28 19:40:39 CST 2025 selfserv_9351 with PID 2304535 started at Fri Nov 28 19:40:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304535 at Fri Nov 28 19:40:39 CST 2025 kill -USR1 2304535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304535 killed at Fri Nov 28 19:40:39 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:40:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:40:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304576 >/dev/null 2>/dev/null selfserv_9351 with PID 2304576 found at Fri Nov 28 19:40:39 CST 2025 selfserv_9351 with PID 2304576 started at Fri Nov 28 19:40:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304576 at Fri Nov 28 19:41:02 CST 2025 kill -USR1 2304576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304576 killed at Fri Nov 28 19:41:02 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:41:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304755 >/dev/null 2>/dev/null selfserv_9351 with PID 2304755 found at Fri Nov 28 19:41:02 CST 2025 selfserv_9351 with PID 2304755 started at Fri Nov 28 19:41:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2304755 at Fri Nov 28 19:41:03 CST 2025 kill -USR1 2304755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304755 killed at Fri Nov 28 19:41:03 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:41:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304802 >/dev/null 2>/dev/null selfserv_9351 with PID 2304802 found at Fri Nov 28 19:41:03 CST 2025 selfserv_9351 with PID 2304802 started at Fri Nov 28 19:41:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2304802 at Fri Nov 28 19:41:03 CST 2025 kill -USR1 2304802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304802 killed at Fri Nov 28 19:41:03 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:41:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304847 >/dev/null 2>/dev/null selfserv_9351 with PID 2304847 found at Fri Nov 28 19:41:03 CST 2025 selfserv_9351 with PID 2304847 started at Fri Nov 28 19:41:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1579: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304847 at Fri Nov 28 19:41:04 CST 2025 kill -USR1 2304847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304847 killed at Fri Nov 28 19:41:04 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:41:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304897 >/dev/null 2>/dev/null selfserv_9351 with PID 2304897 found at Fri Nov 28 19:41:04 CST 2025 selfserv_9351 with PID 2304897 started at Fri Nov 28 19:41:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1580: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2304897 at Fri Nov 28 19:41:04 CST 2025 kill -USR1 2304897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304897 killed at Fri Nov 28 19:41:04 CST 2025 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:41:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2304952 >/dev/null 2>/dev/null selfserv_9351 with PID 2304952 found at Fri Nov 28 19:41:04 CST 2025 selfserv_9351 with PID 2304952 started at Fri Nov 28 19:41:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1581: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2304952 at Fri Nov 28 19:41:31 CST 2025 kill -USR1 2304952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2304952 killed at Fri Nov 28 19:41:31 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:41:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305098 >/dev/null 2>/dev/null selfserv_9351 with PID 2305098 found at Fri Nov 28 19:41:31 CST 2025 selfserv_9351 with PID 2305098 started at Fri Nov 28 19:41:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1582: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2305098 at Fri Nov 28 19:41:31 CST 2025 kill -USR1 2305098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305098 killed at Fri Nov 28 19:41:31 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:41:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305147 >/dev/null 2>/dev/null selfserv_9351 with PID 2305147 found at Fri Nov 28 19:41:31 CST 2025 selfserv_9351 with PID 2305147 started at Fri Nov 28 19:41:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1583: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2305147 at Fri Nov 28 19:41:54 CST 2025 kill -USR1 2305147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305147 killed at Fri Nov 28 19:41:54 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:41:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305267 >/dev/null 2>/dev/null selfserv_9351 with PID 2305267 found at Fri Nov 28 19:41:54 CST 2025 selfserv_9351 with PID 2305267 started at Fri Nov 28 19:41:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2305267 at Fri Nov 28 19:41:55 CST 2025 kill -USR1 2305267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305267 killed at Fri Nov 28 19:41:55 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:41:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:41:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305316 >/dev/null 2>/dev/null selfserv_9351 with PID 2305316 found at Fri Nov 28 19:41:55 CST 2025 selfserv_9351 with PID 2305316 started at Fri Nov 28 19:41:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2305316 at Fri Nov 28 19:42:21 CST 2025 kill -USR1 2305316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305316 killed at Fri Nov 28 19:42:21 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:42:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:42:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305501 >/dev/null 2>/dev/null selfserv_9351 with PID 2305501 found at Fri Nov 28 19:42:21 CST 2025 selfserv_9351 with PID 2305501 started at Fri Nov 28 19:42:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1586: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2305501 at Fri Nov 28 19:42:21 CST 2025 kill -USR1 2305501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305501 killed at Fri Nov 28 19:42:21 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:42:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:42:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305557 >/dev/null 2>/dev/null selfserv_9351 with PID 2305557 found at Fri Nov 28 19:42:21 CST 2025 selfserv_9351 with PID 2305557 started at Fri Nov 28 19:42:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2305557 at Fri Nov 28 19:42:48 CST 2025 kill -USR1 2305557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305557 killed at Fri Nov 28 19:42:48 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:42:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:42:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305692 >/dev/null 2>/dev/null selfserv_9351 with PID 2305692 found at Fri Nov 28 19:42:48 CST 2025 selfserv_9351 with PID 2305692 started at Fri Nov 28 19:42:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1588: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2305692 at Fri Nov 28 19:42:48 CST 2025 kill -USR1 2305692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305692 killed at Fri Nov 28 19:42:48 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:42:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:42:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305741 >/dev/null 2>/dev/null selfserv_9351 with PID 2305741 found at Fri Nov 28 19:42:48 CST 2025 selfserv_9351 with PID 2305741 started at Fri Nov 28 19:42:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2305741 at Fri Nov 28 19:43:11 CST 2025 kill -USR1 2305741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305741 killed at Fri Nov 28 19:43:11 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:43:11 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305922 >/dev/null 2>/dev/null selfserv_9351 with PID 2305922 found at Fri Nov 28 19:43:11 CST 2025 selfserv_9351 with PID 2305922 started at Fri Nov 28 19:43:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2305922 at Fri Nov 28 19:43:12 CST 2025 kill -USR1 2305922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305922 killed at Fri Nov 28 19:43:12 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:43:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2305967 >/dev/null 2>/dev/null selfserv_9351 with PID 2305967 found at Fri Nov 28 19:43:12 CST 2025 selfserv_9351 with PID 2305967 started at Fri Nov 28 19:43:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2305967 at Fri Nov 28 19:43:12 CST 2025 kill -USR1 2305967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2305967 killed at Fri Nov 28 19:43:12 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:43:12 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306009 >/dev/null 2>/dev/null selfserv_9351 with PID 2306009 found at Fri Nov 28 19:43:12 CST 2025 selfserv_9351 with PID 2306009 started at Fri Nov 28 19:43:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1592: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306009 at Fri Nov 28 19:43:13 CST 2025 kill -USR1 2306009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306009 killed at Fri Nov 28 19:43:13 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:43:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306080 >/dev/null 2>/dev/null selfserv_9351 with PID 2306080 found at Fri Nov 28 19:43:13 CST 2025 selfserv_9351 with PID 2306080 started at Fri Nov 28 19:43:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306080 at Fri Nov 28 19:43:13 CST 2025 kill -USR1 2306080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306080 killed at Fri Nov 28 19:43:13 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306111 >/dev/null 2>/dev/null selfserv_9351 with PID 2306111 found at Fri Nov 28 19:43:13 CST 2025 selfserv_9351 with PID 2306111 started at Fri Nov 28 19:43:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306111 at Fri Nov 28 19:43:13 CST 2025 kill -USR1 2306111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306111 killed at Fri Nov 28 19:43:13 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:13 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306144 >/dev/null 2>/dev/null selfserv_9351 with PID 2306144 found at Fri Nov 28 19:43:13 CST 2025 selfserv_9351 with PID 2306144 started at Fri Nov 28 19:43:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2306144 at Fri Nov 28 19:43:14 CST 2025 kill -USR1 2306144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306144 killed at Fri Nov 28 19:43:14 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306172 >/dev/null 2>/dev/null selfserv_9351 with PID 2306172 found at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 with PID 2306172 started at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306172 at Fri Nov 28 19:43:14 CST 2025 kill -USR1 2306172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306172 killed at Fri Nov 28 19:43:14 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306200 >/dev/null 2>/dev/null selfserv_9351 with PID 2306200 found at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 with PID 2306200 started at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2306200 at Fri Nov 28 19:43:14 CST 2025 kill -USR1 2306200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306200 killed at Fri Nov 28 19:43:14 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306228 >/dev/null 2>/dev/null selfserv_9351 with PID 2306228 found at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 with PID 2306228 started at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306228 at Fri Nov 28 19:43:14 CST 2025 kill -USR1 2306228 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306228 killed at Fri Nov 28 19:43:14 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306256 >/dev/null 2>/dev/null selfserv_9351 with PID 2306256 found at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 with PID 2306256 started at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306256 at Fri Nov 28 19:43:14 CST 2025 kill -USR1 2306256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306256 killed at Fri Nov 28 19:43:14 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:14 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306290 >/dev/null 2>/dev/null selfserv_9351 with PID 2306290 found at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 with PID 2306290 started at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306290 at Fri Nov 28 19:43:15 CST 2025 kill -USR1 2306290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306290 killed at Fri Nov 28 19:43:15 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306318 >/dev/null 2>/dev/null selfserv_9351 with PID 2306318 found at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 with PID 2306318 started at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306318 at Fri Nov 28 19:43:15 CST 2025 kill -USR1 2306318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306318 killed at Fri Nov 28 19:43:15 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306346 >/dev/null 2>/dev/null selfserv_9351 with PID 2306346 found at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 with PID 2306346 started at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306346 at Fri Nov 28 19:43:15 CST 2025 kill -USR1 2306346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306346 killed at Fri Nov 28 19:43:15 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306374 >/dev/null 2>/dev/null selfserv_9351 with PID 2306374 found at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 with PID 2306374 started at Fri Nov 28 19:43:15 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306374 at Fri Nov 28 19:43:15 CST 2025 kill -USR1 2306374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306374 killed at Fri Nov 28 19:43:15 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306405 >/dev/null 2>/dev/null selfserv_9351 with PID 2306405 found at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 with PID 2306405 started at Fri Nov 28 19:43:15 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2306405 at Fri Nov 28 19:43:15 CST 2025 kill -USR1 2306405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306405 killed at Fri Nov 28 19:43:15 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306434 >/dev/null 2>/dev/null selfserv_9351 with PID 2306434 found at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 with PID 2306434 started at Fri Nov 28 19:43:16 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306434 at Fri Nov 28 19:43:16 CST 2025 kill -USR1 2306434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306434 killed at Fri Nov 28 19:43:16 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306463 >/dev/null 2>/dev/null selfserv_9351 with PID 2306463 found at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 with PID 2306463 started at Fri Nov 28 19:43:16 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2306463 at Fri Nov 28 19:43:16 CST 2025 kill -USR1 2306463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306463 killed at Fri Nov 28 19:43:16 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306492 >/dev/null 2>/dev/null selfserv_9351 with PID 2306492 found at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 with PID 2306492 started at Fri Nov 28 19:43:16 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306492 at Fri Nov 28 19:43:16 CST 2025 kill -USR1 2306492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306492 killed at Fri Nov 28 19:43:16 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306521 >/dev/null 2>/dev/null selfserv_9351 with PID 2306521 found at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 with PID 2306521 started at Fri Nov 28 19:43:16 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306521 at Fri Nov 28 19:43:16 CST 2025 kill -USR1 2306521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306521 killed at Fri Nov 28 19:43:16 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306551 >/dev/null 2>/dev/null selfserv_9351 with PID 2306551 found at Fri Nov 28 19:43:16 CST 2025 selfserv_9351 with PID 2306551 started at Fri Nov 28 19:43:16 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306551 at Fri Nov 28 19:43:17 CST 2025 kill -USR1 2306551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306551 killed at Fri Nov 28 19:43:17 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306580 >/dev/null 2>/dev/null selfserv_9351 with PID 2306580 found at Fri Nov 28 19:43:17 CST 2025 selfserv_9351 with PID 2306580 started at Fri Nov 28 19:43:17 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306580 at Fri Nov 28 19:43:17 CST 2025 kill -USR1 2306580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306580 killed at Fri Nov 28 19:43:17 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:43:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:43:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2306609 >/dev/null 2>/dev/null selfserv_9351 with PID 2306609 found at Fri Nov 28 19:43:17 CST 2025 selfserv_9351 with PID 2306609 started at Fri Nov 28 19:43:17 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1581: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2306609 at Fri Nov 28 19:43:17 CST 2025 kill -USR1 2306609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2306609 killed at Fri Nov 28 19:43:17 CST 2025 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -fips false -force FIPS mode disabled. ssl.sh: #1582: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1583: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1584: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1585: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1586: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1587: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Fri Nov 28 19:43:17 CST 2025 Running tests for ocsp TIMESTAMP ocsp BEGIN: Fri Nov 28 19:43:17 CST 2025 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Fri Nov 28 19:43:17 CST 2025 Running tests for pkits TIMESTAMP pkits BEGIN: Fri Nov 28 19:43:17 CST 2025 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Fri Nov 28 19:43:17 CST 2025 Running tests for chains TIMESTAMP chains BEGIN: Fri Nov 28 19:43:17 CST 2025 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194318 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9361/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9362 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20251128114329Z nextupdate=20261128114329Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Nov 28 11:43:29 2025 Next Update: Sat Nov 28 11:43:29 2026 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20251128114330Z addcert 2 20251128114330Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Fri Nov 28 11:43:30 2025 Next Update: Sat Nov 28 11:43:29 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:30 2025 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114330Z nextupdate=20261128114330Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:43:30 2025 Next Update: Sat Nov 28 11:43:30 2026 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114331Z addcert 2 20251128114331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:43:31 2025 Next Update: Sat Nov 28 11:43:30 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:31 2025 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114332Z addcert 4 20251128114332Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:43:32 2025 Next Update: Sat Nov 28 11:43:30 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:31 2025 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:43:32 2025 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20251128114332Z nextupdate=20261128114332Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Nov 28 11:43:32 2025 Next Update: Sat Nov 28 11:43:32 2026 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20251128114333Z addcert 2 20251128114333Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Nov 28 11:43:33 2025 Next Update: Sat Nov 28 11:43:32 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:33 2025 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20251128114334Z addcert 3 20251128114334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Fri Nov 28 11:43:34 2025 Next Update: Sat Nov 28 11:43:32 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:33 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:43:34 2025 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20251128114334Z nextupdate=20261128114334Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Nov 28 11:43:34 2025 Next Update: Sat Nov 28 11:43:34 2026 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20251128114335Z addcert 2 20251128114335Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Nov 28 11:43:35 2025 Next Update: Sat Nov 28 11:43:34 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:35 2025 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20251128114336Z addcert 3 20251128114336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Fri Nov 28 11:43:36 2025 Next Update: Sat Nov 28 11:43:34 2026 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Fri Nov 28 11:43:35 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:43:36 2025 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194319 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194320 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1128194321 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1128194322 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1128194323 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1128194324 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1128194325 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1128194326 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1128194327 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1128194328 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1128194329 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1128194330 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1128194331 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1128194332 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1128194333 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1128194334 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Fri Nov 28 19:43:53 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:43:53 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2308736 >/dev/null 2>/dev/null httpserv with PID 2308736 found at Fri Nov 28 19:43:53 CST 2025 httpserv with PID 2308736 started at Fri Nov 28 19:43:53 CST 2025 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194319 (0x433ee10f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:43:41 2025 Not After : Thu Nov 28 11:43:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f5:8e:f0:b3:af:d1:9d:77:78:81:77:2d:c4:c3:c9: 4d:ee:52:bd:ec:7e:72:c3:87:9b:05:0e:45:76:3e:9b: 42:67:41:71:42:fe:84:b3:08:f6:b5:c7:84:5c:be:4f: 47:d2:aa:27:a5:18:bc:fd:88:b9:7a:d6:c4:bb:bb:8e: 95:97:e3:1e:89:b0:40:f8:46:db:f8:bb:5e:6d:01:ea: b8:62:3a:76:63:45:21:18:cb:70:27:87:0e:89:9a:be: f1:9a:8c:87:0e:04:93:c1:d0:ee:dc:bd:b5:92:9d:ef: 20:24:21:5a:43:de:a1:6e:ae:27:cc:ad:6c:fa:e4:74: f7:dc:4e:36:16:44:cf:55:c2:67:58:ca:25:cd:6f:21: 7a:b0:a5:75:a7:57:62:4e:9d:d1:1c:33:a4:1d:ea:5d: be:64:c2:38:0f:2f:a1:d4:66:9b:59:d1:f1:20:e8:d1: 40:ad:81:1e:c7:ad:36:02:74:f5:11:1c:b0:25:90:50: e2:11:c7:47:19:41:8c:e4:38:0e:51:7f:76:e9:56:0d: 4f:aa:ad:e4:91:62:cb:19:82:5d:f4:be:2c:3b:96:22: 53:1a:8e:cd:05:e8:47:c0:8e:a7:cc:01:9a:e5:0b:d2: ea:3a:cc:38:6a:8c:05:b8:ed:fc:5f:56:3b:7c:3f:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:06:95:6a:d8:cc:34:38:28:3b:2b:75:42:90:9c:da: ee:93:75:64:b2:12:a5:99:94:3d:f8:50:58:b4:82:f0: 0b:30:1b:35:54:fe:9c:40:43:b0:82:5d:37:b5:75:61: 1c:67:30:34:5d:8d:03:05:0f:68:1f:08:37:82:1d:4c: 98:85:2a:4c:2d:d0:7f:af:4b:c4:0e:a0:0c:ad:90:60: 57:5c:49:75:70:ab:d3:9c:f2:1c:27:e8:c6:cd:98:d1: 37:e4:8a:80:e4:3b:58:4f:6d:5f:68:c3:2a:99:b8:e3: d9:a4:b3:6d:fc:02:c7:65:28:1e:46:cc:d5:53:90:8a: d9:50:55:ec:fe:4b:d1:de:11:2f:ce:ae:94:b0:06:6a: f3:fd:63:32:c6:e6:13:13:c7:18:cb:cb:0b:44:16:82: 65:9e:f1:16:37:ce:5d:65:99:91:20:64:ef:22:5c:46: 1d:0f:59:a2:9b:ab:ec:8d:11:6f:b2:9b:21:7a:7a:26: df:f4:69:c6:02:83:e7:dc:32:2d:51:78:f6:ee:d6:2b: 2d:57:81:32:9d:01:ce:c8:07:3b:a6:a7:97:1d:c6:cb: 0e:b7:ec:10:c6:f5:41:e3:6d:9a:53:69:28:84:d3:75: 14:ad:b7:f1:5d:74:3f:0d:35:6f:98:ab:60:e4:c5:00 Fingerprint (SHA-256): D2:FC:C6:D9:9B:82:B6:53:71:FF:8A:01:98:2B:E4:A9:71:EA:3C:38:D5:50:30:BA:F2:C3:A7:4A:74:CC:19:9C Fingerprint (SHA1): 84:9B:CE:B0:ED:D5:74:84:78:A9:15:A5:66:F9:43:A5:DD:C1:73:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 2308736 at Fri Nov 28 19:43:54 CST 2025 kill -USR1 2308736 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2308736 killed at Fri Nov 28 19:43:54 CST 2025 httpserv starting at Fri Nov 28 19:43:54 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:43:54 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2308919 >/dev/null 2>/dev/null httpserv with PID 2308919 found at Fri Nov 28 19:43:54 CST 2025 httpserv with PID 2308919 started at Fri Nov 28 19:43:54 CST 2025 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 2308919 at Fri Nov 28 19:43:55 CST 2025 kill -USR1 2308919 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2308919 killed at Fri Nov 28 19:43:55 CST 2025 httpserv starting at Fri Nov 28 19:43:55 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:43:55 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2309126 >/dev/null 2>/dev/null httpserv with PID 2309126 found at Fri Nov 28 19:43:55 CST 2025 httpserv with PID 2309126 started at Fri Nov 28 19:43:55 CST 2025 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194335 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194336 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194337 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194338 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128194339 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194336 (0x433ee120) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:43:56 2025 Not After : Thu Nov 28 11:43:56 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:d9:92:90:1f:20:13:e0:0b:fa:88:a9:70:8f:b0:5f: 4f:8f:b6:f5:a8:cc:cd:e2:4c:79:c0:4d:c6:b2:b3:1b: ed:7b:36:55:9e:87:8d:9f:76:fc:5e:65:15:4f:0d:73: c6:0b:bb:07:d3:b8:a3:00:44:e2:78:41:16:df:31:f2: 84:71:88:2d:4a:f3:0d:f5:0b:09:32:4b:83:6d:48:50: 4f:9a:6f:79:e8:e4:4e:68:7f:8d:f3:c7:38:ef:c6:a1: ed:73:40:3d:b9:c8:a6:fb:aa:d9:19:61:c0:9b:ba:53: 03:6a:cd:ed:44:97:b3:08:26:1a:73:4b:9a:f0:fb:12: 0b:30:db:46:6e:e6:32:8d:d0:0a:00:b7:07:d4:b4:6d: 49:31:54:ee:b8:93:47:47:ee:e7:c5:ba:d7:4b:18:06: df:20:83:c7:23:dd:a0:53:21:53:e4:a4:c5:d7:a0:49: 70:f3:85:28:fe:9a:dd:5c:9c:70:2e:f3:45:46:df:11: 28:4b:85:74:5d:03:d9:5e:b5:fc:40:14:6a:b2:fb:48: 16:ef:48:6d:f1:aa:46:8e:87:05:4f:41:b8:76:9b:66: 7f:e4:28:22:fe:66:0c:76:fc:a3:ed:30:36:4a:eb:3c: 99:c0:81:92:a4:fd:4b:00:46:69:67:b3:2e:55:87:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:c5:2c:86:be:ca:97:88:5f:20:17:31:20:16:b9:a0: 10:f0:41:2e:3b:96:60:49:d8:ab:de:be:ca:9b:a3:a1: f3:97:cb:46:d4:61:8d:c8:74:15:27:50:3c:c3:43:b9: 2f:98:fe:cf:dd:b0:28:57:72:02:61:2e:75:69:cf:15: 49:bb:2f:72:82:7d:db:dc:1a:60:4f:0d:b3:12:e4:c2: a6:a5:37:11:33:a2:a0:b6:88:0b:11:8e:eb:41:1d:0a: da:3d:d9:be:f9:35:97:f2:35:0c:e7:c9:77:c2:a5:14: 24:56:8b:95:5c:88:d6:e6:10:24:2f:8f:b4:30:e8:94: e2:a3:8b:34:a5:1b:eb:f7:51:67:a7:33:c7:33:90:28: 72:71:62:4c:6c:fb:8d:b4:86:9c:54:16:b9:d6:32:a3: 0a:7d:3a:fb:c6:01:aa:e7:d3:cf:7f:f0:b4:7c:e8:38: c0:62:1b:e9:b6:8a:cc:e7:ef:dc:78:ba:e0:32:ca:44: e8:ee:70:7c:1a:b0:bc:e6:9d:fd:f2:c0:1b:83:ae:bd: d1:7c:16:73:ba:0e:af:2d:43:09:04:da:c8:1d:69:eb: 32:5b:28:f2:4c:02:18:39:0c:41:a4:0f:cf:86:88:b7: ad:49:dd:eb:dc:d6:ca:e1:4a:8b:4b:6c:2f:0f:58:74 Fingerprint (SHA-256): 36:A3:E6:BC:1A:1F:97:98:DB:F1:3E:37:7F:29:C7:E4:D2:C2:C4:77:09:DE:FE:45:B0:49:F3:FB:76:C7:5F:B8 Fingerprint (SHA1): C4:31:9D:C0:3F:95:68:2C:A4:6F:C5:B1:ED:9E:DA:CF:92:AB:3F:B7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194335 (0x433ee11f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:43:55 2025 Not After : Thu Nov 28 11:43:55 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:dd:7f:87:e4:be:b1:99:5a:f6:1d:9c:a2:60:10:6a: 52:37:f9:85:c0:34:7d:f4:4d:07:e6:2e:3b:0b:5d:34: 82:a2:92:9f:6a:95:46:c2:d9:46:83:9d:f4:b5:0a:d5: 75:8e:47:7f:33:4c:6e:51:4c:33:d9:df:c1:10:9c:b2: f8:1c:a4:17:38:14:9d:bd:0b:0b:65:f2:9b:f9:13:ba: 85:41:bd:bc:88:05:77:55:10:75:f8:65:89:b8:c7:a7: 2f:13:35:d9:4b:1a:fe:4f:a9:dc:b2:64:bc:be:f4:67: ba:1c:f2:44:fa:5d:ea:76:d6:71:fd:f3:ce:b7:df:fe: c3:a3:54:ae:df:08:5d:1f:8e:70:80:2c:d5:06:4e:69: 6a:3b:43:1c:11:9b:17:00:96:36:7b:cf:de:a1:93:ff: c7:4b:4f:2c:ab:27:bb:f5:b2:f7:72:71:3e:f4:3d:0a: ba:50:12:34:0a:84:e2:0e:78:7c:01:f8:3c:69:36:f5: 1f:47:51:2f:63:28:4c:b7:3c:7f:12:e8:80:54:72:6b: ec:1d:30:b0:f0:b3:23:19:bc:62:44:15:b6:03:e2:e9: ca:c2:0a:1e:61:b6:26:03:43:00:fe:d2:6f:da:87:45: 3b:91:f8:33:b3:dc:6a:ff:9f:a6:29:f2:65:d0:84:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:40:ff:97:a2:71:4d:e7:d4:9a:9f:0e:39:28:5c:ff: e7:06:3d:c9:0b:48:e1:13:ad:59:33:b2:b1:85:21:00: 78:ca:14:7e:06:78:31:4b:26:ed:d3:44:9b:26:12:0a: a9:2f:51:9d:a7:c9:fa:eb:90:6c:ad:6a:70:2d:96:e2: c2:c6:bc:bf:63:c7:b9:2b:fb:28:d8:4a:99:a6:b5:3a: d9:d3:49:c7:0c:5b:36:50:03:83:22:d0:b2:2a:1f:08: 9e:dc:cf:3f:4e:ac:7d:e6:73:07:d4:cb:11:6f:6b:53: c3:f8:ec:28:37:85:03:7b:83:e5:b2:ec:75:b5:44:e0: 7b:67:11:ad:8b:a8:9e:67:be:fa:a7:5b:fa:9d:6d:55: e8:f2:9a:38:d0:28:1d:e3:0c:e5:d2:0e:82:ae:95:5d: 79:25:46:09:9d:b6:42:b8:6f:7c:d7:a4:c6:17:59:f6: 0d:85:1e:9b:f6:c7:18:48:6d:8e:33:f3:9a:2a:77:04: 49:de:77:31:ed:38:ad:94:a4:ad:d3:ba:99:0a:3c:44: b6:ba:82:6a:a5:05:c3:5b:62:f6:c2:ff:d7:f3:1e:50: 55:45:b0:43:4b:d0:d6:75:d9:b5:1d:b2:d7:aa:ba:e3: 53:fa:c0:a3:e4:87:8f:73:6f:f8:67:ad:b7:c5:34:b0 Fingerprint (SHA-256): 29:FF:50:61:D2:4E:68:E1:19:FC:8E:8C:33:C0:99:02:9E:B8:83:BB:9E:2D:BD:E3:1E:90:6A:7F:2F:58:49:F3 Fingerprint (SHA1): D3:4F:12:A3:32:41:5C:E5:6F:8D:13:0D:8D:AC:FE:80:7E:16:62:35 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194335 (0x433ee11f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:43:55 2025 Not After : Thu Nov 28 11:43:55 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:dd:7f:87:e4:be:b1:99:5a:f6:1d:9c:a2:60:10:6a: 52:37:f9:85:c0:34:7d:f4:4d:07:e6:2e:3b:0b:5d:34: 82:a2:92:9f:6a:95:46:c2:d9:46:83:9d:f4:b5:0a:d5: 75:8e:47:7f:33:4c:6e:51:4c:33:d9:df:c1:10:9c:b2: f8:1c:a4:17:38:14:9d:bd:0b:0b:65:f2:9b:f9:13:ba: 85:41:bd:bc:88:05:77:55:10:75:f8:65:89:b8:c7:a7: 2f:13:35:d9:4b:1a:fe:4f:a9:dc:b2:64:bc:be:f4:67: ba:1c:f2:44:fa:5d:ea:76:d6:71:fd:f3:ce:b7:df:fe: c3:a3:54:ae:df:08:5d:1f:8e:70:80:2c:d5:06:4e:69: 6a:3b:43:1c:11:9b:17:00:96:36:7b:cf:de:a1:93:ff: c7:4b:4f:2c:ab:27:bb:f5:b2:f7:72:71:3e:f4:3d:0a: ba:50:12:34:0a:84:e2:0e:78:7c:01:f8:3c:69:36:f5: 1f:47:51:2f:63:28:4c:b7:3c:7f:12:e8:80:54:72:6b: ec:1d:30:b0:f0:b3:23:19:bc:62:44:15:b6:03:e2:e9: ca:c2:0a:1e:61:b6:26:03:43:00:fe:d2:6f:da:87:45: 3b:91:f8:33:b3:dc:6a:ff:9f:a6:29:f2:65:d0:84:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:40:ff:97:a2:71:4d:e7:d4:9a:9f:0e:39:28:5c:ff: e7:06:3d:c9:0b:48:e1:13:ad:59:33:b2:b1:85:21:00: 78:ca:14:7e:06:78:31:4b:26:ed:d3:44:9b:26:12:0a: a9:2f:51:9d:a7:c9:fa:eb:90:6c:ad:6a:70:2d:96:e2: c2:c6:bc:bf:63:c7:b9:2b:fb:28:d8:4a:99:a6:b5:3a: d9:d3:49:c7:0c:5b:36:50:03:83:22:d0:b2:2a:1f:08: 9e:dc:cf:3f:4e:ac:7d:e6:73:07:d4:cb:11:6f:6b:53: c3:f8:ec:28:37:85:03:7b:83:e5:b2:ec:75:b5:44:e0: 7b:67:11:ad:8b:a8:9e:67:be:fa:a7:5b:fa:9d:6d:55: e8:f2:9a:38:d0:28:1d:e3:0c:e5:d2:0e:82:ae:95:5d: 79:25:46:09:9d:b6:42:b8:6f:7c:d7:a4:c6:17:59:f6: 0d:85:1e:9b:f6:c7:18:48:6d:8e:33:f3:9a:2a:77:04: 49:de:77:31:ed:38:ad:94:a4:ad:d3:ba:99:0a:3c:44: b6:ba:82:6a:a5:05:c3:5b:62:f6:c2:ff:d7:f3:1e:50: 55:45:b0:43:4b:d0:d6:75:d9:b5:1d:b2:d7:aa:ba:e3: 53:fa:c0:a3:e4:87:8f:73:6f:f8:67:ad:b7:c5:34:b0 Fingerprint (SHA-256): 29:FF:50:61:D2:4E:68:E1:19:FC:8E:8C:33:C0:99:02:9E:B8:83:BB:9E:2D:BD:E3:1E:90:6A:7F:2F:58:49:F3 Fingerprint (SHA1): D3:4F:12:A3:32:41:5C:E5:6F:8D:13:0D:8D:AC:FE:80:7E:16:62:35 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194336 (0x433ee120) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:43:56 2025 Not After : Thu Nov 28 11:43:56 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:d9:92:90:1f:20:13:e0:0b:fa:88:a9:70:8f:b0:5f: 4f:8f:b6:f5:a8:cc:cd:e2:4c:79:c0:4d:c6:b2:b3:1b: ed:7b:36:55:9e:87:8d:9f:76:fc:5e:65:15:4f:0d:73: c6:0b:bb:07:d3:b8:a3:00:44:e2:78:41:16:df:31:f2: 84:71:88:2d:4a:f3:0d:f5:0b:09:32:4b:83:6d:48:50: 4f:9a:6f:79:e8:e4:4e:68:7f:8d:f3:c7:38:ef:c6:a1: ed:73:40:3d:b9:c8:a6:fb:aa:d9:19:61:c0:9b:ba:53: 03:6a:cd:ed:44:97:b3:08:26:1a:73:4b:9a:f0:fb:12: 0b:30:db:46:6e:e6:32:8d:d0:0a:00:b7:07:d4:b4:6d: 49:31:54:ee:b8:93:47:47:ee:e7:c5:ba:d7:4b:18:06: df:20:83:c7:23:dd:a0:53:21:53:e4:a4:c5:d7:a0:49: 70:f3:85:28:fe:9a:dd:5c:9c:70:2e:f3:45:46:df:11: 28:4b:85:74:5d:03:d9:5e:b5:fc:40:14:6a:b2:fb:48: 16:ef:48:6d:f1:aa:46:8e:87:05:4f:41:b8:76:9b:66: 7f:e4:28:22:fe:66:0c:76:fc:a3:ed:30:36:4a:eb:3c: 99:c0:81:92:a4:fd:4b:00:46:69:67:b3:2e:55:87:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:c5:2c:86:be:ca:97:88:5f:20:17:31:20:16:b9:a0: 10:f0:41:2e:3b:96:60:49:d8:ab:de:be:ca:9b:a3:a1: f3:97:cb:46:d4:61:8d:c8:74:15:27:50:3c:c3:43:b9: 2f:98:fe:cf:dd:b0:28:57:72:02:61:2e:75:69:cf:15: 49:bb:2f:72:82:7d:db:dc:1a:60:4f:0d:b3:12:e4:c2: a6:a5:37:11:33:a2:a0:b6:88:0b:11:8e:eb:41:1d:0a: da:3d:d9:be:f9:35:97:f2:35:0c:e7:c9:77:c2:a5:14: 24:56:8b:95:5c:88:d6:e6:10:24:2f:8f:b4:30:e8:94: e2:a3:8b:34:a5:1b:eb:f7:51:67:a7:33:c7:33:90:28: 72:71:62:4c:6c:fb:8d:b4:86:9c:54:16:b9:d6:32:a3: 0a:7d:3a:fb:c6:01:aa:e7:d3:cf:7f:f0:b4:7c:e8:38: c0:62:1b:e9:b6:8a:cc:e7:ef:dc:78:ba:e0:32:ca:44: e8:ee:70:7c:1a:b0:bc:e6:9d:fd:f2:c0:1b:83:ae:bd: d1:7c:16:73:ba:0e:af:2d:43:09:04:da:c8:1d:69:eb: 32:5b:28:f2:4c:02:18:39:0c:41:a4:0f:cf:86:88:b7: ad:49:dd:eb:dc:d6:ca:e1:4a:8b:4b:6c:2f:0f:58:74 Fingerprint (SHA-256): 36:A3:E6:BC:1A:1F:97:98:DB:F1:3E:37:7F:29:C7:E4:D2:C2:C4:77:09:DE:FE:45:B0:49:F3:FB:76:C7:5F:B8 Fingerprint (SHA1): C4:31:9D:C0:3F:95:68:2C:A4:6F:C5:B1:ED:9E:DA:CF:92:AB:3F:B7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194336 (0x433ee120) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:43:56 2025 Not After : Thu Nov 28 11:43:56 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:d9:92:90:1f:20:13:e0:0b:fa:88:a9:70:8f:b0:5f: 4f:8f:b6:f5:a8:cc:cd:e2:4c:79:c0:4d:c6:b2:b3:1b: ed:7b:36:55:9e:87:8d:9f:76:fc:5e:65:15:4f:0d:73: c6:0b:bb:07:d3:b8:a3:00:44:e2:78:41:16:df:31:f2: 84:71:88:2d:4a:f3:0d:f5:0b:09:32:4b:83:6d:48:50: 4f:9a:6f:79:e8:e4:4e:68:7f:8d:f3:c7:38:ef:c6:a1: ed:73:40:3d:b9:c8:a6:fb:aa:d9:19:61:c0:9b:ba:53: 03:6a:cd:ed:44:97:b3:08:26:1a:73:4b:9a:f0:fb:12: 0b:30:db:46:6e:e6:32:8d:d0:0a:00:b7:07:d4:b4:6d: 49:31:54:ee:b8:93:47:47:ee:e7:c5:ba:d7:4b:18:06: df:20:83:c7:23:dd:a0:53:21:53:e4:a4:c5:d7:a0:49: 70:f3:85:28:fe:9a:dd:5c:9c:70:2e:f3:45:46:df:11: 28:4b:85:74:5d:03:d9:5e:b5:fc:40:14:6a:b2:fb:48: 16:ef:48:6d:f1:aa:46:8e:87:05:4f:41:b8:76:9b:66: 7f:e4:28:22:fe:66:0c:76:fc:a3:ed:30:36:4a:eb:3c: 99:c0:81:92:a4:fd:4b:00:46:69:67:b3:2e:55:87:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:c5:2c:86:be:ca:97:88:5f:20:17:31:20:16:b9:a0: 10:f0:41:2e:3b:96:60:49:d8:ab:de:be:ca:9b:a3:a1: f3:97:cb:46:d4:61:8d:c8:74:15:27:50:3c:c3:43:b9: 2f:98:fe:cf:dd:b0:28:57:72:02:61:2e:75:69:cf:15: 49:bb:2f:72:82:7d:db:dc:1a:60:4f:0d:b3:12:e4:c2: a6:a5:37:11:33:a2:a0:b6:88:0b:11:8e:eb:41:1d:0a: da:3d:d9:be:f9:35:97:f2:35:0c:e7:c9:77:c2:a5:14: 24:56:8b:95:5c:88:d6:e6:10:24:2f:8f:b4:30:e8:94: e2:a3:8b:34:a5:1b:eb:f7:51:67:a7:33:c7:33:90:28: 72:71:62:4c:6c:fb:8d:b4:86:9c:54:16:b9:d6:32:a3: 0a:7d:3a:fb:c6:01:aa:e7:d3:cf:7f:f0:b4:7c:e8:38: c0:62:1b:e9:b6:8a:cc:e7:ef:dc:78:ba:e0:32:ca:44: e8:ee:70:7c:1a:b0:bc:e6:9d:fd:f2:c0:1b:83:ae:bd: d1:7c:16:73:ba:0e:af:2d:43:09:04:da:c8:1d:69:eb: 32:5b:28:f2:4c:02:18:39:0c:41:a4:0f:cf:86:88:b7: ad:49:dd:eb:dc:d6:ca:e1:4a:8b:4b:6c:2f:0f:58:74 Fingerprint (SHA-256): 36:A3:E6:BC:1A:1F:97:98:DB:F1:3E:37:7F:29:C7:E4:D2:C2:C4:77:09:DE:FE:45:B0:49:F3:FB:76:C7:5F:B8 Fingerprint (SHA1): C4:31:9D:C0:3F:95:68:2C:A4:6F:C5:B1:ED:9E:DA:CF:92:AB:3F:B7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194336 (0x433ee120) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:43:56 2025 Not After : Thu Nov 28 11:43:56 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:d9:92:90:1f:20:13:e0:0b:fa:88:a9:70:8f:b0:5f: 4f:8f:b6:f5:a8:cc:cd:e2:4c:79:c0:4d:c6:b2:b3:1b: ed:7b:36:55:9e:87:8d:9f:76:fc:5e:65:15:4f:0d:73: c6:0b:bb:07:d3:b8:a3:00:44:e2:78:41:16:df:31:f2: 84:71:88:2d:4a:f3:0d:f5:0b:09:32:4b:83:6d:48:50: 4f:9a:6f:79:e8:e4:4e:68:7f:8d:f3:c7:38:ef:c6:a1: ed:73:40:3d:b9:c8:a6:fb:aa:d9:19:61:c0:9b:ba:53: 03:6a:cd:ed:44:97:b3:08:26:1a:73:4b:9a:f0:fb:12: 0b:30:db:46:6e:e6:32:8d:d0:0a:00:b7:07:d4:b4:6d: 49:31:54:ee:b8:93:47:47:ee:e7:c5:ba:d7:4b:18:06: df:20:83:c7:23:dd:a0:53:21:53:e4:a4:c5:d7:a0:49: 70:f3:85:28:fe:9a:dd:5c:9c:70:2e:f3:45:46:df:11: 28:4b:85:74:5d:03:d9:5e:b5:fc:40:14:6a:b2:fb:48: 16:ef:48:6d:f1:aa:46:8e:87:05:4f:41:b8:76:9b:66: 7f:e4:28:22:fe:66:0c:76:fc:a3:ed:30:36:4a:eb:3c: 99:c0:81:92:a4:fd:4b:00:46:69:67:b3:2e:55:87:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:c5:2c:86:be:ca:97:88:5f:20:17:31:20:16:b9:a0: 10:f0:41:2e:3b:96:60:49:d8:ab:de:be:ca:9b:a3:a1: f3:97:cb:46:d4:61:8d:c8:74:15:27:50:3c:c3:43:b9: 2f:98:fe:cf:dd:b0:28:57:72:02:61:2e:75:69:cf:15: 49:bb:2f:72:82:7d:db:dc:1a:60:4f:0d:b3:12:e4:c2: a6:a5:37:11:33:a2:a0:b6:88:0b:11:8e:eb:41:1d:0a: da:3d:d9:be:f9:35:97:f2:35:0c:e7:c9:77:c2:a5:14: 24:56:8b:95:5c:88:d6:e6:10:24:2f:8f:b4:30:e8:94: e2:a3:8b:34:a5:1b:eb:f7:51:67:a7:33:c7:33:90:28: 72:71:62:4c:6c:fb:8d:b4:86:9c:54:16:b9:d6:32:a3: 0a:7d:3a:fb:c6:01:aa:e7:d3:cf:7f:f0:b4:7c:e8:38: c0:62:1b:e9:b6:8a:cc:e7:ef:dc:78:ba:e0:32:ca:44: e8:ee:70:7c:1a:b0:bc:e6:9d:fd:f2:c0:1b:83:ae:bd: d1:7c:16:73:ba:0e:af:2d:43:09:04:da:c8:1d:69:eb: 32:5b:28:f2:4c:02:18:39:0c:41:a4:0f:cf:86:88:b7: ad:49:dd:eb:dc:d6:ca:e1:4a:8b:4b:6c:2f:0f:58:74 Fingerprint (SHA-256): 36:A3:E6:BC:1A:1F:97:98:DB:F1:3E:37:7F:29:C7:E4:D2:C2:C4:77:09:DE:FE:45:B0:49:F3:FB:76:C7:5F:B8 Fingerprint (SHA1): C4:31:9D:C0:3F:95:68:2C:A4:6F:C5:B1:ED:9E:DA:CF:92:AB:3F:B7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194335 (0x433ee11f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:43:55 2025 Not After : Thu Nov 28 11:43:55 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:dd:7f:87:e4:be:b1:99:5a:f6:1d:9c:a2:60:10:6a: 52:37:f9:85:c0:34:7d:f4:4d:07:e6:2e:3b:0b:5d:34: 82:a2:92:9f:6a:95:46:c2:d9:46:83:9d:f4:b5:0a:d5: 75:8e:47:7f:33:4c:6e:51:4c:33:d9:df:c1:10:9c:b2: f8:1c:a4:17:38:14:9d:bd:0b:0b:65:f2:9b:f9:13:ba: 85:41:bd:bc:88:05:77:55:10:75:f8:65:89:b8:c7:a7: 2f:13:35:d9:4b:1a:fe:4f:a9:dc:b2:64:bc:be:f4:67: ba:1c:f2:44:fa:5d:ea:76:d6:71:fd:f3:ce:b7:df:fe: c3:a3:54:ae:df:08:5d:1f:8e:70:80:2c:d5:06:4e:69: 6a:3b:43:1c:11:9b:17:00:96:36:7b:cf:de:a1:93:ff: c7:4b:4f:2c:ab:27:bb:f5:b2:f7:72:71:3e:f4:3d:0a: ba:50:12:34:0a:84:e2:0e:78:7c:01:f8:3c:69:36:f5: 1f:47:51:2f:63:28:4c:b7:3c:7f:12:e8:80:54:72:6b: ec:1d:30:b0:f0:b3:23:19:bc:62:44:15:b6:03:e2:e9: ca:c2:0a:1e:61:b6:26:03:43:00:fe:d2:6f:da:87:45: 3b:91:f8:33:b3:dc:6a:ff:9f:a6:29:f2:65:d0:84:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:40:ff:97:a2:71:4d:e7:d4:9a:9f:0e:39:28:5c:ff: e7:06:3d:c9:0b:48:e1:13:ad:59:33:b2:b1:85:21:00: 78:ca:14:7e:06:78:31:4b:26:ed:d3:44:9b:26:12:0a: a9:2f:51:9d:a7:c9:fa:eb:90:6c:ad:6a:70:2d:96:e2: c2:c6:bc:bf:63:c7:b9:2b:fb:28:d8:4a:99:a6:b5:3a: d9:d3:49:c7:0c:5b:36:50:03:83:22:d0:b2:2a:1f:08: 9e:dc:cf:3f:4e:ac:7d:e6:73:07:d4:cb:11:6f:6b:53: c3:f8:ec:28:37:85:03:7b:83:e5:b2:ec:75:b5:44:e0: 7b:67:11:ad:8b:a8:9e:67:be:fa:a7:5b:fa:9d:6d:55: e8:f2:9a:38:d0:28:1d:e3:0c:e5:d2:0e:82:ae:95:5d: 79:25:46:09:9d:b6:42:b8:6f:7c:d7:a4:c6:17:59:f6: 0d:85:1e:9b:f6:c7:18:48:6d:8e:33:f3:9a:2a:77:04: 49:de:77:31:ed:38:ad:94:a4:ad:d3:ba:99:0a:3c:44: b6:ba:82:6a:a5:05:c3:5b:62:f6:c2:ff:d7:f3:1e:50: 55:45:b0:43:4b:d0:d6:75:d9:b5:1d:b2:d7:aa:ba:e3: 53:fa:c0:a3:e4:87:8f:73:6f:f8:67:ad:b7:c5:34:b0 Fingerprint (SHA-256): 29:FF:50:61:D2:4E:68:E1:19:FC:8E:8C:33:C0:99:02:9E:B8:83:BB:9E:2D:BD:E3:1E:90:6A:7F:2F:58:49:F3 Fingerprint (SHA1): D3:4F:12:A3:32:41:5C:E5:6F:8D:13:0D:8D:AC:FE:80:7E:16:62:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194335 (0x433ee11f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:43:55 2025 Not After : Thu Nov 28 11:43:55 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:dd:7f:87:e4:be:b1:99:5a:f6:1d:9c:a2:60:10:6a: 52:37:f9:85:c0:34:7d:f4:4d:07:e6:2e:3b:0b:5d:34: 82:a2:92:9f:6a:95:46:c2:d9:46:83:9d:f4:b5:0a:d5: 75:8e:47:7f:33:4c:6e:51:4c:33:d9:df:c1:10:9c:b2: f8:1c:a4:17:38:14:9d:bd:0b:0b:65:f2:9b:f9:13:ba: 85:41:bd:bc:88:05:77:55:10:75:f8:65:89:b8:c7:a7: 2f:13:35:d9:4b:1a:fe:4f:a9:dc:b2:64:bc:be:f4:67: ba:1c:f2:44:fa:5d:ea:76:d6:71:fd:f3:ce:b7:df:fe: c3:a3:54:ae:df:08:5d:1f:8e:70:80:2c:d5:06:4e:69: 6a:3b:43:1c:11:9b:17:00:96:36:7b:cf:de:a1:93:ff: c7:4b:4f:2c:ab:27:bb:f5:b2:f7:72:71:3e:f4:3d:0a: ba:50:12:34:0a:84:e2:0e:78:7c:01:f8:3c:69:36:f5: 1f:47:51:2f:63:28:4c:b7:3c:7f:12:e8:80:54:72:6b: ec:1d:30:b0:f0:b3:23:19:bc:62:44:15:b6:03:e2:e9: ca:c2:0a:1e:61:b6:26:03:43:00:fe:d2:6f:da:87:45: 3b:91:f8:33:b3:dc:6a:ff:9f:a6:29:f2:65:d0:84:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:40:ff:97:a2:71:4d:e7:d4:9a:9f:0e:39:28:5c:ff: e7:06:3d:c9:0b:48:e1:13:ad:59:33:b2:b1:85:21:00: 78:ca:14:7e:06:78:31:4b:26:ed:d3:44:9b:26:12:0a: a9:2f:51:9d:a7:c9:fa:eb:90:6c:ad:6a:70:2d:96:e2: c2:c6:bc:bf:63:c7:b9:2b:fb:28:d8:4a:99:a6:b5:3a: d9:d3:49:c7:0c:5b:36:50:03:83:22:d0:b2:2a:1f:08: 9e:dc:cf:3f:4e:ac:7d:e6:73:07:d4:cb:11:6f:6b:53: c3:f8:ec:28:37:85:03:7b:83:e5:b2:ec:75:b5:44:e0: 7b:67:11:ad:8b:a8:9e:67:be:fa:a7:5b:fa:9d:6d:55: e8:f2:9a:38:d0:28:1d:e3:0c:e5:d2:0e:82:ae:95:5d: 79:25:46:09:9d:b6:42:b8:6f:7c:d7:a4:c6:17:59:f6: 0d:85:1e:9b:f6:c7:18:48:6d:8e:33:f3:9a:2a:77:04: 49:de:77:31:ed:38:ad:94:a4:ad:d3:ba:99:0a:3c:44: b6:ba:82:6a:a5:05:c3:5b:62:f6:c2:ff:d7:f3:1e:50: 55:45:b0:43:4b:d0:d6:75:d9:b5:1d:b2:d7:aa:ba:e3: 53:fa:c0:a3:e4:87:8f:73:6f:f8:67:ad:b7:c5:34:b0 Fingerprint (SHA-256): 29:FF:50:61:D2:4E:68:E1:19:FC:8E:8C:33:C0:99:02:9E:B8:83:BB:9E:2D:BD:E3:1E:90:6A:7F:2F:58:49:F3 Fingerprint (SHA1): D3:4F:12:A3:32:41:5C:E5:6F:8D:13:0D:8D:AC:FE:80:7E:16:62:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194340 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194341 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194342 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194343 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194344 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194345 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194346 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194347 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194348 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128194349 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128194350 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128194351 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128194352 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128194353 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128194354 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128194355 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128194356 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128194357 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128194358 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128194359 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128194360 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128194361 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194362 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194340 (0x433ee124) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:44:00 2025 Not After : Thu Nov 28 11:44:00 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:e1:45:ee:36:20:6b:a3:68:26:17:e3:b7:c3:1e:59: 29:4d:ee:a6:d7:e6:c7:9e:b8:3a:6a:08:df:b4:b4:fd: 47:0e:90:aa:24:c6:87:0e:03:c1:f3:73:52:c8:8d:76: 0d:84:e4:81:3b:c6:6c:e2:52:4c:72:bf:c6:19:34:29: 31:e0:10:08:cc:4f:77:e1:82:ae:df:c6:04:ee:b0:75: 48:26:a1:4f:53:6b:e0:75:c7:1a:2b:d6:89:55:b9:19: e8:09:d6:e5:1c:1b:ea:a4:a5:f0:90:b8:83:0f:b7:97: ad:15:e3:e2:27:6b:29:df:74:a5:3e:f6:2f:ec:b2:3b: 3a:3f:91:9a:f8:fb:e0:8b:ad:ae:8d:48:15:d1:0a:48: 84:08:98:96:1b:72:06:32:98:00:99:7d:e4:18:40:50: 85:1e:b2:ae:8b:a0:e7:16:49:7a:43:ee:a6:df:fb:0c: b1:bb:32:e2:ce:ab:3b:e3:cf:97:9c:df:35:27:bd:4f: db:b9:ea:c0:d8:db:06:c5:70:dc:72:64:b6:15:48:c3: 58:42:bd:29:4b:d6:76:7f:29:5b:88:59:10:d8:08:5a: 83:c5:85:2a:d2:b0:61:18:57:30:78:fe:a6:6d:5a:a6: cb:80:2f:02:9d:f9:5c:99:66:4a:df:be:d1:bd:d9:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:46:2d:cc:1e:d8:81:f1:04:b1:68:da:5c:23:61:87: 71:96:85:63:2e:fb:11:9f:c4:78:42:0d:56:e0:13:ee: d2:8a:51:f8:ae:45:6f:95:1b:81:3e:ce:b0:25:3c:5d: e6:40:c6:77:7b:04:7a:3c:3e:c0:fd:1f:7a:51:92:d3: ac:19:30:b4:cc:b6:f8:b7:78:7c:c3:49:ac:0c:4b:fc: 9e:92:21:7f:c2:7c:45:5f:22:78:76:2e:c4:9e:04:9f: 6e:b4:e5:fd:7b:8b:4b:06:91:f7:eb:6d:5c:fa:12:7b: 29:74:4d:d1:51:57:a6:df:90:3e:3c:ec:e6:d0:ac:c1: b7:5a:50:ed:9f:dc:21:5b:f3:05:8c:cb:9d:0c:d8:de: 90:0f:6d:e8:5f:d2:cc:7d:ae:d9:a9:db:91:1b:0f:a9: 6f:13:ba:26:d8:02:95:66:a3:69:31:62:1a:c9:e2:b7: fb:d1:d6:f2:31:e0:23:e0:25:66:89:76:3a:dc:1b:c3: 38:63:24:6b:44:4d:a9:ae:54:9e:4c:45:ff:ad:64:de: b1:f5:2c:0d:0e:5d:c9:d7:48:7d:54:a1:26:75:a9:0e: 80:b2:38:e8:be:cb:e9:d2:4f:5e:b3:b5:de:f5:b5:ea: 29:a9:7b:4a:77:11:58:17:52:f4:32:f1:a0:84:6d:62 Fingerprint (SHA-256): 31:F8:BC:49:4E:FF:47:E1:79:75:D3:BF:AE:E8:62:01:F8:7D:A4:31:A7:2F:D0:EA:8E:16:64:6C:08:EC:AE:8A Fingerprint (SHA1): D7:07:4F:98:09:FE:99:82:67:2A:2B:57:1C:22:AC:FA:EE:8C:FB:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194341 (0x433ee125) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:44:01 2025 Not After : Thu Nov 28 11:44:01 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:64:7e:0a:1a:18:5b:7d:0d:e8:17:d6:ac:cf:d0:c7: 8e:31:03:ef:8a:2b:2c:54:bd:07:d4:16:3c:d8:78:b6: 95:af:68:91:47:7d:19:b3:24:e9:2e:fb:fd:35:e4:03: 5f:f8:10:83:00:22:6e:5b:65:f0:d8:91:ad:e0:29:c3: 74:fd:c6:9b:4c:9b:82:2d:7f:ca:9a:14:fc:73:5d:22: a3:af:95:81:31:4e:87:2e:49:aa:e6:04:be:e6:a7:df: fc:1c:f3:1b:a9:fb:7c:f7:84:f6:ca:ca:c6:64:2c:c5: 89:27:66:bd:6d:30:44:08:7f:c0:73:dc:40:0f:61:67: 01:5f:9c:11:6c:94:58:07:95:b9:01:7a:2d:92:ee:f6: 4d:b9:58:ba:9f:c2:7e:07:0a:81:bb:03:3a:33:51:78: 55:ca:47:78:3e:0e:c0:00:ff:f8:db:06:00:80:30:f3: ed:43:48:98:fb:f4:cb:37:62:9a:42:d5:19:16:f5:b2: ac:64:a0:43:51:7b:93:36:94:0b:cc:76:35:7f:4d:d4: c5:47:33:eb:de:c1:4d:96:81:ef:97:d5:33:e1:8e:3f: 51:91:cf:84:69:d3:62:9e:83:c8:ff:92:af:05:ac:07: fd:c4:ae:07:e2:84:37:39:4b:73:52:c3:fd:b5:a7:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:f1:8f:a1:03:75:de:99:3c:65:6b:ab:b5:ee:49:c5: 81:20:76:86:eb:59:ea:a4:74:25:01:1e:fd:f2:0a:eb: df:7d:cb:60:26:5a:9b:f7:98:24:ab:a4:14:bb:83:6f: 6e:0d:d9:61:c6:08:20:4d:bf:ee:45:4b:9f:40:6c:7e: 07:d4:da:c3:61:48:30:75:28:d5:9f:71:cd:ad:b0:43: 8a:9f:89:6d:93:5a:31:93:e1:75:e1:ab:42:2c:22:20: 23:c9:3f:3e:9f:70:be:fc:e0:1b:a0:8e:e6:8c:3f:58: bb:76:0a:f6:80:3d:ff:0a:14:70:f3:34:03:55:ba:49: 0a:00:ea:95:45:62:ab:b2:6d:f9:f9:df:37:c0:f6:89: 79:4d:64:a8:b7:4e:01:35:4f:21:98:8a:77:a6:a8:54: 1e:d2:80:98:5d:6f:a5:b7:53:75:21:7e:53:8b:9d:1e: f9:ee:85:af:28:cd:51:ce:86:88:b4:af:d9:14:3a:11: a4:b4:ab:a8:22:63:b8:2e:8f:9c:7d:05:b4:a0:b3:35: 62:ff:b5:25:a8:4c:45:4e:0c:7b:3a:8f:58:c1:e9:de: f4:5b:40:91:0c:65:a6:34:ae:63:8b:4f:29:bf:a6:82: 0a:01:06:98:0d:27:92:48:ba:ee:8e:63:0a:e4:75:70 Fingerprint (SHA-256): AC:26:F2:DB:96:AF:FD:9B:AD:4D:06:82:43:6A:74:E5:3E:B6:69:52:DA:C4:EF:A8:0C:B6:D3:74:55:98:B3:AE Fingerprint (SHA1): BE:61:D5:B2:7D:83:BA:B6:00:B5:8F:AD:27:32:6B:95:0C:33:2B:79 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194342 (0x433ee126) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:44:02 2025 Not After : Thu Nov 28 11:44:02 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:4a:e4:af:d8:69:0d:29:50:f7:a2:77:db:61:05:2e: 11:c4:2e:d2:01:f9:05:a2:4e:a1:fb:09:d7:bd:25:1b: 67:75:c3:a1:2a:32:16:da:2e:59:01:32:16:0f:fa:66: 8a:43:6d:6d:76:30:49:f7:e8:a4:38:3d:1a:46:c7:f1: af:1e:a9:74:c4:7b:7c:fd:2f:fb:82:e8:99:b0:44:4b: c3:f5:4b:61:9a:d1:79:8c:b6:4d:8b:f4:28:16:bb:49: bf:f3:66:8f:65:8a:7f:e0:de:4e:9f:d1:48:51:62:80: d0:b3:9c:bc:57:e1:fb:db:dc:5b:f8:5d:39:2e:c3:be: 93:ee:ac:19:f5:ee:ea:62:ff:3d:15:d9:ac:16:36:99: c3:f5:1e:87:78:80:63:93:f3:d9:17:57:c9:de:04:36: cc:cb:11:72:8b:77:73:ac:68:9a:4c:53:ea:fb:77:10: 32:6e:22:1a:82:85:6d:01:57:68:76:06:70:37:34:bb: bb:95:b9:56:ef:2b:63:ad:70:ef:28:5f:c7:59:a6:73: 30:30:28:79:05:45:26:e2:ff:0c:39:f6:5c:2d:66:d7: 9e:20:52:9d:dd:a9:b3:bc:4c:41:3e:80:95:92:ab:64: c9:bb:2b:c5:31:65:9d:99:42:cc:91:4a:03:43:be:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:eb:fc:a6:56:d2:90:e4:12:5a:76:94:64:c1:03:b3: 81:0e:f5:5d:6e:76:7f:9a:67:b5:a4:02:43:0a:3a:80: 20:58:55:36:19:28:51:e5:ef:f7:81:54:18:2e:74:bd: 09:70:3c:63:64:df:88:a4:0a:39:23:96:a8:f1:ff:b8: f7:54:6c:f1:4a:bb:bc:77:a1:25:51:88:c4:d1:6c:c6: 8b:78:dd:b9:96:8f:9e:61:f4:d6:68:84:5a:1b:01:58: 79:c4:b1:88:5f:2f:a8:43:60:60:5e:03:17:c4:9e:a8: 86:de:cf:79:0a:c4:6e:11:df:99:24:3e:d2:4e:11:71: ff:c4:2e:af:da:2b:90:7d:6f:11:1f:a1:c2:7a:de:20: e5:b8:fb:e8:29:c8:c2:68:3f:d8:c2:e0:4a:7e:44:f7: 9e:6f:55:f1:09:dd:9e:c5:3e:09:58:ec:06:25:a1:14: 8f:9c:45:c4:c0:f1:e1:77:0b:54:40:85:00:cb:ee:ab: ba:cc:52:0f:6e:ad:27:24:96:95:cc:d8:dc:48:78:8b: 84:e3:19:1e:d4:58:ca:fd:ba:a4:42:81:61:ca:82:ee: 63:d5:7d:3d:38:28:6c:8a:01:bd:eb:6c:52:bf:45:52: b4:61:2f:58:22:22:15:fd:9d:e8:10:ec:bf:b4:73:41 Fingerprint (SHA-256): 14:35:15:8E:F5:EA:CE:28:50:E6:20:DA:75:9D:CD:84:B1:61:01:9C:FB:E7:E9:4D:28:C2:E6:BC:3F:F7:C8:65 Fingerprint (SHA1): F1:4C:C6:8C:6E:2D:F9:EF:65:D5:61:6F:93:A3:33:4B:66:00:FB:06 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194343 (0x433ee127) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:44:02 2025 Not After : Thu Nov 28 11:44:02 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:49:ee:59:16:4d:90:e8:df:38:3c:41:88:10:75:86: 20:38:3f:84:82:51:ab:a9:ea:4a:47:77:0a:ac:0b:b0: 5a:1f:6a:c5:cc:21:f8:eb:6b:48:33:95:58:b9:f3:a8: ec:cb:e5:9b:52:49:76:7d:ee:47:23:e8:90:fe:8f:3a: 7f:71:22:e3:e6:74:83:59:66:20:33:9f:00:5d:22:06: 35:23:ef:2e:f5:5e:61:16:08:9d:ce:76:41:99:84:42: 32:57:e4:6d:4c:db:c3:dd:4d:e0:9c:1b:1e:f0:3c:72: d6:5f:d7:2e:49:dd:9a:97:f5:c7:29:06:0b:20:b0:84: 6e:b1:6f:a5:8f:d3:58:8a:3f:d6:2a:5d:5f:42:19:6e: e1:f0:fb:f0:a8:c7:cb:0e:b7:69:f8:22:f1:4e:58:60: 36:3f:4a:92:b2:57:c1:19:35:42:f1:28:1e:89:fa:d6: 24:64:9f:35:1e:51:54:56:ec:ed:0a:15:53:a1:ff:10: f0:7f:0a:69:37:47:c0:21:46:46:22:56:a6:e9:a1:af: d5:0d:49:6a:41:6a:ec:f5:7f:b6:36:a2:ee:df:34:a6: 0e:8b:60:8b:af:52:e3:25:75:8e:c0:37:a8:c3:e0:aa: c0:dc:31:05:22:1e:bb:3d:5b:75:bd:e9:c6:48:3a:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:dd:02:b5:ca:bf:a0:87:aa:e7:82:fa:c5:50:21:e0: eb:fe:69:fd:aa:f6:3c:23:e3:b8:24:a9:df:62:21:96: d8:53:78:b0:de:e0:f0:95:b5:74:20:c2:2e:8f:3f:d3: ee:1d:69:f2:1a:36:a6:a6:ec:02:07:a7:f9:80:73:8e: 30:19:5b:d6:0a:4e:3d:45:0a:42:09:62:0d:fd:36:b4: bf:45:05:8d:03:00:f1:69:7f:60:82:0c:91:4e:07:08: e1:3a:23:24:17:7d:9d:45:c3:a8:67:5b:5d:0a:4a:82: a4:34:93:0e:9e:3b:2a:df:67:af:91:2f:0d:07:63:ff: d0:69:e2:3e:47:4e:3f:2a:fd:8a:b8:c2:65:7b:dd:3d: 61:21:a7:51:e8:94:53:f2:ec:98:72:55:0f:0c:49:98: 3f:24:ff:86:15:ba:97:32:17:b2:af:f0:3d:ac:ad:35: a0:c7:06:9f:dc:0b:10:1e:82:5d:a4:52:8e:e1:64:d9: 5f:8f:75:df:05:b7:a0:e6:20:05:41:03:32:be:ae:58: 12:47:e7:41:f9:73:b5:d4:21:e0:6e:df:50:e7:28:b1: 11:53:b0:f5:d0:78:b6:3a:bf:b6:54:6c:d8:bb:fb:ed: 70:b3:82:7c:04:e4:28:3d:46:c5:37:b5:26:d7:4a:ca Fingerprint (SHA-256): C2:8D:16:8B:CF:86:33:A6:4D:A9:18:92:ED:90:69:EE:A2:21:BF:0F:BF:64:BA:09:2A:A2:79:67:D5:78:F1:6E Fingerprint (SHA1): 1F:5E:B2:7E:7B:CF:95:4B:C6:AA:09:E7:18:2F:2C:CF:8B:ED:3B:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194344 (0x433ee128) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:44:03 2025 Not After : Thu Nov 28 11:44:03 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:07:7e:59:18:30:09:ed:7a:4e:84:0a:32:86:22:9c: c0:09:50:c5:33:30:43:4a:21:73:57:34:ad:37:9d:85: 5d:c0:b3:0d:5a:26:62:82:5e:43:6b:d3:f7:f4:d2:31: 52:54:4d:57:c8:a4:6a:55:5f:8b:64:5c:e6:d9:32:9d: d9:0d:b3:fb:17:ee:b8:0d:1e:6d:93:9b:48:7f:96:9b: b0:6d:12:63:7f:af:f1:6a:1c:1d:2c:e0:28:dc:0c:ff: 44:84:55:42:9e:2b:f7:e0:cd:e8:44:d5:ff:cb:d8:2c: cf:6c:ef:34:37:5e:78:d9:30:5f:13:18:bc:95:f5:44: 88:fc:61:62:47:f9:6f:2e:24:c9:c8:5c:6f:a3:c4:a1: 85:69:67:67:2a:61:86:a3:49:43:7c:0d:a3:6d:a6:54: 91:86:65:06:ff:0c:df:07:19:cd:46:8f:e0:55:5a:c4: fa:92:79:52:bf:74:51:0f:31:6f:2d:ca:d9:13:fb:d2: c9:d1:33:b3:01:81:b1:6e:d8:93:e6:d6:a3:d8:21:25: 01:fa:37:86:2f:f2:7b:93:bb:2a:3b:13:07:1b:13:71: 9b:84:a9:d8:52:0e:f8:06:df:40:e6:7c:89:56:73:e3: 8f:92:d3:ad:c8:26:f7:78:b5:f4:ff:74:b0:78:0a:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:3e:17:78:f3:3e:fa:ee:a6:99:b1:1d:79:98:96:b1: 2c:e6:d0:fb:95:f9:f0:b8:cf:c7:4f:1c:54:f9:57:97: 1a:3f:45:3e:31:fb:64:2f:81:9b:28:81:a4:af:94:e2: 2f:3e:ea:87:4d:8f:a7:6c:76:5a:54:06:97:4c:ea:eb: 96:fd:d6:d2:88:69:13:cf:d9:06:d3:de:05:93:c3:7d: 76:88:a4:07:91:ab:b5:45:08:8e:80:a9:e2:f1:d3:6a: 2e:3d:6e:cc:29:f8:68:e8:da:64:e6:cb:f0:99:81:c9: ed:ed:56:1f:79:eb:d2:f4:ba:07:e4:2b:67:bb:a3:19: 76:0c:e7:f1:38:f9:b6:7b:29:77:65:55:65:48:e7:7e: 4c:3f:f4:84:32:b0:05:df:71:9b:87:96:de:07:ef:f0: 44:bc:a5:e1:24:be:18:46:2d:2e:c7:51:2b:74:a1:5f: 16:2b:37:97:7c:3c:6f:e0:75:a9:8f:d6:cd:90:c9:49: 01:63:97:4c:0e:33:b3:2a:70:74:c4:8b:40:d2:72:8d: a8:5f:13:f0:e4:e5:d6:30:ac:02:39:bb:8c:a0:28:eb: 78:06:fd:13:c4:bc:3a:48:c4:bb:71:ab:5a:b1:c7:69: 5b:00:95:af:72:d3:5a:0f:5e:b6:7a:ff:70:71:8b:b5 Fingerprint (SHA-256): B2:01:7F:95:4F:45:3D:F5:0F:D8:DB:F6:5E:DD:BB:6C:BE:DD:53:60:9A:2E:50:1F:5A:95:E7:3C:C2:C6:6D:23 Fingerprint (SHA1): D6:E4:3F:EF:71:63:70:31:AE:BF:45:16:C6:F4:3D:91:6D:1C:11:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194345 (0x433ee129) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:44:04 2025 Not After : Thu Nov 28 11:44:04 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:1d:62:7f:cb:3e:f1:59:a8:55:59:88:73:8c:a3:8b: 3b:29:c2:53:1e:ff:2d:50:2c:2d:58:e7:dc:24:23:25: 44:f1:14:6c:04:16:74:13:2c:e2:dd:f1:f8:a9:1b:73: f9:b0:ae:44:1e:b8:eb:62:26:50:30:42:4a:88:da:2b: 9b:12:73:91:ca:c6:a2:32:2c:e5:e0:9b:7e:8d:f2:03: ac:e6:75:0f:d5:7e:ee:9e:d8:48:be:54:67:fd:fd:b2: 3b:ae:4d:f4:fd:6b:a6:5c:4f:02:0f:4a:df:ef:1f:1c: 45:14:5e:0e:c1:30:02:b9:62:92:e5:15:b0:41:e0:88: 7b:84:52:7b:76:eb:04:4d:65:9c:13:f8:40:c3:1b:f0: f6:c8:a5:ff:6a:2c:77:5e:6d:d4:a3:3b:a3:af:10:fa: 26:39:52:8b:07:74:ea:03:b0:67:08:54:81:d0:3e:5f: d0:fa:0f:dc:a2:26:8a:c9:58:69:89:57:b4:96:2f:ab: b4:8e:53:05:22:21:56:9d:86:52:dc:00:aa:d4:4a:68: 98:d3:b6:8f:21:12:ef:90:c6:4b:22:91:b0:1c:94:e6: d6:3d:03:51:dd:59:1c:72:3f:89:f2:ae:7c:4a:1d:07: b9:8c:a9:c7:19:f2:0d:34:c0:b7:00:ee:7a:11:6b:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:f0:21:52:7f:9a:f7:76:9b:94:d0:01:c0:59:02:88: 1b:68:6b:cb:ef:e4:9c:37:ea:ca:a3:26:9b:46:f1:5e: 05:bf:b4:7e:7c:6b:0b:4e:02:cc:2a:e8:41:e8:29:0d: 66:e9:72:a6:78:45:30:ec:7f:58:4f:91:75:32:81:28: 9f:9b:58:f2:06:86:f2:d2:8c:d4:3c:47:7e:80:fc:9e: 2c:e0:97:50:ab:ce:f6:b7:92:6b:18:5b:a9:ab:6a:b7: a8:2d:12:f6:5b:8b:6a:ec:34:cb:90:b8:c7:c1:7b:2b: 77:cb:0d:ee:5c:7d:cf:85:d1:b8:43:36:db:73:03:19: e1:22:68:0c:dc:0e:50:e3:4c:25:da:c5:92:dc:bf:fa: 8e:38:ec:f1:d1:90:f9:b1:57:8c:fd:5f:7e:09:3e:7e: 12:28:e0:d5:b1:e8:b4:18:5b:0c:fb:93:15:e7:f8:c8: f2:91:fc:ac:46:7a:40:73:0b:1f:50:af:aa:30:6d:c3: c0:74:d2:9f:62:64:05:98:5a:b2:da:cc:b9:bc:88:1a: ef:e2:0a:37:f1:d4:38:f5:ef:cd:30:db:4d:6b:f1:f3: c4:fb:a5:8a:cf:34:57:b6:6a:47:e0:e0:84:43:63:9c: 02:32:28:c0:a6:36:e5:63:27:26:d4:0f:c0:09:93:82 Fingerprint (SHA-256): 66:01:1B:EC:59:93:27:AD:45:90:7D:18:34:BA:05:4C:3B:0A:53:2D:2D:F0:29:52:43:7E:B7:FA:DF:1C:4B:19 Fingerprint (SHA1): 3A:C0:1E:B9:01:20:FF:7A:A4:CF:05:64:0B:87:15:7A:98:BA:57:8E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194346 (0x433ee12a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:44:05 2025 Not After : Thu Nov 28 11:44:05 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:4d:82:5c:3d:d0:70:92:54:4f:0b:74:c8:67:57:0f: e2:c2:e4:4d:da:f1:36:1a:ca:47:0c:87:f9:b1:c8:96: 82:d1:5a:d7:02:d7:14:55:a1:a4:e2:0c:60:6a:d2:54: ed:40:b8:8f:d9:2a:8e:1a:39:f0:cb:3f:bf:21:37:8b: 00:e3:c7:8f:9d:cd:d1:8c:84:aa:a3:ac:50:e6:58:fa: eb:52:da:53:95:60:68:13:8c:19:dc:fc:bd:56:1e:81: ac:e7:b2:4c:7c:42:f4:eb:04:04:d3:fc:d2:a8:fa:07: ae:af:d9:ed:1c:f1:ac:3b:c7:0b:b7:d5:b5:b0:87:31: 49:8e:ac:70:48:2e:49:f0:0c:79:df:63:ee:37:28:85: 2d:33:13:9e:9d:34:2b:c0:73:d4:79:26:48:ef:ff:65: 0b:ea:61:3e:c6:1b:ee:a8:10:48:a6:63:ef:89:8d:76: 1b:28:82:91:64:8f:8f:db:49:53:52:ae:30:8a:bc:aa: 74:76:20:22:5f:43:1a:13:b8:29:79:2e:33:42:fb:ab: d6:77:82:e1:e2:1b:a6:2b:7f:dc:2e:ed:8a:fa:c6:1f: d3:04:67:40:b0:6b:6c:62:ee:e6:d6:b7:26:86:93:76: c6:6d:92:4a:0b:0d:43:b7:be:a1:9a:79:c5:57:2d:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:c6:c6:34:1d:f3:ce:62:26:5f:9c:63:b1:c9:2a:58: de:ea:35:a0:bc:25:ec:6e:73:ad:55:36:17:2e:8b:54: 19:86:de:c0:13:05:a4:8d:68:c7:a5:8d:ed:f9:14:81: 77:f9:69:d3:5a:5c:1d:ff:d6:d2:10:80:7d:cb:9d:c1: e8:48:3b:22:6a:54:10:b6:52:4e:db:3b:9d:ef:25:30: 43:78:bd:91:91:e1:55:95:68:8c:aa:be:99:b7:b9:98: a2:27:c6:37:82:13:bf:f1:07:a6:c0:a5:fe:49:ae:10: d1:73:51:ce:db:89:15:c2:ad:ca:e6:97:e6:ae:ae:be: b8:1f:ca:9b:1a:7b:f4:38:a6:42:0f:7e:ce:36:9a:cb: 4c:23:6b:57:ff:b5:8d:83:54:c0:63:f3:88:3f:87:3a: 96:60:1e:0a:58:4d:ab:ed:08:c3:3d:2c:41:62:63:0b: 46:ca:49:10:cc:cf:0b:2f:1c:32:b0:7a:c5:e8:09:ef: 22:99:3a:1a:3f:23:af:b2:cb:e7:a7:75:67:69:d7:24: 49:13:bb:f3:02:fe:c0:ab:c4:b5:86:ed:0b:c2:7a:e0: 73:22:b3:37:7a:ad:63:29:31:cf:c5:f8:d1:53:38:6c: 68:cc:59:32:97:a5:24:ac:1c:f9:57:f6:be:b3:fc:84 Fingerprint (SHA-256): 11:14:1F:59:08:ED:58:12:C4:06:04:7A:24:47:06:C2:B6:40:BA:56:FD:98:6B:AA:53:23:48:EF:FF:10:05:D8 Fingerprint (SHA1): 8B:A0:17:4D:C3:F2:AD:29:17:13:11:26:59:CC:8D:51:7A:26:C4:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194347 (0x433ee12b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:44:05 2025 Not After : Thu Nov 28 11:44:05 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:b2:c8:62:02:1b:4e:c0:91:a2:25:0d:19:fe:3c:90: 78:46:8e:5d:96:ca:57:1e:75:ad:b1:20:8f:4f:59:5b: f9:d7:8d:e0:92:ff:69:87:ce:ff:32:8a:c5:65:d6:f9: 64:ad:29:fc:6e:91:cc:83:cc:de:4d:01:02:cd:71:e8: 11:f9:fc:63:74:2e:d9:ca:95:92:46:c5:43:97:01:3f: d6:ba:04:a9:49:c3:9c:ba:41:11:e3:a7:e7:19:90:7d: 83:7b:07:e7:9f:6a:d3:7e:c1:ac:80:da:ef:e2:2b:0d: c4:fb:50:0b:3e:c6:98:ba:77:ed:95:d2:8c:40:a9:1f: 1b:63:bc:96:32:1f:c3:ba:5e:f6:5e:12:0b:a7:c3:a5: 79:4f:91:a1:06:6e:80:eb:d7:2f:b7:6f:13:6a:ef:f6: fd:24:47:4f:61:ce:fc:0e:21:9f:40:aa:94:d8:9c:4d: ef:de:4c:d9:10:3e:02:7a:64:ac:1a:f5:98:67:40:fb: 57:28:e2:63:4d:d9:5e:22:76:02:19:dc:07:06:60:d6: ee:91:30:3c:8e:9b:33:0b:36:ba:70:04:8d:8d:0a:0f: 31:44:52:87:7e:86:bb:9a:25:ae:97:c1:70:34:68:c3: 7b:bb:bf:0d:8f:e3:79:c9:0d:96:c1:4e:9d:f4:40:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:39:74:01:cb:80:17:98:95:ca:a0:eb:22:4e:7f:06: 61:2d:d7:56:57:2e:3d:24:03:d8:12:6e:80:fc:1d:41: 3e:4b:b7:28:9c:ac:9c:a0:bc:43:03:63:23:82:44:59: df:40:3f:a5:cd:a1:4d:55:a2:33:58:ee:72:f5:d4:6a: bc:91:bf:c7:a0:d3:a1:8f:06:ea:c9:35:1f:2e:a5:76: 85:36:d5:60:c2:af:1a:5d:a4:89:74:ae:b4:16:62:d5: 72:85:c1:bc:49:94:15:76:63:3c:67:fe:d8:ff:a8:e7: 68:38:a8:28:d8:91:dd:b6:5f:59:b9:04:87:3d:92:47: 52:f5:83:37:c8:26:7c:f1:8e:1b:8d:a0:a6:9c:9f:27: b4:5b:3e:96:6f:53:e3:ed:1b:cc:00:cd:98:17:03:39: b6:d1:6c:ea:25:6a:3b:96:15:3c:e8:1f:f1:d7:47:40: 10:2b:03:f8:93:1d:a7:0f:c7:5e:32:ba:ff:c5:fe:91: f4:46:e4:57:df:e0:f9:91:79:9b:e5:26:70:b5:ea:6c: b1:9d:cb:e5:9f:05:97:99:db:6a:b1:f2:f7:d2:df:55: b6:21:66:48:4d:6c:e9:45:7c:36:a6:3a:fe:9d:77:2c: e1:ea:d3:50:e4:63:cc:e0:ad:9c:9b:9c:34:f2:94:d9 Fingerprint (SHA-256): 32:94:86:D9:0F:21:91:81:9D:BF:93:75:BD:A3:37:D0:BE:33:E0:17:92:6B:81:96:A2:8B:A0:47:71:96:B5:85 Fingerprint (SHA1): 45:79:73:9F:E6:CC:5B:61:5B:76:23:54:AA:8B:C1:84:48:F8:49:23 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194348 (0x433ee12c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:44:06 2025 Not After : Thu Nov 28 11:44:06 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1f:65:00:d9:6f:49:90:4f:6d:1a:c9:6d:64:1d:13: a9:2f:70:e9:9a:fc:18:e0:a3:59:3b:da:8f:26:8b:b1: 07:b1:eb:1d:a1:c6:6c:cb:fb:59:b7:94:28:6c:40:57: 18:ad:e2:cc:19:30:d2:cb:41:cf:95:92:26:02:3e:40: c6:c9:39:bc:29:3b:42:90:26:f4:45:66:67:f2:c3:8b: a0:9e:a2:f5:16:83:6b:44:04:cd:fa:8c:7a:b3:7a:1b: 73:54:ab:ae:53:62:89:17:bd:9a:36:a4:28:62:d9:96: 7f:aa:40:0c:5c:27:ce:52:ec:46:95:bd:13:7d:a0:d1: b4:37:8e:e3:48:57:1c:86:32:a6:c3:ca:0e:b5:bf:e2: a4:80:8f:ae:96:50:3e:7f:dc:94:a1:f7:15:14:79:54: ff:3d:29:b6:4d:ab:06:12:9d:db:7b:51:d1:3a:7e:97: 75:a8:b1:5f:51:0f:f6:5d:8e:e6:73:78:95:cb:90:e4: d9:a9:96:ca:4a:a2:d2:0e:08:93:b2:ca:1e:7e:08:f2: 54:f8:5a:aa:33:41:2a:3c:d8:9b:36:aa:b7:65:56:0a: f3:e3:81:4f:cd:e5:41:0d:83:88:a9:84:a4:4c:a1:ec: 8d:b6:7b:a7:fc:43:50:aa:f2:46:84:f6:f8:14:d6:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:a6:d6:4f:b1:65:32:5c:90:20:d7:de:d1:17:06:66: 93:6c:7f:8d:d8:00:e1:ab:41:30:da:c7:4f:f3:e8:4e: 4a:68:c6:c1:a3:8e:8c:ba:4f:63:2b:f0:f8:70:69:e3: ac:3a:ec:91:29:10:61:ab:33:b0:a5:af:18:b7:c9:b8: dd:be:72:72:2f:2b:55:90:d4:c8:23:d0:e8:a4:cb:ac: 6e:08:be:23:65:2f:9f:49:cb:a7:af:76:ae:c4:ec:0f: 55:e6:31:78:e9:fa:09:13:23:4e:29:16:1e:69:6c:ff: 0d:15:7d:4c:6f:fb:2b:e9:4a:6b:51:31:b2:9f:26:ef: 10:96:72:f8:2a:c8:d0:2d:27:98:1b:08:9b:6d:e5:71: f2:c7:e3:24:29:63:14:30:4d:d5:63:4c:b9:ae:10:53: 98:ab:af:1a:75:47:7b:fb:a6:ca:4f:fb:ce:02:dd:2c: 6f:68:c0:a9:e7:d5:32:2b:ab:ec:ae:2d:e2:6c:50:66: 9c:88:d6:03:c2:61:2c:3e:04:7d:a2:b6:1a:f1:ec:84: 3b:08:ff:22:69:ff:54:38:40:cd:bc:26:c2:25:4e:32: 10:28:8e:33:f2:d5:66:c0:0d:8c:34:d9:2a:59:99:f1: f7:79:5e:59:82:95:88:bd:44:d9:10:2d:1a:71:33:8f Fingerprint (SHA-256): CE:8B:14:1E:FF:F8:95:8E:97:9E:CD:3F:D6:A9:05:04:F4:4C:1C:AC:88:90:B2:86:AB:1F:79:07:A8:D5:93:7C Fingerprint (SHA1): 70:F9:41:A8:96:C5:8A:C2:5C:F1:D3:A0:B9:F4:E3:0B:03:74:DC:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194363 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194364 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194365 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194366 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194363 (0x433ee13b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:13 2025 Not After : Thu Nov 28 11:44:13 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:51:0c:21:1f:11:1f:99:03:e5:37:4a:60:57:bb:6e: 77:bc:32:89:b8:6f:bd:3b:da:ce:bd:d8:3e:a5:25:91: e4:67:c0:88:1f:a0:fc:c4:e7:f7:61:2a:cb:1f:65:3c: 12:e4:89:eb:7d:58:25:47:25:17:36:2b:88:00:65:2b: 55:0b:66:a4:8e:33:5e:e2:fc:c2:e1:d7:87:91:fb:13: 79:44:6d:58:aa:72:5d:28:1e:0a:d9:08:b7:a7:41:2d: ec:d1:52:93:b5:b7:97:18:e0:d4:5a:96:7a:e6:6a:d2: 3a:50:96:c3:04:22:5a:e8:ff:ab:d3:6a:68:8a:46:a2: 70:46:30:2c:e9:77:82:61:a7:8b:d5:4a:1c:94:37:fb: 1f:af:44:af:55:2f:d1:72:13:77:97:f2:f2:03:16:61: 39:9a:ad:2f:b3:b0:4c:70:5d:70:b0:23:03:c8:46:c6: 99:cf:e1:d4:93:83:9f:f7:16:23:2b:81:95:f4:95:94: b4:9c:d5:aa:7a:1a:24:f3:d3:7b:37:f4:d8:78:94:18: 1d:c4:a5:c9:d6:69:6e:ae:6f:ce:29:3a:a4:2e:91:e9: 95:89:60:6c:65:d4:99:1f:a5:75:c3:36:b8:fe:22:f6: 18:eb:01:fd:74:dd:54:7b:91:5c:5a:40:0d:31:6a:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:15:60:47:0c:e1:cd:a4:d8:92:1d:c8:72:5b:9d:c1: 87:81:9c:d8:f0:40:04:16:26:fa:de:d4:a2:a1:12:22: 77:8d:43:27:61:ce:f9:ac:36:d1:ed:46:42:63:dd:cb: f8:52:83:5f:31:5a:8b:38:0b:24:be:6f:fa:76:16:62: 60:1c:eb:61:bd:c0:74:de:74:45:bc:bd:ef:c6:4f:77: 29:a8:28:74:80:c4:e2:6b:1f:10:73:5f:05:9c:ad:19: 9c:81:de:8d:73:2c:bf:93:fc:23:a2:c5:4c:b0:cd:cf: d2:57:7f:92:c5:81:f4:23:c3:31:9a:8f:13:2a:70:9a: 9b:f2:dd:3d:bc:73:73:bb:6b:9f:ab:6d:b2:50:7f:8f: 67:cf:d0:a2:6a:9b:df:69:77:bb:e2:f3:45:cb:45:82: 3a:f5:53:d7:10:d3:9d:c8:48:04:15:20:0b:63:36:15: 7d:76:27:79:e9:8a:27:c6:59:72:61:c2:8b:c7:7f:81: b8:98:e5:58:ef:3c:2b:da:62:24:8a:2d:0a:24:e2:20: e7:a3:f1:d3:2c:81:35:fb:90:23:da:fe:0c:ab:6c:25: 0b:9c:83:99:e7:36:59:05:15:a8:d8:24:59:4c:62:a5: c9:11:99:74:e8:29:f3:5b:5d:38:42:55:e4:b3:10:ce Fingerprint (SHA-256): 23:BA:5C:85:CB:3E:C4:92:2D:DF:0F:82:9C:D5:7F:99:B8:70:08:15:30:5F:48:0E:6D:B8:4F:DD:76:81:7A:D9 Fingerprint (SHA1): 6A:69:1A:26:D1:57:2C:80:E6:40:D4:30:55:19:E5:FD:73:BB:F9:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194364 (0x433ee13c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:14 2025 Not After : Thu Nov 28 11:44:14 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:90:0b:73:8e:33:50:e1:dc:4b:ac:50:84:d0:90:2f: 0c:d5:92:00:71:42:fa:af:c4:fc:9f:81:ba:e4:6c:48: 88:76:35:02:1a:20:9f:c9:d3:22:65:c7:67:c3:6e:b1: b5:a6:43:59:0f:c7:ab:9b:f5:7f:36:a7:01:ca:8e:65: a8:b2:9b:79:a9:38:ff:26:6e:ee:45:c7:2c:86:90:3b: 98:08:db:95:42:96:34:e6:71:a2:a1:a2:86:0d:20:94: cc:6a:2f:e0:3b:46:71:3c:c4:da:37:d2:0a:3a:90:2c: bd:52:c7:9d:68:4a:83:91:57:a0:47:98:2c:b3:e2:63: da:1b:f6:0c:ac:5a:00:c8:0f:d4:85:79:02:26:3c:70: 1e:bf:ff:32:7e:2a:95:40:81:18:d7:bd:49:66:5f:ca: 3b:b5:ca:4f:f7:1c:e4:78:a0:d0:84:91:df:55:36:d8: 12:51:be:37:4f:5e:32:81:ed:31:1b:d4:2d:03:50:41: 74:51:1c:a9:75:53:89:66:d5:8b:ec:6c:4f:c5:0c:3e: 51:0e:bc:fa:67:b5:79:3b:5d:89:d4:84:dc:f8:07:25: 26:53:1f:46:2c:8c:57:71:67:67:3a:fe:56:4c:ed:08: 36:66:18:1c:d1:b6:5b:f0:73:c9:37:10:35:37:0b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:f7:1f:1b:4e:e0:4a:f0:a2:1b:0e:fe:d4:35:9e:93: 29:f5:d6:30:16:8d:4e:e9:21:af:81:66:f6:58:8d:27: 0a:11:f5:aa:df:ad:08:6f:c6:cd:01:e7:7d:c9:2a:24: 9b:a8:6f:56:0a:8e:7f:32:6c:1c:7a:ec:95:eb:ef:dc: f5:28:cd:ce:bc:0a:f1:7d:a3:7b:2c:9e:ba:b7:28:42: af:12:de:e2:60:1b:07:79:26:3a:cc:b7:90:54:d1:63: 2b:bc:a5:6f:60:fd:a5:cf:ec:e3:12:25:58:f2:86:c1: 53:26:ab:14:6d:41:05:4e:8b:a3:cf:34:57:f7:73:97: c3:e1:cb:88:b5:0e:4b:76:13:77:c4:bc:28:3e:2e:99: a7:76:09:27:dd:9d:96:92:ef:b1:7f:09:9d:f5:86:e8: c7:e6:54:15:5a:a7:f0:2a:37:00:12:18:26:da:25:92: 45:89:f5:ee:5b:0a:3b:d5:c8:c1:d0:01:31:63:38:37: c8:a9:47:52:47:ed:a9:8f:b4:17:5f:9a:ab:3d:2a:50: 8a:4f:af:a4:1b:93:08:c9:c3:0f:21:d3:4d:68:a1:ae: 4a:04:0a:f4:44:52:31:ce:92:c9:2d:cf:24:31:f4:1e: 40:83:ed:11:db:79:f3:25:5c:6b:b0:6a:62:07:e0:8c Fingerprint (SHA-256): 30:3A:E7:FA:58:2B:90:18:4B:CA:07:17:53:1B:88:4A:E9:05:CD:6E:6A:C5:B0:E8:8E:D4:39:46:AE:BB:E2:00 Fingerprint (SHA1): FC:D2:36:CC:80:7D:64:CA:3C:9C:E0:97:D7:5A:FF:5E:71:AE:6B:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194365 (0x433ee13d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:14 2025 Not After : Thu Nov 28 11:44:14 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:30:ea:5f:e7:d3:bf:1d:ca:ea:6e:ef:7a:58:32:47: 7e:c3:0d:92:0e:d2:25:80:66:14:fb:06:e4:f9:02:1a: 8b:44:39:2f:ec:70:37:1d:6f:ab:cd:22:5a:7a:30:b2: 78:ef:5b:04:aa:dd:a4:1a:c7:5c:7c:98:c8:c0:f6:44: 6f:82:0a:51:c6:7d:e9:bb:dd:5b:23:13:9b:9a:45:fb: 7a:e3:4c:c3:a4:7c:7e:de:86:4f:c7:52:3d:71:e6:60: 20:2a:79:25:00:0d:00:21:4a:a3:cb:9d:18:63:ea:dd: b2:ce:0e:f9:35:a6:96:dc:07:b8:0e:25:14:8b:94:5a: 31:83:c6:19:72:e3:73:01:5b:84:bd:28:2d:37:2b:bf: 1f:87:98:8a:69:dd:ae:8c:13:d8:d1:bf:96:c5:5d:24: f4:3a:9c:aa:c8:ce:80:21:32:7c:0f:27:2e:eb:e3:89: 99:bf:3e:29:78:a2:b3:ac:ac:c9:0b:d8:ae:3d:68:e9: 08:3b:6b:8a:69:17:26:fd:d1:ad:b9:75:de:ea:c6:8b: ed:15:d1:00:e1:42:05:53:32:c3:f2:3d:38:2f:39:21: 66:1f:fa:9c:b1:76:4c:b4:57:ed:dc:2a:9d:4b:5e:cc: 57:9c:6d:29:81:1b:29:32:05:75:e3:d3:32:67:5a:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:74:e0:ef:c6:10:9b:f8:91:53:d7:6e:9b:59:7a:f1: 37:d3:d7:7d:92:6d:79:3a:b5:a3:a2:24:c0:8a:20:d4: 5e:47:de:02:8e:ad:7c:68:b1:68:9e:54:aa:ea:3e:44: 8c:cc:61:e7:8b:f2:bf:fb:31:d0:c4:ca:96:f2:c1:af: 40:9a:20:de:b2:e4:f4:b8:15:19:ed:7b:0f:ee:e5:93: 92:ae:f8:c0:08:ac:76:8f:c0:aa:09:93:ff:66:c3:6f: a2:46:a5:00:a4:36:9a:35:5e:11:0a:f9:24:e2:62:ba: 39:5f:09:cb:95:45:23:c0:ec:81:e8:03:19:c3:d0:a5: df:34:e2:5c:87:a1:b0:c8:c2:0d:a7:97:e5:39:4f:09: 1b:6c:08:c5:b6:f7:30:56:b0:54:7a:40:4c:61:37:e9: ce:53:83:ba:a0:d4:b8:bb:cd:6c:cc:12:39:04:34:69: 0c:21:b2:96:62:c6:a4:d2:00:1a:a8:10:9c:e6:ec:ea: b6:1a:29:1e:86:27:5a:24:4d:41:06:77:10:c4:17:7c: 84:1b:e9:b8:f0:03:be:85:9d:08:bb:e3:0a:95:f0:e6: 70:06:f9:73:5d:f3:36:dc:65:84:43:04:f3:cc:8c:f3: 32:a7:2c:af:5f:8a:8d:f6:16:50:a2:58:22:37:af:b2 Fingerprint (SHA-256): B0:EC:A3:E3:35:9B:52:E2:96:5D:FF:76:1D:CF:DA:03:C6:96:4C:C1:DA:BC:B9:92:9A:F2:E1:B8:CA:7A:6A:5A Fingerprint (SHA1): 1B:D5:1E:8C:13:53:6E:2D:89:F5:2C:01:3C:34:94:64:21:29:E2:F3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194363 (0x433ee13b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:13 2025 Not After : Thu Nov 28 11:44:13 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:51:0c:21:1f:11:1f:99:03:e5:37:4a:60:57:bb:6e: 77:bc:32:89:b8:6f:bd:3b:da:ce:bd:d8:3e:a5:25:91: e4:67:c0:88:1f:a0:fc:c4:e7:f7:61:2a:cb:1f:65:3c: 12:e4:89:eb:7d:58:25:47:25:17:36:2b:88:00:65:2b: 55:0b:66:a4:8e:33:5e:e2:fc:c2:e1:d7:87:91:fb:13: 79:44:6d:58:aa:72:5d:28:1e:0a:d9:08:b7:a7:41:2d: ec:d1:52:93:b5:b7:97:18:e0:d4:5a:96:7a:e6:6a:d2: 3a:50:96:c3:04:22:5a:e8:ff:ab:d3:6a:68:8a:46:a2: 70:46:30:2c:e9:77:82:61:a7:8b:d5:4a:1c:94:37:fb: 1f:af:44:af:55:2f:d1:72:13:77:97:f2:f2:03:16:61: 39:9a:ad:2f:b3:b0:4c:70:5d:70:b0:23:03:c8:46:c6: 99:cf:e1:d4:93:83:9f:f7:16:23:2b:81:95:f4:95:94: b4:9c:d5:aa:7a:1a:24:f3:d3:7b:37:f4:d8:78:94:18: 1d:c4:a5:c9:d6:69:6e:ae:6f:ce:29:3a:a4:2e:91:e9: 95:89:60:6c:65:d4:99:1f:a5:75:c3:36:b8:fe:22:f6: 18:eb:01:fd:74:dd:54:7b:91:5c:5a:40:0d:31:6a:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:15:60:47:0c:e1:cd:a4:d8:92:1d:c8:72:5b:9d:c1: 87:81:9c:d8:f0:40:04:16:26:fa:de:d4:a2:a1:12:22: 77:8d:43:27:61:ce:f9:ac:36:d1:ed:46:42:63:dd:cb: f8:52:83:5f:31:5a:8b:38:0b:24:be:6f:fa:76:16:62: 60:1c:eb:61:bd:c0:74:de:74:45:bc:bd:ef:c6:4f:77: 29:a8:28:74:80:c4:e2:6b:1f:10:73:5f:05:9c:ad:19: 9c:81:de:8d:73:2c:bf:93:fc:23:a2:c5:4c:b0:cd:cf: d2:57:7f:92:c5:81:f4:23:c3:31:9a:8f:13:2a:70:9a: 9b:f2:dd:3d:bc:73:73:bb:6b:9f:ab:6d:b2:50:7f:8f: 67:cf:d0:a2:6a:9b:df:69:77:bb:e2:f3:45:cb:45:82: 3a:f5:53:d7:10:d3:9d:c8:48:04:15:20:0b:63:36:15: 7d:76:27:79:e9:8a:27:c6:59:72:61:c2:8b:c7:7f:81: b8:98:e5:58:ef:3c:2b:da:62:24:8a:2d:0a:24:e2:20: e7:a3:f1:d3:2c:81:35:fb:90:23:da:fe:0c:ab:6c:25: 0b:9c:83:99:e7:36:59:05:15:a8:d8:24:59:4c:62:a5: c9:11:99:74:e8:29:f3:5b:5d:38:42:55:e4:b3:10:ce Fingerprint (SHA-256): 23:BA:5C:85:CB:3E:C4:92:2D:DF:0F:82:9C:D5:7F:99:B8:70:08:15:30:5F:48:0E:6D:B8:4F:DD:76:81:7A:D9 Fingerprint (SHA1): 6A:69:1A:26:D1:57:2C:80:E6:40:D4:30:55:19:E5:FD:73:BB:F9:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194364 (0x433ee13c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:14 2025 Not After : Thu Nov 28 11:44:14 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:90:0b:73:8e:33:50:e1:dc:4b:ac:50:84:d0:90:2f: 0c:d5:92:00:71:42:fa:af:c4:fc:9f:81:ba:e4:6c:48: 88:76:35:02:1a:20:9f:c9:d3:22:65:c7:67:c3:6e:b1: b5:a6:43:59:0f:c7:ab:9b:f5:7f:36:a7:01:ca:8e:65: a8:b2:9b:79:a9:38:ff:26:6e:ee:45:c7:2c:86:90:3b: 98:08:db:95:42:96:34:e6:71:a2:a1:a2:86:0d:20:94: cc:6a:2f:e0:3b:46:71:3c:c4:da:37:d2:0a:3a:90:2c: bd:52:c7:9d:68:4a:83:91:57:a0:47:98:2c:b3:e2:63: da:1b:f6:0c:ac:5a:00:c8:0f:d4:85:79:02:26:3c:70: 1e:bf:ff:32:7e:2a:95:40:81:18:d7:bd:49:66:5f:ca: 3b:b5:ca:4f:f7:1c:e4:78:a0:d0:84:91:df:55:36:d8: 12:51:be:37:4f:5e:32:81:ed:31:1b:d4:2d:03:50:41: 74:51:1c:a9:75:53:89:66:d5:8b:ec:6c:4f:c5:0c:3e: 51:0e:bc:fa:67:b5:79:3b:5d:89:d4:84:dc:f8:07:25: 26:53:1f:46:2c:8c:57:71:67:67:3a:fe:56:4c:ed:08: 36:66:18:1c:d1:b6:5b:f0:73:c9:37:10:35:37:0b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:f7:1f:1b:4e:e0:4a:f0:a2:1b:0e:fe:d4:35:9e:93: 29:f5:d6:30:16:8d:4e:e9:21:af:81:66:f6:58:8d:27: 0a:11:f5:aa:df:ad:08:6f:c6:cd:01:e7:7d:c9:2a:24: 9b:a8:6f:56:0a:8e:7f:32:6c:1c:7a:ec:95:eb:ef:dc: f5:28:cd:ce:bc:0a:f1:7d:a3:7b:2c:9e:ba:b7:28:42: af:12:de:e2:60:1b:07:79:26:3a:cc:b7:90:54:d1:63: 2b:bc:a5:6f:60:fd:a5:cf:ec:e3:12:25:58:f2:86:c1: 53:26:ab:14:6d:41:05:4e:8b:a3:cf:34:57:f7:73:97: c3:e1:cb:88:b5:0e:4b:76:13:77:c4:bc:28:3e:2e:99: a7:76:09:27:dd:9d:96:92:ef:b1:7f:09:9d:f5:86:e8: c7:e6:54:15:5a:a7:f0:2a:37:00:12:18:26:da:25:92: 45:89:f5:ee:5b:0a:3b:d5:c8:c1:d0:01:31:63:38:37: c8:a9:47:52:47:ed:a9:8f:b4:17:5f:9a:ab:3d:2a:50: 8a:4f:af:a4:1b:93:08:c9:c3:0f:21:d3:4d:68:a1:ae: 4a:04:0a:f4:44:52:31:ce:92:c9:2d:cf:24:31:f4:1e: 40:83:ed:11:db:79:f3:25:5c:6b:b0:6a:62:07:e0:8c Fingerprint (SHA-256): 30:3A:E7:FA:58:2B:90:18:4B:CA:07:17:53:1B:88:4A:E9:05:CD:6E:6A:C5:B0:E8:8E:D4:39:46:AE:BB:E2:00 Fingerprint (SHA1): FC:D2:36:CC:80:7D:64:CA:3C:9C:E0:97:D7:5A:FF:5E:71:AE:6B:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194365 (0x433ee13d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:14 2025 Not After : Thu Nov 28 11:44:14 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:30:ea:5f:e7:d3:bf:1d:ca:ea:6e:ef:7a:58:32:47: 7e:c3:0d:92:0e:d2:25:80:66:14:fb:06:e4:f9:02:1a: 8b:44:39:2f:ec:70:37:1d:6f:ab:cd:22:5a:7a:30:b2: 78:ef:5b:04:aa:dd:a4:1a:c7:5c:7c:98:c8:c0:f6:44: 6f:82:0a:51:c6:7d:e9:bb:dd:5b:23:13:9b:9a:45:fb: 7a:e3:4c:c3:a4:7c:7e:de:86:4f:c7:52:3d:71:e6:60: 20:2a:79:25:00:0d:00:21:4a:a3:cb:9d:18:63:ea:dd: b2:ce:0e:f9:35:a6:96:dc:07:b8:0e:25:14:8b:94:5a: 31:83:c6:19:72:e3:73:01:5b:84:bd:28:2d:37:2b:bf: 1f:87:98:8a:69:dd:ae:8c:13:d8:d1:bf:96:c5:5d:24: f4:3a:9c:aa:c8:ce:80:21:32:7c:0f:27:2e:eb:e3:89: 99:bf:3e:29:78:a2:b3:ac:ac:c9:0b:d8:ae:3d:68:e9: 08:3b:6b:8a:69:17:26:fd:d1:ad:b9:75:de:ea:c6:8b: ed:15:d1:00:e1:42:05:53:32:c3:f2:3d:38:2f:39:21: 66:1f:fa:9c:b1:76:4c:b4:57:ed:dc:2a:9d:4b:5e:cc: 57:9c:6d:29:81:1b:29:32:05:75:e3:d3:32:67:5a:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:74:e0:ef:c6:10:9b:f8:91:53:d7:6e:9b:59:7a:f1: 37:d3:d7:7d:92:6d:79:3a:b5:a3:a2:24:c0:8a:20:d4: 5e:47:de:02:8e:ad:7c:68:b1:68:9e:54:aa:ea:3e:44: 8c:cc:61:e7:8b:f2:bf:fb:31:d0:c4:ca:96:f2:c1:af: 40:9a:20:de:b2:e4:f4:b8:15:19:ed:7b:0f:ee:e5:93: 92:ae:f8:c0:08:ac:76:8f:c0:aa:09:93:ff:66:c3:6f: a2:46:a5:00:a4:36:9a:35:5e:11:0a:f9:24:e2:62:ba: 39:5f:09:cb:95:45:23:c0:ec:81:e8:03:19:c3:d0:a5: df:34:e2:5c:87:a1:b0:c8:c2:0d:a7:97:e5:39:4f:09: 1b:6c:08:c5:b6:f7:30:56:b0:54:7a:40:4c:61:37:e9: ce:53:83:ba:a0:d4:b8:bb:cd:6c:cc:12:39:04:34:69: 0c:21:b2:96:62:c6:a4:d2:00:1a:a8:10:9c:e6:ec:ea: b6:1a:29:1e:86:27:5a:24:4d:41:06:77:10:c4:17:7c: 84:1b:e9:b8:f0:03:be:85:9d:08:bb:e3:0a:95:f0:e6: 70:06:f9:73:5d:f3:36:dc:65:84:43:04:f3:cc:8c:f3: 32:a7:2c:af:5f:8a:8d:f6:16:50:a2:58:22:37:af:b2 Fingerprint (SHA-256): B0:EC:A3:E3:35:9B:52:E2:96:5D:FF:76:1D:CF:DA:03:C6:96:4C:C1:DA:BC:B9:92:9A:F2:E1:B8:CA:7A:6A:5A Fingerprint (SHA1): 1B:D5:1E:8C:13:53:6E:2D:89:F5:2C:01:3C:34:94:64:21:29:E2:F3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194367 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194368 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194369 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194370 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194371 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194367 (0x433ee13f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:17 2025 Not After : Thu Nov 28 11:44:17 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:61:e8:6f:f2:3d:62:40:5b:ac:46:56:f7:c0:c9:d2: 1d:dd:a0:3e:eb:ee:b1:25:a3:4c:68:66:3d:fe:6e:ad: 3d:d0:12:48:ba:fd:45:14:99:20:58:c8:8a:ec:70:20: af:4d:4e:db:27:81:57:81:61:b0:11:85:7e:a6:28:37: 92:7b:2b:51:c6:eb:30:ec:ae:e8:9a:d3:89:ef:b6:47: 4d:0b:32:a7:32:56:23:18:be:47:bb:44:90:02:0d:2f: 3e:5b:2d:76:c6:f8:ba:f1:94:dc:66:11:f8:7e:b6:fc: d2:19:ce:20:10:c9:22:b2:db:72:53:e9:32:0c:62:9c: 38:2d:13:cb:fc:bf:f0:3a:7e:2a:b0:81:69:7b:53:73: 1e:8a:62:1e:3d:eb:61:37:01:46:97:b9:8c:a5:5d:bb: b3:fa:23:54:48:ec:18:4f:59:5d:63:e2:8c:45:81:c9: 5c:f6:b3:2f:df:d4:80:05:cd:4a:b1:23:7b:f7:61:c5: 76:be:8d:20:cf:31:2e:7e:6c:73:73:df:bb:cf:f4:01: 31:c9:36:74:81:b7:4a:78:fe:a1:eb:d7:e9:02:3a:5c: 20:03:eb:3b:47:32:2a:31:c3:36:3d:c0:4d:02:f4:ab: 62:fd:69:6a:d2:08:34:ed:01:eb:68:89:af:ab:9e:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:44:19:89:ad:a0:9e:ba:1d:30:fc:01:75:84:1f:a3: 6c:e5:76:54:e9:73:66:4b:19:fe:09:28:58:0a:e5:fc: 9a:c6:80:cb:47:19:bd:52:43:b9:6a:cd:f0:aa:21:1e: 4a:39:61:68:a8:67:e8:2f:1b:b6:9b:a7:10:5f:30:62: 39:a8:e6:d8:06:c3:15:5e:18:3f:52:a1:3c:25:39:9e: c7:56:50:13:d2:44:27:96:d1:02:e6:90:78:e7:fd:e7: b4:e4:e7:ac:15:0d:8d:76:2c:be:24:90:7b:14:39:9e: c7:a5:24:63:22:df:0c:eb:88:c0:e5:37:b6:8b:e1:65: 95:38:c8:d5:b7:82:8b:b1:75:8e:c9:68:6a:ac:ad:30: b1:37:3d:82:e6:8e:39:1f:e8:1a:61:10:1d:21:ac:2e: 5e:98:d6:a4:67:6a:ae:7c:07:ea:61:d2:88:90:c5:3b: 67:ee:d6:65:81:3f:1b:c9:07:c0:50:b1:20:10:b8:c9: b8:8a:71:9f:82:f5:57:b9:9a:fb:1c:b1:dd:8f:a2:f1: d6:76:2c:d1:c9:86:e1:6f:b3:7c:23:70:27:f8:37:4a: a1:4f:a1:1c:8e:99:2a:31:e3:42:e3:4a:2c:4c:d2:87: 3b:41:44:73:e8:5d:fb:ae:b1:3a:cf:f6:75:0c:7f:81 Fingerprint (SHA-256): F1:C1:85:CE:39:80:B1:1F:78:2F:0B:C9:ED:2A:86:BD:34:AB:7C:59:04:FE:09:61:63:C8:BE:A0:93:F0:17:83 Fingerprint (SHA1): E9:EB:C8:DC:C1:2A:98:EF:38:93:E0:2A:BC:BE:19:37:FB:65:7C:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194368 (0x433ee140) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:da:1b:23:3f:58:6c:c3:90:05:72:49:25:d1:b4:53: 9e:d5:1d:21:e6:1b:19:55:a0:1c:5b:48:89:d3:96:51: 0e:4d:8e:4c:24:41:bf:b8:82:26:c1:af:5a:f4:6f:04: bf:93:e0:75:f4:41:3a:b2:27:1d:51:cc:51:59:fb:34: ee:0a:6e:a3:cf:93:1b:58:cc:75:98:3c:c7:1e:a0:23: 98:1c:51:ad:61:74:d0:fa:02:f8:30:6f:3b:0e:ee:76: 24:52:0c:f4:5d:18:b1:9e:aa:59:66:33:ad:03:a5:c7: d3:37:b3:1b:d8:53:d9:0c:93:85:f6:13:14:37:c2:8b: 69:fa:dc:9e:bc:cd:a1:f9:b3:94:d9:06:ef:44:80:e6: 36:06:2c:15:fc:5f:54:1b:1f:56:21:86:c4:8b:da:dc: 12:7c:55:b2:16:30:49:00:dd:30:c0:0c:d5:e5:38:57: 0b:63:04:b2:53:08:fc:9c:3a:02:1c:ef:7c:b6:97:46: 2a:65:ed:d3:8b:f5:dc:f4:be:49:db:eb:b7:a7:90:6b: 30:37:3e:cb:8f:26:de:04:a7:ee:ad:92:6f:60:ec:30: 69:7e:9e:f8:fd:ed:96:da:9c:27:85:5e:f5:0c:96:9a: 67:71:74:e6:16:89:ab:9f:1e:1d:ff:f4:3e:aa:b2:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:fd:7f:57:87:90:3e:cb:6c:6c:77:f0:5d:40:dc:be: 6d:b1:dc:6e:58:4e:2b:db:58:68:59:53:a8:b2:8d:97: 7d:b6:61:df:b7:3a:d7:16:28:d5:37:d2:9a:54:5d:a6: 02:b0:04:c9:a6:7c:47:aa:1b:fb:0d:14:9a:2f:59:27: 38:ae:c9:f4:98:29:84:a8:bd:ec:a3:8e:6b:6d:89:73: c3:29:3b:23:99:00:8c:87:14:91:e8:01:9c:29:70:d5: ae:64:ff:c5:26:16:b1:cc:83:17:4f:4e:19:14:16:c3: fc:bc:a1:df:fb:7f:71:d6:ce:b8:f9:7c:a0:9e:90:a9: b7:52:65:3d:cf:e5:d2:77:c2:75:b5:18:04:69:5b:ac: a1:16:a3:aa:17:f6:5e:aa:ed:2f:13:a8:21:1d:68:06: 42:90:d2:b7:64:8b:c6:b3:25:c0:c7:65:d0:e7:db:03: 5c:8b:97:12:e8:46:16:df:ff:bb:e8:4b:63:6b:c1:ac: 54:ec:da:c3:27:55:2a:79:c1:0f:98:d0:5d:0b:fd:b1: 3e:69:d8:32:97:a5:ae:ae:e1:a5:f5:1d:fe:e3:0b:a1: b5:a6:4d:77:e9:e0:e1:d8:8a:ba:3f:36:0a:8e:57:b8: 33:ec:d3:fa:13:3b:4a:f7:1b:aa:f2:a8:54:79:ab:94 Fingerprint (SHA-256): 72:D3:45:98:45:AF:7B:17:99:21:AD:8E:F3:B1:71:87:79:9B:1F:1D:06:EA:AD:B9:80:C8:65:CD:56:22:7D:DA Fingerprint (SHA1): D5:C4:A0:55:DA:38:3D:07:66:E3:4E:29:EB:27:8D:FD:79:81:F0:CA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194369 (0x433ee141) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:30:5f:54:ec:8f:15:d6:af:22:91:f2:63:f9:6a:a2: c8:9a:a5:b4:b9:98:e7:59:3f:eb:2d:4e:17:98:24:f3: 7d:c0:77:46:0a:47:03:27:bb:3a:60:34:e1:e5:4e:41: ce:a3:db:9d:c0:2e:31:c0:10:b3:47:a8:93:74:ba:16: 63:c1:14:d6:48:3e:91:07:5a:92:15:bc:32:35:76:f2: c8:dd:1f:69:30:10:69:11:bb:d8:f0:0d:27:02:3a:b0: 68:d0:f4:d2:26:e4:ca:76:25:da:03:44:56:33:23:4a: 9f:87:3a:bb:07:81:12:65:4c:22:5f:8f:2f:c9:57:3b: 7b:01:e7:f6:1f:b6:03:5e:cb:c9:81:ef:e0:9f:f9:c8: 92:b7:88:e7:89:04:38:7e:6b:a5:ec:8b:a5:5d:53:e9: f6:43:8e:24:19:33:8f:ed:f6:b8:f7:ce:91:49:96:bc: de:9d:da:b4:23:83:d0:73:91:6a:4f:d5:1f:82:40:b7: cf:7d:36:54:94:20:a3:19:f7:bc:ef:b7:06:5f:ce:ab: 81:6c:90:b5:4d:97:5b:d5:0f:d2:86:6c:b7:aa:ff:51: fe:6a:c8:b4:49:8f:be:1d:1b:a7:4a:63:a5:3a:54:78: 94:5f:fa:75:fb:9d:b0:48:68:a4:99:18:c1:c4:ff:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:80:c6:d0:d9:53:96:1c:f7:f9:1d:ae:4d:87:5e:d3: a6:73:6f:07:49:0e:a8:91:46:e9:f4:50:d4:2b:38:1f: ba:1e:59:0e:14:1c:2b:26:b3:f7:74:94:d3:3a:cf:04: 80:f4:90:df:a1:9e:68:60:a0:01:ef:8d:cd:b3:8f:81: c4:bc:9b:aa:e7:71:2c:ae:f1:a2:b8:88:af:88:81:9d: cd:3b:ec:a0:13:bd:a9:99:89:35:0b:ed:44:be:85:c6: 19:c0:7a:04:78:10:12:9d:b5:77:f5:e6:40:52:fe:d7: 62:2f:f6:8c:80:a0:f1:2d:95:61:e3:c2:61:69:2c:a3: 3c:66:34:e6:58:47:31:6a:e7:62:23:a6:52:77:f6:29: d3:8a:29:d5:76:ae:32:0a:89:02:c2:15:59:d8:bd:41: 4e:28:12:dc:11:b1:3f:63:7f:e3:ff:0c:9e:3a:a1:fe: 07:1e:f6:40:ba:69:d6:a9:27:66:d6:bf:fc:e9:c8:b7: 9e:ea:99:16:7d:a0:7c:49:6d:bc:75:f4:4e:05:79:35: 6b:d5:48:33:25:b4:f3:02:bd:b2:90:ed:76:fe:c9:66: 49:5a:24:a3:06:0a:df:4e:b0:4d:08:c9:11:12:d0:93: c1:bb:bb:bb:cf:05:96:fa:37:62:77:54:4a:5e:6a:6f Fingerprint (SHA-256): 36:FA:BF:8B:6C:8E:93:44:34:47:C8:6F:C7:A2:4C:D9:80:00:5A:F5:2F:90:B5:61:07:8A:E0:5F:3E:FF:BA:15 Fingerprint (SHA1): B4:E1:E3:ED:2D:0C:CC:F9:7A:60:B3:C7:D2:BF:D8:61:D3:BF:CE:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194367 (0x433ee13f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:17 2025 Not After : Thu Nov 28 11:44:17 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:61:e8:6f:f2:3d:62:40:5b:ac:46:56:f7:c0:c9:d2: 1d:dd:a0:3e:eb:ee:b1:25:a3:4c:68:66:3d:fe:6e:ad: 3d:d0:12:48:ba:fd:45:14:99:20:58:c8:8a:ec:70:20: af:4d:4e:db:27:81:57:81:61:b0:11:85:7e:a6:28:37: 92:7b:2b:51:c6:eb:30:ec:ae:e8:9a:d3:89:ef:b6:47: 4d:0b:32:a7:32:56:23:18:be:47:bb:44:90:02:0d:2f: 3e:5b:2d:76:c6:f8:ba:f1:94:dc:66:11:f8:7e:b6:fc: d2:19:ce:20:10:c9:22:b2:db:72:53:e9:32:0c:62:9c: 38:2d:13:cb:fc:bf:f0:3a:7e:2a:b0:81:69:7b:53:73: 1e:8a:62:1e:3d:eb:61:37:01:46:97:b9:8c:a5:5d:bb: b3:fa:23:54:48:ec:18:4f:59:5d:63:e2:8c:45:81:c9: 5c:f6:b3:2f:df:d4:80:05:cd:4a:b1:23:7b:f7:61:c5: 76:be:8d:20:cf:31:2e:7e:6c:73:73:df:bb:cf:f4:01: 31:c9:36:74:81:b7:4a:78:fe:a1:eb:d7:e9:02:3a:5c: 20:03:eb:3b:47:32:2a:31:c3:36:3d:c0:4d:02:f4:ab: 62:fd:69:6a:d2:08:34:ed:01:eb:68:89:af:ab:9e:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:44:19:89:ad:a0:9e:ba:1d:30:fc:01:75:84:1f:a3: 6c:e5:76:54:e9:73:66:4b:19:fe:09:28:58:0a:e5:fc: 9a:c6:80:cb:47:19:bd:52:43:b9:6a:cd:f0:aa:21:1e: 4a:39:61:68:a8:67:e8:2f:1b:b6:9b:a7:10:5f:30:62: 39:a8:e6:d8:06:c3:15:5e:18:3f:52:a1:3c:25:39:9e: c7:56:50:13:d2:44:27:96:d1:02:e6:90:78:e7:fd:e7: b4:e4:e7:ac:15:0d:8d:76:2c:be:24:90:7b:14:39:9e: c7:a5:24:63:22:df:0c:eb:88:c0:e5:37:b6:8b:e1:65: 95:38:c8:d5:b7:82:8b:b1:75:8e:c9:68:6a:ac:ad:30: b1:37:3d:82:e6:8e:39:1f:e8:1a:61:10:1d:21:ac:2e: 5e:98:d6:a4:67:6a:ae:7c:07:ea:61:d2:88:90:c5:3b: 67:ee:d6:65:81:3f:1b:c9:07:c0:50:b1:20:10:b8:c9: b8:8a:71:9f:82:f5:57:b9:9a:fb:1c:b1:dd:8f:a2:f1: d6:76:2c:d1:c9:86:e1:6f:b3:7c:23:70:27:f8:37:4a: a1:4f:a1:1c:8e:99:2a:31:e3:42:e3:4a:2c:4c:d2:87: 3b:41:44:73:e8:5d:fb:ae:b1:3a:cf:f6:75:0c:7f:81 Fingerprint (SHA-256): F1:C1:85:CE:39:80:B1:1F:78:2F:0B:C9:ED:2A:86:BD:34:AB:7C:59:04:FE:09:61:63:C8:BE:A0:93:F0:17:83 Fingerprint (SHA1): E9:EB:C8:DC:C1:2A:98:EF:38:93:E0:2A:BC:BE:19:37:FB:65:7C:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194368 (0x433ee140) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:da:1b:23:3f:58:6c:c3:90:05:72:49:25:d1:b4:53: 9e:d5:1d:21:e6:1b:19:55:a0:1c:5b:48:89:d3:96:51: 0e:4d:8e:4c:24:41:bf:b8:82:26:c1:af:5a:f4:6f:04: bf:93:e0:75:f4:41:3a:b2:27:1d:51:cc:51:59:fb:34: ee:0a:6e:a3:cf:93:1b:58:cc:75:98:3c:c7:1e:a0:23: 98:1c:51:ad:61:74:d0:fa:02:f8:30:6f:3b:0e:ee:76: 24:52:0c:f4:5d:18:b1:9e:aa:59:66:33:ad:03:a5:c7: d3:37:b3:1b:d8:53:d9:0c:93:85:f6:13:14:37:c2:8b: 69:fa:dc:9e:bc:cd:a1:f9:b3:94:d9:06:ef:44:80:e6: 36:06:2c:15:fc:5f:54:1b:1f:56:21:86:c4:8b:da:dc: 12:7c:55:b2:16:30:49:00:dd:30:c0:0c:d5:e5:38:57: 0b:63:04:b2:53:08:fc:9c:3a:02:1c:ef:7c:b6:97:46: 2a:65:ed:d3:8b:f5:dc:f4:be:49:db:eb:b7:a7:90:6b: 30:37:3e:cb:8f:26:de:04:a7:ee:ad:92:6f:60:ec:30: 69:7e:9e:f8:fd:ed:96:da:9c:27:85:5e:f5:0c:96:9a: 67:71:74:e6:16:89:ab:9f:1e:1d:ff:f4:3e:aa:b2:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:fd:7f:57:87:90:3e:cb:6c:6c:77:f0:5d:40:dc:be: 6d:b1:dc:6e:58:4e:2b:db:58:68:59:53:a8:b2:8d:97: 7d:b6:61:df:b7:3a:d7:16:28:d5:37:d2:9a:54:5d:a6: 02:b0:04:c9:a6:7c:47:aa:1b:fb:0d:14:9a:2f:59:27: 38:ae:c9:f4:98:29:84:a8:bd:ec:a3:8e:6b:6d:89:73: c3:29:3b:23:99:00:8c:87:14:91:e8:01:9c:29:70:d5: ae:64:ff:c5:26:16:b1:cc:83:17:4f:4e:19:14:16:c3: fc:bc:a1:df:fb:7f:71:d6:ce:b8:f9:7c:a0:9e:90:a9: b7:52:65:3d:cf:e5:d2:77:c2:75:b5:18:04:69:5b:ac: a1:16:a3:aa:17:f6:5e:aa:ed:2f:13:a8:21:1d:68:06: 42:90:d2:b7:64:8b:c6:b3:25:c0:c7:65:d0:e7:db:03: 5c:8b:97:12:e8:46:16:df:ff:bb:e8:4b:63:6b:c1:ac: 54:ec:da:c3:27:55:2a:79:c1:0f:98:d0:5d:0b:fd:b1: 3e:69:d8:32:97:a5:ae:ae:e1:a5:f5:1d:fe:e3:0b:a1: b5:a6:4d:77:e9:e0:e1:d8:8a:ba:3f:36:0a:8e:57:b8: 33:ec:d3:fa:13:3b:4a:f7:1b:aa:f2:a8:54:79:ab:94 Fingerprint (SHA-256): 72:D3:45:98:45:AF:7B:17:99:21:AD:8E:F3:B1:71:87:79:9B:1F:1D:06:EA:AD:B9:80:C8:65:CD:56:22:7D:DA Fingerprint (SHA1): D5:C4:A0:55:DA:38:3D:07:66:E3:4E:29:EB:27:8D:FD:79:81:F0:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194369 (0x433ee141) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:30:5f:54:ec:8f:15:d6:af:22:91:f2:63:f9:6a:a2: c8:9a:a5:b4:b9:98:e7:59:3f:eb:2d:4e:17:98:24:f3: 7d:c0:77:46:0a:47:03:27:bb:3a:60:34:e1:e5:4e:41: ce:a3:db:9d:c0:2e:31:c0:10:b3:47:a8:93:74:ba:16: 63:c1:14:d6:48:3e:91:07:5a:92:15:bc:32:35:76:f2: c8:dd:1f:69:30:10:69:11:bb:d8:f0:0d:27:02:3a:b0: 68:d0:f4:d2:26:e4:ca:76:25:da:03:44:56:33:23:4a: 9f:87:3a:bb:07:81:12:65:4c:22:5f:8f:2f:c9:57:3b: 7b:01:e7:f6:1f:b6:03:5e:cb:c9:81:ef:e0:9f:f9:c8: 92:b7:88:e7:89:04:38:7e:6b:a5:ec:8b:a5:5d:53:e9: f6:43:8e:24:19:33:8f:ed:f6:b8:f7:ce:91:49:96:bc: de:9d:da:b4:23:83:d0:73:91:6a:4f:d5:1f:82:40:b7: cf:7d:36:54:94:20:a3:19:f7:bc:ef:b7:06:5f:ce:ab: 81:6c:90:b5:4d:97:5b:d5:0f:d2:86:6c:b7:aa:ff:51: fe:6a:c8:b4:49:8f:be:1d:1b:a7:4a:63:a5:3a:54:78: 94:5f:fa:75:fb:9d:b0:48:68:a4:99:18:c1:c4:ff:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:80:c6:d0:d9:53:96:1c:f7:f9:1d:ae:4d:87:5e:d3: a6:73:6f:07:49:0e:a8:91:46:e9:f4:50:d4:2b:38:1f: ba:1e:59:0e:14:1c:2b:26:b3:f7:74:94:d3:3a:cf:04: 80:f4:90:df:a1:9e:68:60:a0:01:ef:8d:cd:b3:8f:81: c4:bc:9b:aa:e7:71:2c:ae:f1:a2:b8:88:af:88:81:9d: cd:3b:ec:a0:13:bd:a9:99:89:35:0b:ed:44:be:85:c6: 19:c0:7a:04:78:10:12:9d:b5:77:f5:e6:40:52:fe:d7: 62:2f:f6:8c:80:a0:f1:2d:95:61:e3:c2:61:69:2c:a3: 3c:66:34:e6:58:47:31:6a:e7:62:23:a6:52:77:f6:29: d3:8a:29:d5:76:ae:32:0a:89:02:c2:15:59:d8:bd:41: 4e:28:12:dc:11:b1:3f:63:7f:e3:ff:0c:9e:3a:a1:fe: 07:1e:f6:40:ba:69:d6:a9:27:66:d6:bf:fc:e9:c8:b7: 9e:ea:99:16:7d:a0:7c:49:6d:bc:75:f4:4e:05:79:35: 6b:d5:48:33:25:b4:f3:02:bd:b2:90:ed:76:fe:c9:66: 49:5a:24:a3:06:0a:df:4e:b0:4d:08:c9:11:12:d0:93: c1:bb:bb:bb:cf:05:96:fa:37:62:77:54:4a:5e:6a:6f Fingerprint (SHA-256): 36:FA:BF:8B:6C:8E:93:44:34:47:C8:6F:C7:A2:4C:D9:80:00:5A:F5:2F:90:B5:61:07:8A:E0:5F:3E:FF:BA:15 Fingerprint (SHA1): B4:E1:E3:ED:2D:0C:CC:F9:7A:60:B3:C7:D2:BF:D8:61:D3:BF:CE:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194367 (0x433ee13f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:17 2025 Not After : Thu Nov 28 11:44:17 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:61:e8:6f:f2:3d:62:40:5b:ac:46:56:f7:c0:c9:d2: 1d:dd:a0:3e:eb:ee:b1:25:a3:4c:68:66:3d:fe:6e:ad: 3d:d0:12:48:ba:fd:45:14:99:20:58:c8:8a:ec:70:20: af:4d:4e:db:27:81:57:81:61:b0:11:85:7e:a6:28:37: 92:7b:2b:51:c6:eb:30:ec:ae:e8:9a:d3:89:ef:b6:47: 4d:0b:32:a7:32:56:23:18:be:47:bb:44:90:02:0d:2f: 3e:5b:2d:76:c6:f8:ba:f1:94:dc:66:11:f8:7e:b6:fc: d2:19:ce:20:10:c9:22:b2:db:72:53:e9:32:0c:62:9c: 38:2d:13:cb:fc:bf:f0:3a:7e:2a:b0:81:69:7b:53:73: 1e:8a:62:1e:3d:eb:61:37:01:46:97:b9:8c:a5:5d:bb: b3:fa:23:54:48:ec:18:4f:59:5d:63:e2:8c:45:81:c9: 5c:f6:b3:2f:df:d4:80:05:cd:4a:b1:23:7b:f7:61:c5: 76:be:8d:20:cf:31:2e:7e:6c:73:73:df:bb:cf:f4:01: 31:c9:36:74:81:b7:4a:78:fe:a1:eb:d7:e9:02:3a:5c: 20:03:eb:3b:47:32:2a:31:c3:36:3d:c0:4d:02:f4:ab: 62:fd:69:6a:d2:08:34:ed:01:eb:68:89:af:ab:9e:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:44:19:89:ad:a0:9e:ba:1d:30:fc:01:75:84:1f:a3: 6c:e5:76:54:e9:73:66:4b:19:fe:09:28:58:0a:e5:fc: 9a:c6:80:cb:47:19:bd:52:43:b9:6a:cd:f0:aa:21:1e: 4a:39:61:68:a8:67:e8:2f:1b:b6:9b:a7:10:5f:30:62: 39:a8:e6:d8:06:c3:15:5e:18:3f:52:a1:3c:25:39:9e: c7:56:50:13:d2:44:27:96:d1:02:e6:90:78:e7:fd:e7: b4:e4:e7:ac:15:0d:8d:76:2c:be:24:90:7b:14:39:9e: c7:a5:24:63:22:df:0c:eb:88:c0:e5:37:b6:8b:e1:65: 95:38:c8:d5:b7:82:8b:b1:75:8e:c9:68:6a:ac:ad:30: b1:37:3d:82:e6:8e:39:1f:e8:1a:61:10:1d:21:ac:2e: 5e:98:d6:a4:67:6a:ae:7c:07:ea:61:d2:88:90:c5:3b: 67:ee:d6:65:81:3f:1b:c9:07:c0:50:b1:20:10:b8:c9: b8:8a:71:9f:82:f5:57:b9:9a:fb:1c:b1:dd:8f:a2:f1: d6:76:2c:d1:c9:86:e1:6f:b3:7c:23:70:27:f8:37:4a: a1:4f:a1:1c:8e:99:2a:31:e3:42:e3:4a:2c:4c:d2:87: 3b:41:44:73:e8:5d:fb:ae:b1:3a:cf:f6:75:0c:7f:81 Fingerprint (SHA-256): F1:C1:85:CE:39:80:B1:1F:78:2F:0B:C9:ED:2A:86:BD:34:AB:7C:59:04:FE:09:61:63:C8:BE:A0:93:F0:17:83 Fingerprint (SHA1): E9:EB:C8:DC:C1:2A:98:EF:38:93:E0:2A:BC:BE:19:37:FB:65:7C:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194367 (0x433ee13f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:17 2025 Not After : Thu Nov 28 11:44:17 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:61:e8:6f:f2:3d:62:40:5b:ac:46:56:f7:c0:c9:d2: 1d:dd:a0:3e:eb:ee:b1:25:a3:4c:68:66:3d:fe:6e:ad: 3d:d0:12:48:ba:fd:45:14:99:20:58:c8:8a:ec:70:20: af:4d:4e:db:27:81:57:81:61:b0:11:85:7e:a6:28:37: 92:7b:2b:51:c6:eb:30:ec:ae:e8:9a:d3:89:ef:b6:47: 4d:0b:32:a7:32:56:23:18:be:47:bb:44:90:02:0d:2f: 3e:5b:2d:76:c6:f8:ba:f1:94:dc:66:11:f8:7e:b6:fc: d2:19:ce:20:10:c9:22:b2:db:72:53:e9:32:0c:62:9c: 38:2d:13:cb:fc:bf:f0:3a:7e:2a:b0:81:69:7b:53:73: 1e:8a:62:1e:3d:eb:61:37:01:46:97:b9:8c:a5:5d:bb: b3:fa:23:54:48:ec:18:4f:59:5d:63:e2:8c:45:81:c9: 5c:f6:b3:2f:df:d4:80:05:cd:4a:b1:23:7b:f7:61:c5: 76:be:8d:20:cf:31:2e:7e:6c:73:73:df:bb:cf:f4:01: 31:c9:36:74:81:b7:4a:78:fe:a1:eb:d7:e9:02:3a:5c: 20:03:eb:3b:47:32:2a:31:c3:36:3d:c0:4d:02:f4:ab: 62:fd:69:6a:d2:08:34:ed:01:eb:68:89:af:ab:9e:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:44:19:89:ad:a0:9e:ba:1d:30:fc:01:75:84:1f:a3: 6c:e5:76:54:e9:73:66:4b:19:fe:09:28:58:0a:e5:fc: 9a:c6:80:cb:47:19:bd:52:43:b9:6a:cd:f0:aa:21:1e: 4a:39:61:68:a8:67:e8:2f:1b:b6:9b:a7:10:5f:30:62: 39:a8:e6:d8:06:c3:15:5e:18:3f:52:a1:3c:25:39:9e: c7:56:50:13:d2:44:27:96:d1:02:e6:90:78:e7:fd:e7: b4:e4:e7:ac:15:0d:8d:76:2c:be:24:90:7b:14:39:9e: c7:a5:24:63:22:df:0c:eb:88:c0:e5:37:b6:8b:e1:65: 95:38:c8:d5:b7:82:8b:b1:75:8e:c9:68:6a:ac:ad:30: b1:37:3d:82:e6:8e:39:1f:e8:1a:61:10:1d:21:ac:2e: 5e:98:d6:a4:67:6a:ae:7c:07:ea:61:d2:88:90:c5:3b: 67:ee:d6:65:81:3f:1b:c9:07:c0:50:b1:20:10:b8:c9: b8:8a:71:9f:82:f5:57:b9:9a:fb:1c:b1:dd:8f:a2:f1: d6:76:2c:d1:c9:86:e1:6f:b3:7c:23:70:27:f8:37:4a: a1:4f:a1:1c:8e:99:2a:31:e3:42:e3:4a:2c:4c:d2:87: 3b:41:44:73:e8:5d:fb:ae:b1:3a:cf:f6:75:0c:7f:81 Fingerprint (SHA-256): F1:C1:85:CE:39:80:B1:1F:78:2F:0B:C9:ED:2A:86:BD:34:AB:7C:59:04:FE:09:61:63:C8:BE:A0:93:F0:17:83 Fingerprint (SHA1): E9:EB:C8:DC:C1:2A:98:EF:38:93:E0:2A:BC:BE:19:37:FB:65:7C:6E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194368 (0x433ee140) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:da:1b:23:3f:58:6c:c3:90:05:72:49:25:d1:b4:53: 9e:d5:1d:21:e6:1b:19:55:a0:1c:5b:48:89:d3:96:51: 0e:4d:8e:4c:24:41:bf:b8:82:26:c1:af:5a:f4:6f:04: bf:93:e0:75:f4:41:3a:b2:27:1d:51:cc:51:59:fb:34: ee:0a:6e:a3:cf:93:1b:58:cc:75:98:3c:c7:1e:a0:23: 98:1c:51:ad:61:74:d0:fa:02:f8:30:6f:3b:0e:ee:76: 24:52:0c:f4:5d:18:b1:9e:aa:59:66:33:ad:03:a5:c7: d3:37:b3:1b:d8:53:d9:0c:93:85:f6:13:14:37:c2:8b: 69:fa:dc:9e:bc:cd:a1:f9:b3:94:d9:06:ef:44:80:e6: 36:06:2c:15:fc:5f:54:1b:1f:56:21:86:c4:8b:da:dc: 12:7c:55:b2:16:30:49:00:dd:30:c0:0c:d5:e5:38:57: 0b:63:04:b2:53:08:fc:9c:3a:02:1c:ef:7c:b6:97:46: 2a:65:ed:d3:8b:f5:dc:f4:be:49:db:eb:b7:a7:90:6b: 30:37:3e:cb:8f:26:de:04:a7:ee:ad:92:6f:60:ec:30: 69:7e:9e:f8:fd:ed:96:da:9c:27:85:5e:f5:0c:96:9a: 67:71:74:e6:16:89:ab:9f:1e:1d:ff:f4:3e:aa:b2:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:fd:7f:57:87:90:3e:cb:6c:6c:77:f0:5d:40:dc:be: 6d:b1:dc:6e:58:4e:2b:db:58:68:59:53:a8:b2:8d:97: 7d:b6:61:df:b7:3a:d7:16:28:d5:37:d2:9a:54:5d:a6: 02:b0:04:c9:a6:7c:47:aa:1b:fb:0d:14:9a:2f:59:27: 38:ae:c9:f4:98:29:84:a8:bd:ec:a3:8e:6b:6d:89:73: c3:29:3b:23:99:00:8c:87:14:91:e8:01:9c:29:70:d5: ae:64:ff:c5:26:16:b1:cc:83:17:4f:4e:19:14:16:c3: fc:bc:a1:df:fb:7f:71:d6:ce:b8:f9:7c:a0:9e:90:a9: b7:52:65:3d:cf:e5:d2:77:c2:75:b5:18:04:69:5b:ac: a1:16:a3:aa:17:f6:5e:aa:ed:2f:13:a8:21:1d:68:06: 42:90:d2:b7:64:8b:c6:b3:25:c0:c7:65:d0:e7:db:03: 5c:8b:97:12:e8:46:16:df:ff:bb:e8:4b:63:6b:c1:ac: 54:ec:da:c3:27:55:2a:79:c1:0f:98:d0:5d:0b:fd:b1: 3e:69:d8:32:97:a5:ae:ae:e1:a5:f5:1d:fe:e3:0b:a1: b5:a6:4d:77:e9:e0:e1:d8:8a:ba:3f:36:0a:8e:57:b8: 33:ec:d3:fa:13:3b:4a:f7:1b:aa:f2:a8:54:79:ab:94 Fingerprint (SHA-256): 72:D3:45:98:45:AF:7B:17:99:21:AD:8E:F3:B1:71:87:79:9B:1F:1D:06:EA:AD:B9:80:C8:65:CD:56:22:7D:DA Fingerprint (SHA1): D5:C4:A0:55:DA:38:3D:07:66:E3:4E:29:EB:27:8D:FD:79:81:F0:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194368 (0x433ee140) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:da:1b:23:3f:58:6c:c3:90:05:72:49:25:d1:b4:53: 9e:d5:1d:21:e6:1b:19:55:a0:1c:5b:48:89:d3:96:51: 0e:4d:8e:4c:24:41:bf:b8:82:26:c1:af:5a:f4:6f:04: bf:93:e0:75:f4:41:3a:b2:27:1d:51:cc:51:59:fb:34: ee:0a:6e:a3:cf:93:1b:58:cc:75:98:3c:c7:1e:a0:23: 98:1c:51:ad:61:74:d0:fa:02:f8:30:6f:3b:0e:ee:76: 24:52:0c:f4:5d:18:b1:9e:aa:59:66:33:ad:03:a5:c7: d3:37:b3:1b:d8:53:d9:0c:93:85:f6:13:14:37:c2:8b: 69:fa:dc:9e:bc:cd:a1:f9:b3:94:d9:06:ef:44:80:e6: 36:06:2c:15:fc:5f:54:1b:1f:56:21:86:c4:8b:da:dc: 12:7c:55:b2:16:30:49:00:dd:30:c0:0c:d5:e5:38:57: 0b:63:04:b2:53:08:fc:9c:3a:02:1c:ef:7c:b6:97:46: 2a:65:ed:d3:8b:f5:dc:f4:be:49:db:eb:b7:a7:90:6b: 30:37:3e:cb:8f:26:de:04:a7:ee:ad:92:6f:60:ec:30: 69:7e:9e:f8:fd:ed:96:da:9c:27:85:5e:f5:0c:96:9a: 67:71:74:e6:16:89:ab:9f:1e:1d:ff:f4:3e:aa:b2:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:fd:7f:57:87:90:3e:cb:6c:6c:77:f0:5d:40:dc:be: 6d:b1:dc:6e:58:4e:2b:db:58:68:59:53:a8:b2:8d:97: 7d:b6:61:df:b7:3a:d7:16:28:d5:37:d2:9a:54:5d:a6: 02:b0:04:c9:a6:7c:47:aa:1b:fb:0d:14:9a:2f:59:27: 38:ae:c9:f4:98:29:84:a8:bd:ec:a3:8e:6b:6d:89:73: c3:29:3b:23:99:00:8c:87:14:91:e8:01:9c:29:70:d5: ae:64:ff:c5:26:16:b1:cc:83:17:4f:4e:19:14:16:c3: fc:bc:a1:df:fb:7f:71:d6:ce:b8:f9:7c:a0:9e:90:a9: b7:52:65:3d:cf:e5:d2:77:c2:75:b5:18:04:69:5b:ac: a1:16:a3:aa:17:f6:5e:aa:ed:2f:13:a8:21:1d:68:06: 42:90:d2:b7:64:8b:c6:b3:25:c0:c7:65:d0:e7:db:03: 5c:8b:97:12:e8:46:16:df:ff:bb:e8:4b:63:6b:c1:ac: 54:ec:da:c3:27:55:2a:79:c1:0f:98:d0:5d:0b:fd:b1: 3e:69:d8:32:97:a5:ae:ae:e1:a5:f5:1d:fe:e3:0b:a1: b5:a6:4d:77:e9:e0:e1:d8:8a:ba:3f:36:0a:8e:57:b8: 33:ec:d3:fa:13:3b:4a:f7:1b:aa:f2:a8:54:79:ab:94 Fingerprint (SHA-256): 72:D3:45:98:45:AF:7B:17:99:21:AD:8E:F3:B1:71:87:79:9B:1F:1D:06:EA:AD:B9:80:C8:65:CD:56:22:7D:DA Fingerprint (SHA1): D5:C4:A0:55:DA:38:3D:07:66:E3:4E:29:EB:27:8D:FD:79:81:F0:CA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194369 (0x433ee141) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:30:5f:54:ec:8f:15:d6:af:22:91:f2:63:f9:6a:a2: c8:9a:a5:b4:b9:98:e7:59:3f:eb:2d:4e:17:98:24:f3: 7d:c0:77:46:0a:47:03:27:bb:3a:60:34:e1:e5:4e:41: ce:a3:db:9d:c0:2e:31:c0:10:b3:47:a8:93:74:ba:16: 63:c1:14:d6:48:3e:91:07:5a:92:15:bc:32:35:76:f2: c8:dd:1f:69:30:10:69:11:bb:d8:f0:0d:27:02:3a:b0: 68:d0:f4:d2:26:e4:ca:76:25:da:03:44:56:33:23:4a: 9f:87:3a:bb:07:81:12:65:4c:22:5f:8f:2f:c9:57:3b: 7b:01:e7:f6:1f:b6:03:5e:cb:c9:81:ef:e0:9f:f9:c8: 92:b7:88:e7:89:04:38:7e:6b:a5:ec:8b:a5:5d:53:e9: f6:43:8e:24:19:33:8f:ed:f6:b8:f7:ce:91:49:96:bc: de:9d:da:b4:23:83:d0:73:91:6a:4f:d5:1f:82:40:b7: cf:7d:36:54:94:20:a3:19:f7:bc:ef:b7:06:5f:ce:ab: 81:6c:90:b5:4d:97:5b:d5:0f:d2:86:6c:b7:aa:ff:51: fe:6a:c8:b4:49:8f:be:1d:1b:a7:4a:63:a5:3a:54:78: 94:5f:fa:75:fb:9d:b0:48:68:a4:99:18:c1:c4:ff:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:80:c6:d0:d9:53:96:1c:f7:f9:1d:ae:4d:87:5e:d3: a6:73:6f:07:49:0e:a8:91:46:e9:f4:50:d4:2b:38:1f: ba:1e:59:0e:14:1c:2b:26:b3:f7:74:94:d3:3a:cf:04: 80:f4:90:df:a1:9e:68:60:a0:01:ef:8d:cd:b3:8f:81: c4:bc:9b:aa:e7:71:2c:ae:f1:a2:b8:88:af:88:81:9d: cd:3b:ec:a0:13:bd:a9:99:89:35:0b:ed:44:be:85:c6: 19:c0:7a:04:78:10:12:9d:b5:77:f5:e6:40:52:fe:d7: 62:2f:f6:8c:80:a0:f1:2d:95:61:e3:c2:61:69:2c:a3: 3c:66:34:e6:58:47:31:6a:e7:62:23:a6:52:77:f6:29: d3:8a:29:d5:76:ae:32:0a:89:02:c2:15:59:d8:bd:41: 4e:28:12:dc:11:b1:3f:63:7f:e3:ff:0c:9e:3a:a1:fe: 07:1e:f6:40:ba:69:d6:a9:27:66:d6:bf:fc:e9:c8:b7: 9e:ea:99:16:7d:a0:7c:49:6d:bc:75:f4:4e:05:79:35: 6b:d5:48:33:25:b4:f3:02:bd:b2:90:ed:76:fe:c9:66: 49:5a:24:a3:06:0a:df:4e:b0:4d:08:c9:11:12:d0:93: c1:bb:bb:bb:cf:05:96:fa:37:62:77:54:4a:5e:6a:6f Fingerprint (SHA-256): 36:FA:BF:8B:6C:8E:93:44:34:47:C8:6F:C7:A2:4C:D9:80:00:5A:F5:2F:90:B5:61:07:8A:E0:5F:3E:FF:BA:15 Fingerprint (SHA1): B4:E1:E3:ED:2D:0C:CC:F9:7A:60:B3:C7:D2:BF:D8:61:D3:BF:CE:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194369 (0x433ee141) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:18 2025 Not After : Thu Nov 28 11:44:18 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:30:5f:54:ec:8f:15:d6:af:22:91:f2:63:f9:6a:a2: c8:9a:a5:b4:b9:98:e7:59:3f:eb:2d:4e:17:98:24:f3: 7d:c0:77:46:0a:47:03:27:bb:3a:60:34:e1:e5:4e:41: ce:a3:db:9d:c0:2e:31:c0:10:b3:47:a8:93:74:ba:16: 63:c1:14:d6:48:3e:91:07:5a:92:15:bc:32:35:76:f2: c8:dd:1f:69:30:10:69:11:bb:d8:f0:0d:27:02:3a:b0: 68:d0:f4:d2:26:e4:ca:76:25:da:03:44:56:33:23:4a: 9f:87:3a:bb:07:81:12:65:4c:22:5f:8f:2f:c9:57:3b: 7b:01:e7:f6:1f:b6:03:5e:cb:c9:81:ef:e0:9f:f9:c8: 92:b7:88:e7:89:04:38:7e:6b:a5:ec:8b:a5:5d:53:e9: f6:43:8e:24:19:33:8f:ed:f6:b8:f7:ce:91:49:96:bc: de:9d:da:b4:23:83:d0:73:91:6a:4f:d5:1f:82:40:b7: cf:7d:36:54:94:20:a3:19:f7:bc:ef:b7:06:5f:ce:ab: 81:6c:90:b5:4d:97:5b:d5:0f:d2:86:6c:b7:aa:ff:51: fe:6a:c8:b4:49:8f:be:1d:1b:a7:4a:63:a5:3a:54:78: 94:5f:fa:75:fb:9d:b0:48:68:a4:99:18:c1:c4:ff:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:80:c6:d0:d9:53:96:1c:f7:f9:1d:ae:4d:87:5e:d3: a6:73:6f:07:49:0e:a8:91:46:e9:f4:50:d4:2b:38:1f: ba:1e:59:0e:14:1c:2b:26:b3:f7:74:94:d3:3a:cf:04: 80:f4:90:df:a1:9e:68:60:a0:01:ef:8d:cd:b3:8f:81: c4:bc:9b:aa:e7:71:2c:ae:f1:a2:b8:88:af:88:81:9d: cd:3b:ec:a0:13:bd:a9:99:89:35:0b:ed:44:be:85:c6: 19:c0:7a:04:78:10:12:9d:b5:77:f5:e6:40:52:fe:d7: 62:2f:f6:8c:80:a0:f1:2d:95:61:e3:c2:61:69:2c:a3: 3c:66:34:e6:58:47:31:6a:e7:62:23:a6:52:77:f6:29: d3:8a:29:d5:76:ae:32:0a:89:02:c2:15:59:d8:bd:41: 4e:28:12:dc:11:b1:3f:63:7f:e3:ff:0c:9e:3a:a1:fe: 07:1e:f6:40:ba:69:d6:a9:27:66:d6:bf:fc:e9:c8:b7: 9e:ea:99:16:7d:a0:7c:49:6d:bc:75:f4:4e:05:79:35: 6b:d5:48:33:25:b4:f3:02:bd:b2:90:ed:76:fe:c9:66: 49:5a:24:a3:06:0a:df:4e:b0:4d:08:c9:11:12:d0:93: c1:bb:bb:bb:cf:05:96:fa:37:62:77:54:4a:5e:6a:6f Fingerprint (SHA-256): 36:FA:BF:8B:6C:8E:93:44:34:47:C8:6F:C7:A2:4C:D9:80:00:5A:F5:2F:90:B5:61:07:8A:E0:5F:3E:FF:BA:15 Fingerprint (SHA1): B4:E1:E3:ED:2D:0C:CC:F9:7A:60:B3:C7:D2:BF:D8:61:D3:BF:CE:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194372 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194373 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194374 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128194375 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194376 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194377 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128194378 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194372 (0x433ee144) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:22 2025 Not After : Thu Nov 28 11:44:22 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:79:9c:42:77:d7:44:c8:24:d8:86:4d:ba:88:84:6b: e3:e0:2c:15:91:59:42:76:fb:ca:00:c2:00:00:85:72: 22:7e:07:10:27:3f:9d:ee:a3:97:29:fa:ab:57:07:f9: b3:b7:54:70:a0:8b:f8:bc:88:1e:b4:0d:19:b2:a6:04: 9d:ca:8b:29:9a:48:fb:53:e7:99:e3:3a:49:38:e1:87: 30:ce:53:8c:47:b7:df:60:d2:95:77:52:56:8b:ed:7b: a3:cd:f7:d1:d8:f6:0e:d4:e1:80:ab:19:5d:45:07:90: fc:8d:80:5b:6b:31:d3:55:e2:98:28:a9:99:cb:16:aa: af:19:f1:3f:54:1f:d8:f2:2e:a5:95:9e:03:3b:66:4a: 2c:83:da:2a:c9:67:10:73:da:8d:d6:8e:51:7a:9b:38: 94:51:68:bb:00:3c:70:36:80:50:89:b0:0e:17:50:b7: c2:15:b1:c2:c0:c2:57:4e:e2:5b:41:3e:5d:4e:37:63: eb:a1:e4:05:31:93:c7:c2:b3:54:ac:b1:78:4f:cb:c9: bb:02:9b:0e:14:31:9c:dd:dd:d0:dc:a6:62:fc:56:56: 7d:6e:de:5a:da:c2:58:70:99:90:15:d0:29:7f:f6:91: 27:81:ca:dd:ec:db:d8:5b:f1:2c:f9:d1:40:1c:ed:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:ab:dc:5d:51:3f:d7:d4:2d:42:95:15:da:43:01:e0: bb:00:eb:57:2c:ef:ee:f4:43:23:e8:91:ea:79:6f:58: ae:0c:5e:ab:09:54:10:a7:1e:eb:ef:38:a6:54:fd:80: a6:84:ca:8e:78:dc:a6:91:dd:0c:e2:fc:06:57:75:ae: bb:96:6b:68:43:96:a2:00:d1:63:44:10:33:76:1d:9a: c9:5c:36:b1:d7:7f:33:a4:88:9b:c7:0a:75:e2:c2:ad: 25:19:e9:2b:20:fb:0d:e8:08:01:d5:f9:90:08:17:77: fd:b7:74:fa:c2:d2:5a:e4:8f:61:72:63:5d:14:bb:ea: 3c:8a:6b:ae:8f:7e:4a:85:30:e2:9d:de:1b:df:26:c3: 97:0f:4f:d3:f1:39:bf:f6:78:2e:8e:21:7e:71:50:0c: 92:fe:4b:ff:ce:c7:0f:8e:86:c6:70:b3:6f:f3:4b:20: ba:2e:8d:15:b8:66:e7:a2:c2:68:8c:e3:af:3f:77:f1: 99:dd:5c:74:9c:5a:a1:f7:01:1c:d6:9b:dc:52:fa:b0: f9:39:ab:4b:df:2f:c0:3c:ff:cf:e4:4c:dd:45:7c:ff: 5f:62:57:c2:0e:7b:36:28:29:a7:94:98:16:42:2d:7c: c3:7f:6e:af:c5:fd:20:c9:35:a3:9b:8e:f4:22:c1:d6 Fingerprint (SHA-256): CC:E0:46:4F:94:0B:86:58:7B:C9:CD:79:84:18:F9:BB:9B:43:4A:C0:71:46:FD:D5:A7:95:64:64:FD:2C:A7:07 Fingerprint (SHA1): E8:57:B3:B6:76:CE:8D:96:93:A1:53:AF:72:B4:9C:58:63:1F:35:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194372 (0x433ee144) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:22 2025 Not After : Thu Nov 28 11:44:22 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:79:9c:42:77:d7:44:c8:24:d8:86:4d:ba:88:84:6b: e3:e0:2c:15:91:59:42:76:fb:ca:00:c2:00:00:85:72: 22:7e:07:10:27:3f:9d:ee:a3:97:29:fa:ab:57:07:f9: b3:b7:54:70:a0:8b:f8:bc:88:1e:b4:0d:19:b2:a6:04: 9d:ca:8b:29:9a:48:fb:53:e7:99:e3:3a:49:38:e1:87: 30:ce:53:8c:47:b7:df:60:d2:95:77:52:56:8b:ed:7b: a3:cd:f7:d1:d8:f6:0e:d4:e1:80:ab:19:5d:45:07:90: fc:8d:80:5b:6b:31:d3:55:e2:98:28:a9:99:cb:16:aa: af:19:f1:3f:54:1f:d8:f2:2e:a5:95:9e:03:3b:66:4a: 2c:83:da:2a:c9:67:10:73:da:8d:d6:8e:51:7a:9b:38: 94:51:68:bb:00:3c:70:36:80:50:89:b0:0e:17:50:b7: c2:15:b1:c2:c0:c2:57:4e:e2:5b:41:3e:5d:4e:37:63: eb:a1:e4:05:31:93:c7:c2:b3:54:ac:b1:78:4f:cb:c9: bb:02:9b:0e:14:31:9c:dd:dd:d0:dc:a6:62:fc:56:56: 7d:6e:de:5a:da:c2:58:70:99:90:15:d0:29:7f:f6:91: 27:81:ca:dd:ec:db:d8:5b:f1:2c:f9:d1:40:1c:ed:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:ab:dc:5d:51:3f:d7:d4:2d:42:95:15:da:43:01:e0: bb:00:eb:57:2c:ef:ee:f4:43:23:e8:91:ea:79:6f:58: ae:0c:5e:ab:09:54:10:a7:1e:eb:ef:38:a6:54:fd:80: a6:84:ca:8e:78:dc:a6:91:dd:0c:e2:fc:06:57:75:ae: bb:96:6b:68:43:96:a2:00:d1:63:44:10:33:76:1d:9a: c9:5c:36:b1:d7:7f:33:a4:88:9b:c7:0a:75:e2:c2:ad: 25:19:e9:2b:20:fb:0d:e8:08:01:d5:f9:90:08:17:77: fd:b7:74:fa:c2:d2:5a:e4:8f:61:72:63:5d:14:bb:ea: 3c:8a:6b:ae:8f:7e:4a:85:30:e2:9d:de:1b:df:26:c3: 97:0f:4f:d3:f1:39:bf:f6:78:2e:8e:21:7e:71:50:0c: 92:fe:4b:ff:ce:c7:0f:8e:86:c6:70:b3:6f:f3:4b:20: ba:2e:8d:15:b8:66:e7:a2:c2:68:8c:e3:af:3f:77:f1: 99:dd:5c:74:9c:5a:a1:f7:01:1c:d6:9b:dc:52:fa:b0: f9:39:ab:4b:df:2f:c0:3c:ff:cf:e4:4c:dd:45:7c:ff: 5f:62:57:c2:0e:7b:36:28:29:a7:94:98:16:42:2d:7c: c3:7f:6e:af:c5:fd:20:c9:35:a3:9b:8e:f4:22:c1:d6 Fingerprint (SHA-256): CC:E0:46:4F:94:0B:86:58:7B:C9:CD:79:84:18:F9:BB:9B:43:4A:C0:71:46:FD:D5:A7:95:64:64:FD:2C:A7:07 Fingerprint (SHA1): E8:57:B3:B6:76:CE:8D:96:93:A1:53:AF:72:B4:9C:58:63:1F:35:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194379 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194380 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128194381 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128194382 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128194383 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128194384 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128194385 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128194386 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128194387 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128194388 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128194389 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128194390 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128194391 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128194392 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128194393 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128194394 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128194395 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128194396 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128194397 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128194398 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128194399 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128194400 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128194401 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128194402 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128194403 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128194404 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128194405 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128194406 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128194407 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128194408 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194379 (0x433ee14b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:44:28 2025 Not After : Thu Nov 28 11:44:28 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:9c:33:29:e2:24:f5:5f:17:cc:42:32:33:d1:3e:e2: 7c:50:05:cc:36:8f:09:b0:7b:54:53:b0:80:f2:2d:45: 1f:47:18:56:34:c7:10:6f:3c:b4:0a:dc:df:c7:5a:25: 12:83:37:ef:50:08:eb:04:b2:02:c1:6d:d0:62:36:e8: b6:53:fe:7c:b7:df:f7:5c:cd:8e:15:63:37:00:c5:ed: d9:c4:bd:e2:31:b5:bf:7d:02:66:69:af:f8:df:9c:11: 76:1a:b9:67:b3:67:91:6f:6c:6e:a4:2f:90:f5:31:ea: 32:95:54:15:b4:40:bb:8b:c4:6b:36:83:0e:b9:3c:e6: bd:1e:ba:c3:36:06:80:32:a7:3f:ee:c6:68:49:2e:69: 85:a2:4d:a7:bc:db:e6:43:45:61:29:64:2f:d0:30:99: 07:8e:df:76:a6:86:14:b0:07:f5:ee:72:22:74:07:32: 5c:94:7b:c6:10:25:f7:ce:d2:5e:87:18:7e:97:02:ad: ee:1c:98:d4:65:7b:10:c0:71:b6:d8:92:e9:1b:5a:9d: bd:15:f3:7b:67:97:0a:77:48:fc:20:6f:64:a9:de:93: 63:8b:ed:e3:f9:6f:7d:3a:1d:2f:24:21:73:f3:2f:f6: b4:85:0a:32:53:95:ed:d5:bb:2f:9a:14:6b:9f:e3:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6c:6f:39:1f:2c:7f:75:1d:00:34:10:4d:b9:9e:e4: 5d:3a:c0:b7:b3:ec:77:cc:e1:a3:e1:78:62:14:22:df: fc:45:71:a8:da:ea:4c:86:57:9d:55:28:55:6c:fb:45: 7a:66:3f:3a:b9:7e:3a:86:75:93:94:88:9a:ec:8c:2a: 3d:90:51:ab:1b:24:e5:ea:41:10:1d:e9:3a:4a:3f:e7: 95:fc:67:ec:af:6e:89:56:47:33:35:74:fc:2e:28:0f: 06:f5:bd:15:fe:84:7f:53:18:a4:e2:d9:75:51:7f:c4: ba:58:17:53:2c:ce:00:3f:e6:f7:9c:8c:84:ef:ba:4c: 69:27:4d:34:ee:6d:3b:ad:c0:9b:3a:6b:ff:43:7e:4f: 6a:bb:e9:5a:7c:8d:af:dc:72:13:13:c4:96:76:82:ab: d6:56:97:e6:7a:5f:b7:ca:88:51:68:6c:85:14:52:96: 2e:f4:a0:b8:4f:32:33:8d:a9:d5:8a:4a:ab:f9:a1:91: 3a:4c:82:a1:a4:2b:5a:94:46:60:27:bc:dd:80:73:63: 57:83:7c:44:75:e7:86:e5:31:4b:f6:be:94:94:37:20: 04:80:5e:43:89:6b:9d:37:79:1b:bc:ca:bc:31:58:bf: 77:ee:d8:2f:88:56:fe:48:4b:6f:67:59:29:5b:9d:c0 Fingerprint (SHA-256): 58:00:31:99:96:0B:92:38:0F:E6:98:F6:34:DC:BE:E0:E5:A4:1C:C8:31:E3:BE:23:A4:34:03:AE:A8:33:53:72 Fingerprint (SHA1): 2E:AF:E2:27:75:07:64:6C:C7:E2:9C:AC:AB:C0:CE:58:1F:80:F2:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194409 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128194410 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128194411 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128194412 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128194413 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128194414 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128194415 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194409 (0x433ee169) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:52 2025 Not After : Thu Nov 28 11:44:52 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:d6:af:6c:8e:2a:1b:5b:46:d5:bc:1c:ce:69:f5:a0: 73:1a:07:ca:f1:9a:e2:ec:14:a5:6d:86:31:e7:38:79: 09:30:06:fb:d5:38:ae:c4:83:32:78:34:ec:1b:c5:da: 21:44:02:9e:4c:63:b5:b0:9c:ef:58:12:66:05:66:d4: 7c:ee:4c:17:18:35:27:f8:93:7c:bd:61:67:37:3b:46: 90:cf:94:b0:74:48:c9:d7:d7:08:d1:cd:c0:43:e0:b7: 97:92:9d:0c:08:a5:53:48:39:3d:0e:62:17:1c:4f:d9: e1:e7:90:64:2b:bd:04:34:33:97:17:50:01:2c:d3:73: 80:49:db:be:96:a8:b1:13:34:b0:02:5f:5f:00:a3:fb: d5:07:6b:73:b6:f3:78:b3:2f:12:9d:6a:76:7a:2c:c7: a8:7f:0c:c1:de:f8:57:19:ab:57:a2:d6:20:5a:1e:9f: 16:bc:fd:ae:a5:d5:14:e1:66:28:f9:f4:e5:53:e8:33: 99:dd:18:53:3e:24:e1:e2:40:01:6b:90:34:cc:3f:7f: 13:a7:32:b7:a9:19:a2:81:fe:1b:f4:57:69:70:2b:42: 37:a0:e7:c1:bb:20:71:fb:d5:c3:b3:14:ea:21:bb:28: e9:8f:66:8c:78:65:6d:94:18:e7:45:3b:b1:31:96:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:22:36:6b:ae:7f:99:30:5b:79:1f:dc:5d:90:07:31: 7f:2b:83:ae:c8:6d:3f:c2:c6:23:f5:af:70:7e:09:ac: 85:f0:53:98:f8:09:95:4c:82:3c:f0:1b:75:08:cb:43: 84:43:e1:0d:21:0b:8a:9d:25:cc:8f:75:1a:29:1a:e4: 6f:23:cc:e2:f5:1f:6e:4e:03:50:c8:8e:ea:80:cc:7d: 08:12:14:ae:ca:3a:78:23:b9:49:41:b1:37:83:64:58: 49:b2:63:a0:d5:0a:f6:14:bf:70:3d:0d:67:fc:55:c7: 17:b1:1b:3e:f9:d3:cf:ca:50:a4:1a:c5:aa:87:35:2a: f8:2b:4a:33:09:67:85:be:5c:00:22:a8:bb:df:37:3f: 5c:c3:58:be:52:44:91:5d:4b:05:53:52:c4:4f:53:a5: e0:0d:e7:f1:59:99:6f:86:01:ed:87:56:54:93:7f:96: 60:17:cb:52:b2:d1:e6:50:33:c5:c4:95:ed:7c:96:11: b3:44:bc:6b:7c:a8:4a:13:96:6c:c7:d2:ce:9e:95:1f: a9:98:ae:0b:bf:cd:8b:aa:b4:e6:74:2b:2c:73:9e:84: 74:06:c5:0c:6d:b3:40:61:ce:7c:79:aa:73:fc:38:e9: 94:b3:80:a2:bb:4a:b6:f7:a3:eb:71:05:2b:7d:89:64 Fingerprint (SHA-256): D1:43:E0:CD:76:17:AE:39:81:05:D9:A7:2D:7C:2F:5F:59:63:92:3B:95:0A:B6:FE:20:CA:E6:8B:22:B7:54:82 Fingerprint (SHA1): 8E:65:87:52:B9:48:DF:C7:09:D4:01:29:94:D2:3A:A3:1F:27:BE:5D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194409 (0x433ee169) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:52 2025 Not After : Thu Nov 28 11:44:52 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:d6:af:6c:8e:2a:1b:5b:46:d5:bc:1c:ce:69:f5:a0: 73:1a:07:ca:f1:9a:e2:ec:14:a5:6d:86:31:e7:38:79: 09:30:06:fb:d5:38:ae:c4:83:32:78:34:ec:1b:c5:da: 21:44:02:9e:4c:63:b5:b0:9c:ef:58:12:66:05:66:d4: 7c:ee:4c:17:18:35:27:f8:93:7c:bd:61:67:37:3b:46: 90:cf:94:b0:74:48:c9:d7:d7:08:d1:cd:c0:43:e0:b7: 97:92:9d:0c:08:a5:53:48:39:3d:0e:62:17:1c:4f:d9: e1:e7:90:64:2b:bd:04:34:33:97:17:50:01:2c:d3:73: 80:49:db:be:96:a8:b1:13:34:b0:02:5f:5f:00:a3:fb: d5:07:6b:73:b6:f3:78:b3:2f:12:9d:6a:76:7a:2c:c7: a8:7f:0c:c1:de:f8:57:19:ab:57:a2:d6:20:5a:1e:9f: 16:bc:fd:ae:a5:d5:14:e1:66:28:f9:f4:e5:53:e8:33: 99:dd:18:53:3e:24:e1:e2:40:01:6b:90:34:cc:3f:7f: 13:a7:32:b7:a9:19:a2:81:fe:1b:f4:57:69:70:2b:42: 37:a0:e7:c1:bb:20:71:fb:d5:c3:b3:14:ea:21:bb:28: e9:8f:66:8c:78:65:6d:94:18:e7:45:3b:b1:31:96:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:22:36:6b:ae:7f:99:30:5b:79:1f:dc:5d:90:07:31: 7f:2b:83:ae:c8:6d:3f:c2:c6:23:f5:af:70:7e:09:ac: 85:f0:53:98:f8:09:95:4c:82:3c:f0:1b:75:08:cb:43: 84:43:e1:0d:21:0b:8a:9d:25:cc:8f:75:1a:29:1a:e4: 6f:23:cc:e2:f5:1f:6e:4e:03:50:c8:8e:ea:80:cc:7d: 08:12:14:ae:ca:3a:78:23:b9:49:41:b1:37:83:64:58: 49:b2:63:a0:d5:0a:f6:14:bf:70:3d:0d:67:fc:55:c7: 17:b1:1b:3e:f9:d3:cf:ca:50:a4:1a:c5:aa:87:35:2a: f8:2b:4a:33:09:67:85:be:5c:00:22:a8:bb:df:37:3f: 5c:c3:58:be:52:44:91:5d:4b:05:53:52:c4:4f:53:a5: e0:0d:e7:f1:59:99:6f:86:01:ed:87:56:54:93:7f:96: 60:17:cb:52:b2:d1:e6:50:33:c5:c4:95:ed:7c:96:11: b3:44:bc:6b:7c:a8:4a:13:96:6c:c7:d2:ce:9e:95:1f: a9:98:ae:0b:bf:cd:8b:aa:b4:e6:74:2b:2c:73:9e:84: 74:06:c5:0c:6d:b3:40:61:ce:7c:79:aa:73:fc:38:e9: 94:b3:80:a2:bb:4a:b6:f7:a3:eb:71:05:2b:7d:89:64 Fingerprint (SHA-256): D1:43:E0:CD:76:17:AE:39:81:05:D9:A7:2D:7C:2F:5F:59:63:92:3B:95:0A:B6:FE:20:CA:E6:8B:22:B7:54:82 Fingerprint (SHA1): 8E:65:87:52:B9:48:DF:C7:09:D4:01:29:94:D2:3A:A3:1F:27:BE:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194416 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194417 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194418 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194419 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194416 (0x433ee170) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:57 2025 Not After : Thu Nov 28 11:44:57 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:09:8b:02:54:a2:ee:1f:00:55:08:29:27:ab:df:69: fc:22:55:85:f7:1b:e1:4e:ce:e9:3e:c3:10:56:a9:06: 2e:9b:69:cf:44:64:0b:84:1f:17:b3:66:bc:6d:8c:53: c0:e8:4f:7c:db:c6:06:6a:64:44:2d:bd:a0:7c:a4:0b: de:db:cc:ee:66:b9:8a:3c:76:c0:e9:74:40:f8:ce:17: 06:f6:2e:c2:18:a6:d1:c5:ab:a8:7c:76:f0:c9:b1:85: d4:77:1c:7a:22:d7:07:25:c5:31:c3:8f:63:09:b4:c2: af:3d:16:f3:d7:27:57:4d:64:6c:f3:44:f7:59:77:51: d5:5f:07:70:42:ab:ce:a1:46:0b:ba:90:a7:07:b6:08: dd:2c:73:81:ce:cc:4a:cc:d0:38:2d:75:02:47:09:d1: fc:88:4f:4f:fe:42:ec:ac:1a:70:96:fc:44:c2:0f:26: fe:fd:06:e3:68:53:92:2f:33:9d:a3:75:24:fa:0b:ef: 75:30:f4:03:2a:1f:90:e0:19:a8:dd:af:c0:4e:96:e5: 37:81:77:37:b0:81:13:b8:2c:88:6e:b1:10:dd:4e:a4: 9f:15:f3:88:12:84:7e:a3:9b:ad:00:30:b9:96:2f:b5: fc:e8:78:18:47:10:40:ec:72:51:30:7e:f4:c8:b4:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:31:c5:cc:a8:f8:ce:f8:e1:4b:4e:4b:4e:2d:83:05: 53:60:f6:14:42:77:1f:c5:2b:e0:90:01:24:d7:09:bc: b6:d2:cc:97:ed:3b:4a:b4:36:72:cc:7e:8a:06:56:7b: 07:73:dd:24:bb:4c:d2:f7:db:00:aa:13:5f:b1:94:83: 23:2d:d4:ad:6a:c7:84:ee:79:a8:1b:28:50:5a:9c:10: 49:89:ed:fc:f2:ee:ac:68:a5:38:f0:2e:81:30:8f:d2: 2c:2b:35:c4:89:e8:1e:1a:0f:43:26:b6:c8:bc:56:84: e4:44:d6:6a:ce:79:ba:9a:84:05:c7:fa:71:b8:de:e4: ad:44:13:f2:cb:4e:2c:d2:81:84:43:91:33:ed:ce:50: 58:5d:31:0f:ee:6f:a6:e1:a7:ae:d5:90:0c:7c:b5:c1: 32:d9:dc:6f:bf:ea:84:dd:7d:1e:7a:b8:2f:ab:1f:59: 44:37:6d:22:98:ca:31:98:aa:de:a0:b2:fa:99:1a:1e: 9c:d1:94:1c:3e:d5:c9:f4:0d:d2:19:bb:2e:89:a2:1c: da:02:e4:d8:7f:2e:5f:f4:69:f7:d8:c1:d5:15:f0:88: 2d:df:c7:1d:8a:6b:75:b1:ea:b7:10:a8:67:c5:2f:4b: d9:5b:2c:b5:18:20:fe:a0:de:78:de:da:3a:a2:85:15 Fingerprint (SHA-256): A2:87:73:43:D6:5E:64:F8:13:69:F1:7F:3A:18:22:63:73:A8:B3:27:20:A3:B6:A7:05:72:02:B1:1E:B5:A0:E2 Fingerprint (SHA1): 49:2B:37:84:0E:2E:F5:AC:02:9C:25:DE:7E:6D:77:4D:09:2F:5B:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194417 (0x433ee171) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:44:58 2025 Not After : Thu Nov 28 11:44:58 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:6e:61:bf:71:2a:ac:48:b6:a1:a9:52:fc:b7:4a:8f: 1a:ee:62:90:f9:92:14:c3:4b:e5:8b:a3:63:20:82:cb: 64:a1:38:72:a4:6c:4d:d4:31:7e:ea:87:12:7b:77:fc: fa:86:7a:bf:d3:f8:65:a3:08:b6:3f:13:de:a4:de:ae: aa:90:ea:b1:48:23:d9:52:53:80:8d:49:7f:17:b7:e9: bd:c6:18:de:d9:4c:99:f3:5e:2d:16:52:9a:da:71:ec: 77:9c:85:e5:8d:57:72:2b:c8:84:ba:a5:0f:3e:53:96: 95:b3:f7:56:b6:be:d9:e8:48:01:a2:ae:96:af:d6:40: e8:c8:b7:fb:ac:4f:8d:ab:c8:a5:d2:47:b0:b8:a5:4c: f5:1b:31:10:15:b2:24:e2:5d:6c:ed:80:ae:0f:89:5b: 27:6e:c7:11:20:45:12:9f:9f:33:e5:31:b3:28:bf:c0: 17:a7:56:b7:33:75:45:c4:00:1f:a7:f8:48:51:a1:17: 61:1f:96:63:fc:d6:d7:23:8a:16:e2:f2:fb:dd:8f:ad: c9:1f:b2:1d:02:19:6b:c3:d8:7f:b1:f3:e6:57:9d:c7: eb:44:80:33:1b:e2:bc:71:61:27:55:af:7b:3a:28:90: 30:af:20:da:cd:21:cf:a5:13:e0:99:6d:53:b0:c1:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:0c:aa:2a:72:65:7c:f7:6b:a4:f7:9f:1c:a8:5d:14: 51:82:ae:41:5a:e6:52:1e:01:49:4f:d7:a5:0b:2a:39: 35:5b:ed:0c:54:b3:dd:5f:89:83:01:6e:d8:fc:8b:19: a6:40:e1:7b:39:d9:49:7a:9e:47:e4:7c:e6:11:3a:b9: 9d:25:3c:d3:29:fa:8a:1d:c0:2b:02:cd:58:23:84:49: 90:b0:8a:d7:ea:da:59:6b:9d:0a:0b:6f:32:9d:5b:db: 3e:a3:a5:ed:4a:d3:b6:67:dd:0d:43:af:77:bc:c2:f6: 08:1e:3c:86:71:07:f0:e0:e5:85:95:93:b5:80:ae:fe: b6:82:f3:06:0e:5e:7a:31:55:6d:98:76:de:fc:16:f8: d2:db:6f:70:3e:66:1b:d4:b1:6c:ea:22:26:31:55:dc: a9:25:b8:6c:49:bc:1d:57:24:5e:8f:61:09:1c:5b:e0: 73:34:5c:c8:01:7f:e2:49:f9:21:36:0f:12:16:b8:5f: 25:ea:a4:bc:2c:33:56:99:02:c8:01:7a:74:c0:79:80: 3a:a8:86:b9:59:cc:bc:f5:8d:09:7e:c9:5a:8d:db:9f: 10:16:fd:c0:f5:d1:4f:df:b5:72:a1:39:71:fb:5c:21: c2:2d:05:2b:3c:7c:5d:6f:4d:d7:5f:96:4a:ed:02:c9 Fingerprint (SHA-256): 9D:E0:F7:2E:8A:11:34:3F:97:4A:D0:FE:6C:18:8C:97:62:A8:1D:D0:1F:24:38:4D:B2:3A:15:C4:F9:28:4B:F2 Fingerprint (SHA1): 9C:4F:84:5C:0A:35:51:62:16:B3:72:6F:69:C6:5A:3F:62:E1:79:F3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194418 (0x433ee172) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:44:58 2025 Not After : Thu Nov 28 11:44:58 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:96:0e:e5:6f:da:e5:3e:51:41:34:0e:13:7e:2a:11: e4:59:51:0b:61:27:af:db:cc:56:50:40:e9:c3:77:1d: 91:78:76:31:1a:58:fe:06:8d:9b:ab:ba:0d:00:91:70: 29:18:8f:21:15:54:f6:49:6f:76:5d:f9:58:de:ce:7e: a0:23:25:b6:d8:65:16:e6:16:21:f3:7c:1c:80:a8:d8: 7e:4b:66:64:49:ea:0c:bf:2d:49:62:86:f1:7b:2e:d7: ba:0e:71:ed:bd:70:6c:7e:f2:ed:2e:af:b6:ed:6c:b5: d2:89:5e:1b:5a:64:6b:a4:78:30:d5:55:2c:83:f3:d6: 54:0c:ab:8f:dd:1e:78:6d:91:6b:23:5a:db:54:10:32: 3a:80:de:5a:24:16:22:5b:09:85:8d:5b:69:ba:ae:ff: 2a:3f:0e:de:48:b2:f4:f9:4d:35:63:46:d6:c0:ea:50: 9a:a2:d6:3b:cc:29:d1:73:e6:c1:76:51:0d:e1:2c:43: ec:e3:5a:9a:2b:b9:50:eb:07:02:25:55:dd:3a:37:ac: bd:99:1e:b2:8a:f2:07:7c:91:dc:12:9a:de:72:19:a2: e4:1b:60:d9:89:27:81:61:84:43:86:33:6e:9c:7d:57: 43:91:e7:14:6a:27:fe:c7:33:31:7f:a6:dd:42:c3:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:06:c2:b5:1b:d3:8b:54:fa:48:8c:54:dc:4a:e0:e0: f6:03:61:3b:d1:1b:cb:7e:69:39:ce:a3:09:e4:78:5d: 22:a6:6a:6f:7d:09:4c:27:a4:17:90:cc:ce:28:e8:be: a9:7f:c6:d2:24:fd:9b:a6:0d:6a:b2:ab:17:cf:33:55: 95:0d:a8:b1:d0:9e:d3:17:f6:c5:af:d6:c8:ce:aa:1d: c0:ed:44:1b:4a:b0:8b:f5:65:0c:a1:63:5d:64:4a:17: 23:eb:d3:14:e5:9b:ce:23:40:67:93:88:f7:7d:51:ad: 90:6d:12:c7:bb:58:fa:84:e6:2a:03:78:48:60:a1:23: 86:0a:9f:1e:79:56:e1:89:e3:fc:f9:0b:f6:7d:00:30: 02:19:25:f0:3b:4c:5f:39:16:73:30:9c:d4:15:67:73: 6b:e1:72:d8:bf:18:41:1a:00:20:56:d9:a0:34:ac:4b: c4:23:a1:21:8f:3b:04:b0:38:c1:ac:e6:b1:af:c0:2e: ec:26:0c:34:b0:c7:c6:bb:99:5a:4a:52:b2:ea:f5:96: 90:2e:80:ff:07:58:c7:3d:f9:9c:76:45:cc:77:39:8b: 04:6c:7e:af:96:78:44:b8:05:23:1c:7d:c5:29:0e:8c: 0c:b4:4e:78:3e:63:13:d0:08:2c:9e:68:31:2c:ff:7c Fingerprint (SHA-256): B8:06:52:1C:C6:79:68:C8:CC:B0:64:B3:3A:BF:A3:84:75:7D:FB:83:41:FA:CA:09:74:0B:B5:8C:0A:8E:DB:2C Fingerprint (SHA1): 48:91:23:30:40:A2:35:BD:A5:24:D7:F9:AC:55:4C:A2:85:CD:D0:26 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194420 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194421 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194422 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128194423 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128194424 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194420 (0x433ee174) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:01 2025 Not After : Thu Nov 28 11:45:01 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:82:24:ff:c4:27:ef:d8:cc:e7:3d:43:f7:a7:18:2b: 16:be:75:83:25:c5:03:c8:8f:9a:32:ab:2b:03:5c:e5: 62:dc:73:03:07:42:30:6b:c7:2e:2b:33:18:df:57:48: c3:5c:01:a3:31:35:46:9f:e9:df:96:5e:e2:00:88:ee: 76:91:3c:8d:f9:05:91:0d:24:6b:8f:0f:b2:45:1b:ad: 7a:22:7f:d6:0f:31:63:a6:29:75:83:ad:16:3d:d5:3b: e8:a3:4f:62:73:55:69:f8:5a:c0:ee:7a:4f:93:4a:8b: 52:0b:6b:77:b5:a4:08:0b:cd:bd:27:28:95:fd:40:38: 8f:55:56:80:94:5c:8f:aa:b8:e5:24:80:4c:90:3c:d6: 24:51:e0:8b:07:db:f4:28:a0:12:20:88:93:28:a6:61: 10:37:46:54:f8:c6:e6:68:41:9b:5e:83:fc:2d:52:13: 88:a2:e3:90:69:28:e3:c7:0a:9e:27:a7:76:be:5e:fb: fd:1b:20:c1:af:c2:d9:cd:ad:b9:25:23:5a:f8:70:ee: ef:f4:e2:2f:86:ba:ca:71:28:8a:5e:02:9d:7e:27:b4: 2c:1a:83:bb:b3:8d:b8:6c:83:24:8a:b9:a4:99:30:cf: cf:40:c6:bd:be:0b:55:24:23:64:3d:26:06:3c:13:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:3a:74:1c:fb:ce:ae:20:bc:12:b1:39:e3:e3:1f:6a: 47:99:da:a6:6d:b2:a9:39:74:02:ba:6f:ba:28:59:17: 51:99:01:7a:fd:2e:6c:3c:ac:72:9f:99:5d:ed:85:f7: a0:01:a6:cd:2a:fe:e7:53:a3:02:3f:f2:e8:c2:d4:5a: b8:62:3a:43:49:25:26:e5:b0:66:eb:c0:0d:db:92:6f: 57:76:29:0c:db:fb:ba:9c:49:17:17:25:14:87:bb:18: 8e:67:de:87:a2:1a:fb:37:b6:de:31:ee:06:19:93:30: 69:5d:00:f4:9d:4a:58:50:ab:40:5a:47:32:de:ee:8d: 29:78:b3:fb:57:7e:32:e1:a6:d3:25:d6:0c:d2:3f:cd: b8:e8:d4:5c:bf:c0:f7:3d:d9:08:1b:d2:e6:d9:24:a4: 74:fe:7b:a4:f5:f6:88:76:41:cc:57:2a:51:a2:73:6a: 72:dc:3f:16:a4:1a:5d:d5:0b:8f:0a:c8:76:25:d1:41: b8:4d:ad:e6:15:99:e9:55:57:ff:75:0c:6a:8d:33:95: 86:07:5e:d1:f4:43:db:38:44:6e:ac:1d:90:0e:a6:18: f3:5e:ea:16:78:3c:44:43:41:4d:f9:c1:21:e5:3f:2d: f0:b8:74:ad:82:42:9d:10:de:48:22:5f:95:e7:57:4d Fingerprint (SHA-256): A8:3B:09:35:65:7C:02:16:AC:62:D2:97:95:A9:9E:C1:D7:B3:AC:57:8C:BC:27:26:2A:ED:0F:5F:F3:1E:3E:C9 Fingerprint (SHA1): 76:FD:BE:80:7E:31:01:21:CE:A1:48:86:59:6B:46:04:46:E1:08:72 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194421 (0x433ee175) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:02 2025 Not After : Thu Nov 28 11:45:02 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:6e:14:d3:6b:fa:38:cd:e9:3e:a2:c4:cc:dc:66:3c: 5d:ff:37:7d:6b:cb:49:6a:d3:1e:30:cf:3c:bd:42:cf: 07:ca:cb:0a:2e:6e:87:be:61:cc:29:9b:4f:2b:45:1b: 85:8a:88:db:a8:03:60:82:a6:2e:35:31:c1:0d:0e:60: 13:9a:d1:9c:de:bb:fa:8e:bd:84:27:c5:40:cc:a3:06: be:4d:1a:9e:8b:82:68:f9:e4:64:7b:71:5d:16:52:7d: e5:e1:c4:bd:37:fd:df:ba:dc:be:1c:2d:d3:88:9c:9a: b0:4d:2c:91:ce:7f:d4:39:e4:b4:36:1f:e8:18:4e:98: ff:de:50:e8:cb:58:75:ca:45:b2:f4:f6:5e:1a:b9:aa: 36:02:da:40:da:d2:cb:9c:29:b8:8c:cb:6e:f0:ff:03: f9:39:17:45:58:23:97:3d:a1:5b:40:3a:de:1e:02:f2: de:07:1a:4d:2a:7b:95:47:dd:8e:aa:43:68:ef:f6:73: 51:cb:9c:68:91:7a:4e:da:9d:d2:36:9a:12:5c:94:d0: f9:89:9b:f8:1c:65:26:6d:49:84:95:61:e7:81:f4:5d: 23:48:95:3f:71:35:5b:3b:3c:71:89:e6:66:1f:ff:48: 3e:bb:57:9f:a8:21:f1:11:e7:f9:6c:27:0f:9c:df:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:7b:30:86:b4:03:fc:08:f0:bb:9e:e9:4a:6a:fd:68: 52:f5:1a:3a:76:22:e4:3e:1e:50:50:d4:fb:4d:d8:e6: 1a:32:d4:55:96:d6:1e:40:c2:7c:00:86:07:15:d9:57: bf:82:1f:85:d9:68:bb:2d:4e:b8:87:71:26:8c:a9:37: ec:4e:ae:61:e5:89:9a:a7:0d:25:05:cb:bb:23:f9:90: 5e:4c:13:93:ba:4d:66:56:91:c2:0d:c6:24:60:2b:a6: 11:12:a7:c9:44:c5:7b:99:8c:aa:02:61:e9:fc:69:c6: 0e:ad:84:51:6f:b1:9c:65:53:4d:ce:f7:b2:83:61:1d: ef:59:79:fe:c8:db:ef:60:65:ef:2f:28:7a:e5:ba:fc: c6:ec:4c:40:e4:33:d5:d7:bf:1f:da:ae:0d:96:9a:f4: f5:46:48:86:e2:8b:f1:d7:64:bf:14:83:7a:f6:0d:76: 71:5d:b8:84:37:16:38:f2:fc:63:18:84:19:90:20:02: bf:91:1f:34:ea:b3:f7:b3:4d:0f:6a:ac:44:18:9c:30: c8:78:61:ef:a2:e4:f3:c7:cf:eb:10:dc:9f:c5:1a:44: 38:5a:92:f8:a3:c8:53:15:d1:d4:89:c2:8c:ee:58:7c: 56:ab:df:3c:3c:47:e9:19:a2:2e:96:51:e7:2f:d4:a8 Fingerprint (SHA-256): EE:14:19:6D:78:25:0E:9D:BF:7B:CE:8E:CC:BB:0D:67:7B:FF:F5:31:2D:B4:BD:E8:4E:1B:B5:45:F4:18:65:64 Fingerprint (SHA1): AC:9F:E5:F6:76:60:BF:C9:3D:E0:E9:BA:59:E6:D0:DD:21:C1:15:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194422 (0x433ee176) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:45:02 2025 Not After : Thu Nov 28 11:45:02 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:f6:61:e3:e7:26:3b:3c:85:06:de:ab:bf:5e:24:c3: 82:88:64:53:df:18:19:0e:3b:b8:30:81:d9:a8:d3:ca: 69:95:4a:08:23:cd:9f:5d:8d:b4:2c:78:b6:86:63:d0: d8:2f:ef:69:22:14:e4:8c:73:91:b2:74:e9:99:a4:16: f0:da:62:da:30:2d:c3:76:be:1c:a4:f0:ef:45:0f:03: 15:39:8b:27:b2:88:dd:f3:8b:01:8e:b6:e1:3c:78:3b: bd:3e:19:fe:1f:f7:79:53:61:77:57:9a:aa:5f:88:97: e4:d0:01:21:03:3e:8d:05:97:5f:6a:b0:68:34:16:4d: 7a:43:bd:b8:31:43:c9:6f:2c:36:82:29:cb:41:ee:48: 63:76:05:0c:ac:8f:5e:ed:82:e8:69:50:86:b1:91:48: a3:da:4b:48:7e:63:69:ef:8d:64:55:dc:80:11:22:91: 50:9e:a7:4b:73:45:7f:89:08:b8:12:1e:e0:a5:65:9c: 94:5a:c5:e9:0b:2e:56:32:44:7c:a5:f2:59:62:02:6e: f4:93:4f:b5:fd:a2:2b:29:e4:ae:0b:2b:58:2c:41:d1: 56:e8:51:2e:ce:78:bc:ac:ff:81:9b:ba:8f:f9:0c:c9: 5c:ac:e7:d4:f9:f6:70:5e:b8:70:db:d1:1d:d3:2e:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 11:4c:72:9b:d9:8a:e6:7d:78:80:52:2c:da:14:37:86: 56:5c:1e:14:3f:09:71:9c:67:85:7d:e4:d7:45:04:ec: c7:83:f8:96:95:6a:58:74:ba:de:4c:4f:0e:9a:db:ce: 8b:9d:3d:58:9f:b4:de:28:80:4a:2c:af:8e:c3:7a:ef: 47:f1:09:27:49:16:9a:c7:7c:0e:ce:a1:1f:62:6c:90: 90:0d:a4:33:5d:4d:d7:16:48:f0:73:8c:06:d3:70:a4: 48:5d:58:98:66:f3:a0:e8:d3:9e:03:30:81:3b:58:53: d7:18:1b:64:e0:47:3b:5d:e4:f0:c7:9a:f7:85:b4:20: 34:d6:27:ab:01:7b:1f:68:3a:58:3e:17:4d:80:19:46: 92:c7:53:62:a9:f8:00:4f:0e:d7:6a:65:a7:cc:28:e8: 4b:da:cb:7e:0e:fc:9e:00:ba:92:bc:11:7e:b4:98:6a: 81:1c:12:b7:7f:ca:0f:67:4b:fc:f8:c6:04:0c:0a:de: 45:85:7e:5a:e9:b1:41:9f:b1:e1:56:cd:83:d0:05:17: 2c:6c:9a:c4:c4:fa:81:1c:c1:eb:61:30:90:35:89:33: 52:56:66:3c:85:1b:12:02:df:f0:28:5b:6c:3e:83:6b: 92:45:60:a4:d6:4d:c8:d9:61:c1:dc:65:d3:a2:74:17 Fingerprint (SHA-256): 46:A8:33:F6:76:FA:CD:96:1E:51:AE:04:5E:1C:1B:7F:F2:35:59:02:7A:DF:A9:00:C8:53:D7:66:FD:36:DB:1D Fingerprint (SHA1): F7:9D:BF:43:A9:5D:7D:5C:47:69:FE:F0:75:87:D4:42:12:1D:14:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194425 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194426 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194427 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128194318.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194428 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194425 (0x433ee179) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:06 2025 Not After : Thu Nov 28 11:45:06 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:25:06:4e:b5:ee:a4:09:9d:1a:16:a3:a6:fb:ca:10: be:ae:bc:98:76:46:0c:a6:39:b2:01:cb:b6:11:2e:88: b0:11:11:46:62:ff:e1:87:df:0a:1d:6c:61:53:94:0a: 86:e5:b3:ac:2b:28:82:83:51:8c:6e:8d:f1:69:99:fc: b5:61:60:18:4a:13:0c:53:ac:2a:cd:37:12:36:0e:91: 32:9e:e8:a2:d8:7d:cf:f3:e3:62:30:41:9e:bb:ab:22: c9:82:7a:66:d3:cb:54:2f:30:5d:00:cd:af:e7:b4:dd: f4:ba:30:ca:95:55:94:9c:1d:62:4e:6b:04:61:1c:03: dd:92:6a:9d:be:d3:a7:a0:86:9a:03:96:f3:cd:00:0b: 3c:6d:b3:ac:e6:2d:f9:90:66:4a:e0:d8:9b:a7:4a:53: e1:e3:4d:8c:52:84:c1:d1:0f:4b:a9:82:a3:ec:12:0b: 99:32:95:b7:23:81:d7:ca:2e:2f:31:2b:1e:7f:89:1f: 3b:a4:74:93:73:3e:1f:95:3a:93:c9:1a:62:33:6d:3c: b7:2e:95:34:6e:e3:43:d8:5a:3e:84:c8:a4:e9:48:aa: 94:46:80:e3:62:fd:b3:cf:1a:4b:16:e9:fe:e5:c2:f9: 6c:3f:ca:29:7d:c1:d3:66:bc:62:af:30:5e:cf:6f:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:ff:86:9f:06:b1:91:90:ed:d0:8d:62:f0:dd:77:cc: 65:74:e1:85:13:d0:b3:08:68:f7:85:55:76:bc:38:83: b2:dd:19:8f:5a:c4:45:75:90:e5:2b:4c:6a:92:f4:36: ac:b8:00:d4:ae:02:63:3c:9c:c7:49:94:3b:f1:4e:26: e6:22:8f:5e:85:46:0a:a3:cb:fc:5b:3a:37:22:3e:40: 7f:57:b8:c1:bd:4e:d5:64:e8:42:e8:71:f4:66:a9:4d: e0:1f:9c:4e:08:a2:a9:cb:72:5d:17:19:1a:77:6f:7e: a7:ae:ca:3d:9f:36:f9:a9:2c:d1:f9:c5:c2:e2:f4:5d: a5:64:9c:6f:4d:91:f4:de:24:df:15:81:e6:c6:88:72: 9a:d9:de:2b:40:54:88:07:ca:cc:38:31:ea:16:34:b4: b2:ca:7e:a1:2c:54:54:1a:75:d9:d4:ec:39:76:bb:ea: 1f:7c:99:64:5d:da:f2:ed:6d:da:33:65:ce:77:dd:b7: 5b:51:63:7e:20:09:3b:06:f2:2f:d0:b9:fa:ef:b4:3e: 95:39:26:40:b3:6a:cd:17:0c:2d:74:b9:1b:1e:b6:54: ef:2c:d3:a6:93:5d:d2:5f:2c:16:3f:84:9b:6a:42:fa: d8:0f:8c:c7:f7:d9:45:24:d2:8e:30:d3:64:58:86:09 Fingerprint (SHA-256): ED:9A:4E:A3:28:CD:12:0E:BF:47:89:E1:D2:13:07:5F:24:C4:B8:7E:0C:05:B2:E3:40:52:B7:65:F9:0A:9F:CD Fingerprint (SHA1): 1A:4B:A9:9A:30:7E:34:3A:5D:1F:23:C8:1D:B1:27:36:F3:54:5F:53 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194429 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194430 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194431 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194432 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194433 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194319.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194434 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194429 (0x433ee17d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:45:09 2025 Not After : Thu Nov 28 11:45:09 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:4a:e4:95:80:f5:19:74:e4:89:a8:8e:b2:da:c3:54: 0a:bc:e0:bb:0f:4c:6b:1a:dc:79:fe:da:dd:c7:65:01: a3:66:74:2b:60:30:ca:f0:7e:87:d8:74:fc:7e:fb:20: 78:62:87:56:d5:14:63:11:97:a1:8e:5d:7f:a4:9a:8b: de:af:c3:3e:72:5d:99:b4:f2:42:58:ea:79:87:38:fd: 71:f7:0b:da:8a:09:4c:2a:85:9c:1f:b1:a2:7d:6f:bf: 5c:cf:a8:42:0b:d3:b4:53:27:c1:a9:97:bc:f2:32:0b: 1b:b1:27:62:b9:1e:4b:ca:65:17:54:c3:c6:d6:59:62: 50:00:01:a3:58:84:21:47:89:ec:a4:ea:af:26:fd:b1: c5:72:67:07:4e:73:3f:35:ff:a9:dd:98:1c:83:f9:3c: b5:75:34:a0:cc:11:dd:91:cd:cb:ee:d8:b5:ff:4b:85: 67:18:18:0e:eb:2b:c6:11:63:57:dd:57:c9:ba:5e:08: 70:5d:61:2a:c1:1f:ef:d9:a8:eb:48:51:6a:ad:ec:45: 1b:8a:5e:e3:0d:0a:e8:fb:7a:3d:3d:fa:72:54:aa:cd: f8:68:0e:07:ab:a9:ca:64:22:09:2e:b4:4f:6a:cf:9c: ee:c3:7b:4c:18:69:2a:26:26:9b:a7:2b:a9:13:10:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:71:a9:f2:4b:f1:5e:db:58:25:3b:fd:6f:da:de:fd: e4:ad:74:81:84:c6:3a:39:6a:be:bf:99:b8:a0:8d:0b: 05:7c:9f:b0:76:14:a3:e8:a0:ee:ce:31:a2:4f:88:dc: c3:cd:88:b1:6f:f5:49:d2:d4:20:d6:9c:76:c3:3e:04: c9:51:f5:b7:8e:51:cb:f1:ea:64:8d:8b:14:de:24:82: d1:73:4b:12:b2:fe:45:09:28:b3:0a:5e:57:f1:c3:56: f6:ab:24:56:85:eb:9d:58:fa:d6:63:d3:f1:3d:e6:1f: a0:86:2d:87:41:e9:31:de:90:01:5b:f0:91:5c:99:e8: 78:63:0b:4e:4b:9b:04:04:3c:1d:d0:f0:71:ce:38:79: 20:2e:10:81:95:83:3b:9a:ca:69:67:1b:ff:3f:66:fc: 0e:16:8f:9f:cc:d0:9b:d3:ff:61:71:d7:a0:ce:22:87: c7:27:1d:38:9c:f5:5b:06:57:6a:ba:6c:ff:b3:56:2f: 70:55:de:09:4a:db:f1:92:91:72:8c:37:b2:53:a6:ac: d5:30:2d:49:ba:b5:fb:5f:e7:9f:a3:b5:c0:d2:00:62: 12:48:ab:20:74:87:1d:ec:ff:1f:76:fe:66:30:a0:34: b2:7f:71:50:08:b1:a8:53:02:31:ad:3d:12:6f:22:0c Fingerprint (SHA-256): 25:94:6C:B3:39:B2:CB:B8:B9:F0:29:DE:AE:C6:BB:40:D6:12:12:3C:88:A7:55:10:E2:53:15:B3:3E:13:12:5D Fingerprint (SHA1): 00:B3:C5:CE:1B:AB:B2:7A:EF:24:50:BC:53:67:16:BF:94:63:A6:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194430 (0x433ee17e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:09 2025 Not After : Thu Nov 28 11:45:09 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:f5:64:ec:19:85:5a:1d:16:92:d4:58:46:a0:f9:6c: 60:ff:f5:80:e1:10:44:ed:3c:55:bb:df:25:49:49:21: a4:24:50:96:8d:ac:ec:73:a7:fb:8d:31:62:65:54:07: df:9a:da:d2:e0:ad:a9:f3:65:25:fd:eb:13:15:02:cb: e3:ad:3e:e0:4b:60:47:86:6e:44:dd:5c:97:06:ce:76: 2f:d4:bc:9f:71:e4:c5:d7:6a:a0:af:55:0b:82:42:c4: 35:3c:b8:cd:da:43:48:60:8f:d4:f8:3f:46:d6:40:7d: 44:ee:27:4f:77:d2:17:5f:b8:e4:95:4c:d4:3e:1e:fb: 36:12:4d:d0:79:4b:d8:38:4f:af:0a:e2:22:cb:2c:0c: 19:73:92:65:e6:da:3b:66:c4:d4:10:6e:8e:fa:32:86: eb:7e:71:bc:28:7b:5f:10:e5:d8:7f:36:b9:72:26:6e: a4:f2:da:f1:ac:4f:73:56:2e:8c:47:36:72:f5:3a:d6: 0e:0e:cf:84:8d:7a:88:de:de:1d:97:a1:9a:25:39:02: 90:88:7d:9d:e8:c4:b5:c4:62:a1:d3:9a:f3:31:06:1b: bb:25:7d:5f:31:74:76:6c:fc:d2:3f:20:11:72:9d:1c: 77:3e:4c:6d:d9:af:9d:7f:ab:05:4e:0c:c4:9b:95:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:6a:22:39:d7:51:12:79:f4:cd:b8:f3:de:95:9e:1b: 2a:a5:eb:dc:9e:20:ef:46:93:13:14:e0:de:a4:b2:5a: f5:82:26:3a:c9:10:6c:6b:23:d7:08:c1:4e:7e:78:bd: 7c:cc:cd:a0:cb:47:13:a4:91:9e:33:fd:b5:25:80:18: 65:df:69:e6:89:10:41:ac:95:5b:91:2f:40:b9:3a:e4: e6:ef:56:7b:37:ad:8f:d6:1d:46:77:7d:e2:63:b9:68: 2c:8d:24:4e:6d:33:8c:34:32:7c:78:20:8d:35:7d:7b: 5e:9b:f1:29:7e:7f:35:8f:d4:da:75:f5:86:01:48:f8: ba:d8:98:c5:d4:66:02:9a:a6:0b:88:f8:80:ea:5f:2c: 34:8c:2a:14:b4:87:d4:35:23:95:c0:2a:87:6f:e1:1d: df:f5:ab:7d:d7:11:70:d2:fe:c1:d6:1b:ec:68:da:a2: 17:a0:6f:a5:5b:2a:68:4f:29:81:4f:ee:59:36:7f:97: 72:9c:00:88:14:88:e8:8b:65:bf:4c:71:88:b8:3b:c8: ee:e0:c0:48:39:3b:82:1d:b4:74:6d:7b:4e:75:91:51: 47:bf:76:ed:ed:fa:2d:a1:2b:49:55:73:7e:4b:80:93: 60:8d:78:dd:0c:70:f7:cd:54:fd:0c:a1:be:17:23:62 Fingerprint (SHA-256): 2E:94:BD:6C:12:19:51:43:0A:86:2C:06:61:85:0C:90:C4:33:F7:C4:76:9D:D4:C4:D4:90:30:8B:68:3F:40:0C Fingerprint (SHA1): D9:8F:FE:48:47:0C:22:B9:B5:7B:7A:BA:B7:6F:8C:11:BB:F8:21:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194430 (0x433ee17e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:09 2025 Not After : Thu Nov 28 11:45:09 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:f5:64:ec:19:85:5a:1d:16:92:d4:58:46:a0:f9:6c: 60:ff:f5:80:e1:10:44:ed:3c:55:bb:df:25:49:49:21: a4:24:50:96:8d:ac:ec:73:a7:fb:8d:31:62:65:54:07: df:9a:da:d2:e0:ad:a9:f3:65:25:fd:eb:13:15:02:cb: e3:ad:3e:e0:4b:60:47:86:6e:44:dd:5c:97:06:ce:76: 2f:d4:bc:9f:71:e4:c5:d7:6a:a0:af:55:0b:82:42:c4: 35:3c:b8:cd:da:43:48:60:8f:d4:f8:3f:46:d6:40:7d: 44:ee:27:4f:77:d2:17:5f:b8:e4:95:4c:d4:3e:1e:fb: 36:12:4d:d0:79:4b:d8:38:4f:af:0a:e2:22:cb:2c:0c: 19:73:92:65:e6:da:3b:66:c4:d4:10:6e:8e:fa:32:86: eb:7e:71:bc:28:7b:5f:10:e5:d8:7f:36:b9:72:26:6e: a4:f2:da:f1:ac:4f:73:56:2e:8c:47:36:72:f5:3a:d6: 0e:0e:cf:84:8d:7a:88:de:de:1d:97:a1:9a:25:39:02: 90:88:7d:9d:e8:c4:b5:c4:62:a1:d3:9a:f3:31:06:1b: bb:25:7d:5f:31:74:76:6c:fc:d2:3f:20:11:72:9d:1c: 77:3e:4c:6d:d9:af:9d:7f:ab:05:4e:0c:c4:9b:95:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:6a:22:39:d7:51:12:79:f4:cd:b8:f3:de:95:9e:1b: 2a:a5:eb:dc:9e:20:ef:46:93:13:14:e0:de:a4:b2:5a: f5:82:26:3a:c9:10:6c:6b:23:d7:08:c1:4e:7e:78:bd: 7c:cc:cd:a0:cb:47:13:a4:91:9e:33:fd:b5:25:80:18: 65:df:69:e6:89:10:41:ac:95:5b:91:2f:40:b9:3a:e4: e6:ef:56:7b:37:ad:8f:d6:1d:46:77:7d:e2:63:b9:68: 2c:8d:24:4e:6d:33:8c:34:32:7c:78:20:8d:35:7d:7b: 5e:9b:f1:29:7e:7f:35:8f:d4:da:75:f5:86:01:48:f8: ba:d8:98:c5:d4:66:02:9a:a6:0b:88:f8:80:ea:5f:2c: 34:8c:2a:14:b4:87:d4:35:23:95:c0:2a:87:6f:e1:1d: df:f5:ab:7d:d7:11:70:d2:fe:c1:d6:1b:ec:68:da:a2: 17:a0:6f:a5:5b:2a:68:4f:29:81:4f:ee:59:36:7f:97: 72:9c:00:88:14:88:e8:8b:65:bf:4c:71:88:b8:3b:c8: ee:e0:c0:48:39:3b:82:1d:b4:74:6d:7b:4e:75:91:51: 47:bf:76:ed:ed:fa:2d:a1:2b:49:55:73:7e:4b:80:93: 60:8d:78:dd:0c:70:f7:cd:54:fd:0c:a1:be:17:23:62 Fingerprint (SHA-256): 2E:94:BD:6C:12:19:51:43:0A:86:2C:06:61:85:0C:90:C4:33:F7:C4:76:9D:D4:C4:D4:90:30:8B:68:3F:40:0C Fingerprint (SHA1): D9:8F:FE:48:47:0C:22:B9:B5:7B:7A:BA:B7:6F:8C:11:BB:F8:21:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194435 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194436 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194437 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194438 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194439 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194320.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194440 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194441 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128194321.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194442 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194435 (0x433ee183) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:45:13 2025 Not After : Thu Nov 28 11:45:13 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:28:74:0b:2a:5b:e4:6e:e7:cc:51:30:d1:db:e5:7b: f4:ba:7f:9b:28:22:77:25:fd:90:1e:28:c0:c1:26:c8: 47:6f:39:76:3e:da:38:d5:0f:eb:de:76:0f:de:bf:85: 28:97:c5:d7:8f:24:8d:02:11:5a:73:91:f8:eb:8c:36: d2:58:bb:60:34:1e:e1:15:57:e7:d4:17:94:07:2f:4d: b1:a0:42:6e:4d:32:7d:3c:f3:2b:75:a0:1a:ed:c1:4d: 32:e5:03:2f:e7:2e:e2:c4:15:c0:8f:15:54:71:43:ee: fc:02:cb:a3:d9:f8:fb:72:78:5a:2a:4a:f2:f7:5a:51: fa:29:ac:3a:18:07:ea:1b:84:2d:be:58:e2:41:86:ef: 69:35:c6:63:7c:31:ab:20:36:3c:c2:72:4b:40:c8:9e: 0e:cf:5a:5b:5b:fd:a2:45:44:7f:0c:48:97:fe:96:65: f5:d5:74:74:71:b0:25:eb:b5:93:6f:9f:2e:d4:1e:3a: fc:12:84:98:52:7b:a7:2d:f1:6e:98:cd:9f:f3:cc:95: 08:05:77:5f:36:d4:08:99:f1:25:0c:17:8e:21:8f:9d: 7e:e4:b4:e7:8d:b8:ba:72:8e:fb:98:60:10:94:32:72: e5:44:8d:84:64:8a:d1:6e:61:2c:9c:f0:6d:ed:0b:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:ad:9b:b7:6f:fb:4d:5e:e5:3c:fe:48:5d:53:cf:f4: 89:68:3d:84:67:5b:13:ae:5c:72:e8:b8:e8:23:b6:37: 28:ae:c0:22:dd:b3:03:a0:72:e6:0e:0a:82:fe:0e:12: dd:74:9b:ec:88:a5:0d:5b:76:3e:00:b9:a4:45:0a:1d: bf:15:b0:67:31:e0:a4:89:2f:15:5c:7b:e2:7c:4c:4b: 94:60:a2:64:a7:5a:e1:2a:07:94:6a:4a:71:4c:08:4e: a3:70:09:51:58:74:d5:08:b7:b1:8a:ba:d1:08:23:eb: ae:f5:4f:58:f3:31:b8:a9:11:7a:be:8e:b7:f2:eb:24: 19:b9:78:1b:84:e2:94:4f:65:6a:17:22:cc:20:38:14: d9:a9:96:30:93:6d:f8:8d:1f:98:71:0f:78:8a:e2:22: 8d:d1:0b:ec:6d:22:e2:0f:95:38:54:3f:4a:2e:5d:d6: 81:e7:d6:bb:db:eb:c8:48:4f:1e:a7:80:de:e9:69:cf: d5:06:0d:d1:b8:7c:72:5f:65:ca:b9:41:03:f2:d5:91: 28:61:5d:90:2f:ca:9a:90:d0:fe:cf:7e:4f:65:ef:b9: 45:80:77:6b:ea:18:52:7f:ae:bc:cd:d4:c9:7f:58:2d: 5f:63:d8:16:3d:0a:e2:d5:7f:10:fb:0e:6d:f5:af:81 Fingerprint (SHA-256): 14:EB:93:1A:CB:93:07:59:D8:73:BD:B3:FB:49:78:D8:06:34:CF:F3:BC:4C:14:4E:32:45:E8:59:A2:2E:4F:0D Fingerprint (SHA1): 72:54:E7:8A:2B:E6:E0:05:8B:97:FB:A6:97:B6:95:29:56:2B:46:5B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194436 (0x433ee184) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:13 2025 Not After : Thu Nov 28 11:45:13 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:94:70:95:62:f7:7e:5f:12:41:49:3e:5d:5f:64:ab: ff:e7:44:60:76:44:69:9f:c6:6d:a0:fd:ba:13:c3:bf: 39:73:3a:cc:4a:05:52:81:31:c9:da:de:68:5b:4a:80: 95:29:7c:89:6c:a0:8c:a0:09:fa:cb:4c:4c:d0:48:ec: e8:70:5a:37:70:3f:f0:74:2d:89:50:6d:25:98:6b:a4: de:ce:10:e6:12:b3:f6:80:d4:90:97:58:2c:0f:97:1e: ab:4d:60:4d:f3:4f:72:9b:16:12:33:a9:9b:5f:58:ea: 51:ae:b4:0a:ce:82:29:8d:40:c7:14:5c:30:1f:2b:c5: 74:a9:0a:56:f7:ca:4e:9b:45:f0:97:95:42:1c:9c:30: 8e:de:b6:81:29:96:6b:00:9a:88:42:e1:e0:6d:d2:9e: fb:6c:ea:fb:39:fa:f2:39:31:cf:d9:f6:13:95:fd:8f: ef:8a:53:29:be:af:c3:d7:eb:23:a8:f5:a9:ac:66:2d: e0:d1:23:aa:9f:53:d2:aa:92:ac:58:96:09:b2:52:f3: 57:d5:ff:33:04:2e:50:f0:ef:d1:2b:b5:31:eb:aa:6b: f2:60:fa:2c:3b:fa:75:69:5b:43:6c:d7:41:42:8b:a8: ab:be:b3:01:00:31:2a:5b:3f:d3:e5:c1:7f:76:1f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:8b:8a:66:18:52:d2:b3:39:15:33:33:0d:5e:b6:c8: 22:a3:95:bd:91:8e:07:cb:d2:d9:42:68:30:26:dd:95: 86:1f:3d:e8:2e:cd:ce:12:fb:04:62:8b:8b:d0:00:a9: bd:ac:c0:db:cc:58:48:bf:4a:98:14:46:15:74:d5:d9: 33:c1:cc:ba:57:10:a1:97:b1:5a:13:6c:0d:7f:51:69: cf:ef:88:58:b5:70:da:11:3e:3f:d2:e2:e6:0e:33:02: 1b:c5:72:0a:08:b3:90:dd:52:d3:24:32:a2:db:90:e9: 14:14:20:02:e7:97:5e:35:f3:af:c3:8a:17:a3:9d:5f: 53:d8:08:df:22:81:37:ee:80:b9:3a:9f:15:2e:9b:90: 88:34:85:86:d4:50:be:b1:72:06:79:54:35:85:ba:06: 0d:95:49:0c:56:ce:f2:b8:bb:d9:75:57:4b:1c:a0:0a: 14:c4:76:c4:f5:40:0d:69:74:ff:38:6e:5c:b1:62:b6: 24:9f:e4:75:90:75:ae:84:f3:ba:25:a9:f9:ff:4f:1d: be:42:01:c4:00:75:0e:bc:74:9c:25:35:1f:f0:1f:c8: fd:64:42:1c:6e:be:df:7b:ed:0a:78:cd:75:44:08:cb: 2d:8d:8d:10:84:84:4a:40:23:7d:89:17:49:f4:4c:7e Fingerprint (SHA-256): A8:D2:0B:66:1B:F9:82:BC:EE:A8:71:C1:0D:02:8B:B4:99:19:10:EB:69:97:5D:FF:38:19:99:03:AA:DD:D8:44 Fingerprint (SHA1): C5:08:36:04:FB:BA:58:BE:E5:C2:DD:F2:51:75:3E:B3:B9:21:99:F3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194436 (0x433ee184) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:13 2025 Not After : Thu Nov 28 11:45:13 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:94:70:95:62:f7:7e:5f:12:41:49:3e:5d:5f:64:ab: ff:e7:44:60:76:44:69:9f:c6:6d:a0:fd:ba:13:c3:bf: 39:73:3a:cc:4a:05:52:81:31:c9:da:de:68:5b:4a:80: 95:29:7c:89:6c:a0:8c:a0:09:fa:cb:4c:4c:d0:48:ec: e8:70:5a:37:70:3f:f0:74:2d:89:50:6d:25:98:6b:a4: de:ce:10:e6:12:b3:f6:80:d4:90:97:58:2c:0f:97:1e: ab:4d:60:4d:f3:4f:72:9b:16:12:33:a9:9b:5f:58:ea: 51:ae:b4:0a:ce:82:29:8d:40:c7:14:5c:30:1f:2b:c5: 74:a9:0a:56:f7:ca:4e:9b:45:f0:97:95:42:1c:9c:30: 8e:de:b6:81:29:96:6b:00:9a:88:42:e1:e0:6d:d2:9e: fb:6c:ea:fb:39:fa:f2:39:31:cf:d9:f6:13:95:fd:8f: ef:8a:53:29:be:af:c3:d7:eb:23:a8:f5:a9:ac:66:2d: e0:d1:23:aa:9f:53:d2:aa:92:ac:58:96:09:b2:52:f3: 57:d5:ff:33:04:2e:50:f0:ef:d1:2b:b5:31:eb:aa:6b: f2:60:fa:2c:3b:fa:75:69:5b:43:6c:d7:41:42:8b:a8: ab:be:b3:01:00:31:2a:5b:3f:d3:e5:c1:7f:76:1f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:8b:8a:66:18:52:d2:b3:39:15:33:33:0d:5e:b6:c8: 22:a3:95:bd:91:8e:07:cb:d2:d9:42:68:30:26:dd:95: 86:1f:3d:e8:2e:cd:ce:12:fb:04:62:8b:8b:d0:00:a9: bd:ac:c0:db:cc:58:48:bf:4a:98:14:46:15:74:d5:d9: 33:c1:cc:ba:57:10:a1:97:b1:5a:13:6c:0d:7f:51:69: cf:ef:88:58:b5:70:da:11:3e:3f:d2:e2:e6:0e:33:02: 1b:c5:72:0a:08:b3:90:dd:52:d3:24:32:a2:db:90:e9: 14:14:20:02:e7:97:5e:35:f3:af:c3:8a:17:a3:9d:5f: 53:d8:08:df:22:81:37:ee:80:b9:3a:9f:15:2e:9b:90: 88:34:85:86:d4:50:be:b1:72:06:79:54:35:85:ba:06: 0d:95:49:0c:56:ce:f2:b8:bb:d9:75:57:4b:1c:a0:0a: 14:c4:76:c4:f5:40:0d:69:74:ff:38:6e:5c:b1:62:b6: 24:9f:e4:75:90:75:ae:84:f3:ba:25:a9:f9:ff:4f:1d: be:42:01:c4:00:75:0e:bc:74:9c:25:35:1f:f0:1f:c8: fd:64:42:1c:6e:be:df:7b:ed:0a:78:cd:75:44:08:cb: 2d:8d:8d:10:84:84:4a:40:23:7d:89:17:49:f4:4c:7e Fingerprint (SHA-256): A8:D2:0B:66:1B:F9:82:BC:EE:A8:71:C1:0D:02:8B:B4:99:19:10:EB:69:97:5D:FF:38:19:99:03:AA:DD:D8:44 Fingerprint (SHA1): C5:08:36:04:FB:BA:58:BE:E5:C2:DD:F2:51:75:3E:B3:B9:21:99:F3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194435 (0x433ee183) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:45:13 2025 Not After : Thu Nov 28 11:45:13 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:28:74:0b:2a:5b:e4:6e:e7:cc:51:30:d1:db:e5:7b: f4:ba:7f:9b:28:22:77:25:fd:90:1e:28:c0:c1:26:c8: 47:6f:39:76:3e:da:38:d5:0f:eb:de:76:0f:de:bf:85: 28:97:c5:d7:8f:24:8d:02:11:5a:73:91:f8:eb:8c:36: d2:58:bb:60:34:1e:e1:15:57:e7:d4:17:94:07:2f:4d: b1:a0:42:6e:4d:32:7d:3c:f3:2b:75:a0:1a:ed:c1:4d: 32:e5:03:2f:e7:2e:e2:c4:15:c0:8f:15:54:71:43:ee: fc:02:cb:a3:d9:f8:fb:72:78:5a:2a:4a:f2:f7:5a:51: fa:29:ac:3a:18:07:ea:1b:84:2d:be:58:e2:41:86:ef: 69:35:c6:63:7c:31:ab:20:36:3c:c2:72:4b:40:c8:9e: 0e:cf:5a:5b:5b:fd:a2:45:44:7f:0c:48:97:fe:96:65: f5:d5:74:74:71:b0:25:eb:b5:93:6f:9f:2e:d4:1e:3a: fc:12:84:98:52:7b:a7:2d:f1:6e:98:cd:9f:f3:cc:95: 08:05:77:5f:36:d4:08:99:f1:25:0c:17:8e:21:8f:9d: 7e:e4:b4:e7:8d:b8:ba:72:8e:fb:98:60:10:94:32:72: e5:44:8d:84:64:8a:d1:6e:61:2c:9c:f0:6d:ed:0b:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:ad:9b:b7:6f:fb:4d:5e:e5:3c:fe:48:5d:53:cf:f4: 89:68:3d:84:67:5b:13:ae:5c:72:e8:b8:e8:23:b6:37: 28:ae:c0:22:dd:b3:03:a0:72:e6:0e:0a:82:fe:0e:12: dd:74:9b:ec:88:a5:0d:5b:76:3e:00:b9:a4:45:0a:1d: bf:15:b0:67:31:e0:a4:89:2f:15:5c:7b:e2:7c:4c:4b: 94:60:a2:64:a7:5a:e1:2a:07:94:6a:4a:71:4c:08:4e: a3:70:09:51:58:74:d5:08:b7:b1:8a:ba:d1:08:23:eb: ae:f5:4f:58:f3:31:b8:a9:11:7a:be:8e:b7:f2:eb:24: 19:b9:78:1b:84:e2:94:4f:65:6a:17:22:cc:20:38:14: d9:a9:96:30:93:6d:f8:8d:1f:98:71:0f:78:8a:e2:22: 8d:d1:0b:ec:6d:22:e2:0f:95:38:54:3f:4a:2e:5d:d6: 81:e7:d6:bb:db:eb:c8:48:4f:1e:a7:80:de:e9:69:cf: d5:06:0d:d1:b8:7c:72:5f:65:ca:b9:41:03:f2:d5:91: 28:61:5d:90:2f:ca:9a:90:d0:fe:cf:7e:4f:65:ef:b9: 45:80:77:6b:ea:18:52:7f:ae:bc:cd:d4:c9:7f:58:2d: 5f:63:d8:16:3d:0a:e2:d5:7f:10:fb:0e:6d:f5:af:81 Fingerprint (SHA-256): 14:EB:93:1A:CB:93:07:59:D8:73:BD:B3:FB:49:78:D8:06:34:CF:F3:BC:4C:14:4E:32:45:E8:59:A2:2E:4F:0D Fingerprint (SHA1): 72:54:E7:8A:2B:E6:E0:05:8B:97:FB:A6:97:B6:95:29:56:2B:46:5B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194436 (0x433ee184) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:13 2025 Not After : Thu Nov 28 11:45:13 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:94:70:95:62:f7:7e:5f:12:41:49:3e:5d:5f:64:ab: ff:e7:44:60:76:44:69:9f:c6:6d:a0:fd:ba:13:c3:bf: 39:73:3a:cc:4a:05:52:81:31:c9:da:de:68:5b:4a:80: 95:29:7c:89:6c:a0:8c:a0:09:fa:cb:4c:4c:d0:48:ec: e8:70:5a:37:70:3f:f0:74:2d:89:50:6d:25:98:6b:a4: de:ce:10:e6:12:b3:f6:80:d4:90:97:58:2c:0f:97:1e: ab:4d:60:4d:f3:4f:72:9b:16:12:33:a9:9b:5f:58:ea: 51:ae:b4:0a:ce:82:29:8d:40:c7:14:5c:30:1f:2b:c5: 74:a9:0a:56:f7:ca:4e:9b:45:f0:97:95:42:1c:9c:30: 8e:de:b6:81:29:96:6b:00:9a:88:42:e1:e0:6d:d2:9e: fb:6c:ea:fb:39:fa:f2:39:31:cf:d9:f6:13:95:fd:8f: ef:8a:53:29:be:af:c3:d7:eb:23:a8:f5:a9:ac:66:2d: e0:d1:23:aa:9f:53:d2:aa:92:ac:58:96:09:b2:52:f3: 57:d5:ff:33:04:2e:50:f0:ef:d1:2b:b5:31:eb:aa:6b: f2:60:fa:2c:3b:fa:75:69:5b:43:6c:d7:41:42:8b:a8: ab:be:b3:01:00:31:2a:5b:3f:d3:e5:c1:7f:76:1f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:8b:8a:66:18:52:d2:b3:39:15:33:33:0d:5e:b6:c8: 22:a3:95:bd:91:8e:07:cb:d2:d9:42:68:30:26:dd:95: 86:1f:3d:e8:2e:cd:ce:12:fb:04:62:8b:8b:d0:00:a9: bd:ac:c0:db:cc:58:48:bf:4a:98:14:46:15:74:d5:d9: 33:c1:cc:ba:57:10:a1:97:b1:5a:13:6c:0d:7f:51:69: cf:ef:88:58:b5:70:da:11:3e:3f:d2:e2:e6:0e:33:02: 1b:c5:72:0a:08:b3:90:dd:52:d3:24:32:a2:db:90:e9: 14:14:20:02:e7:97:5e:35:f3:af:c3:8a:17:a3:9d:5f: 53:d8:08:df:22:81:37:ee:80:b9:3a:9f:15:2e:9b:90: 88:34:85:86:d4:50:be:b1:72:06:79:54:35:85:ba:06: 0d:95:49:0c:56:ce:f2:b8:bb:d9:75:57:4b:1c:a0:0a: 14:c4:76:c4:f5:40:0d:69:74:ff:38:6e:5c:b1:62:b6: 24:9f:e4:75:90:75:ae:84:f3:ba:25:a9:f9:ff:4f:1d: be:42:01:c4:00:75:0e:bc:74:9c:25:35:1f:f0:1f:c8: fd:64:42:1c:6e:be:df:7b:ed:0a:78:cd:75:44:08:cb: 2d:8d:8d:10:84:84:4a:40:23:7d:89:17:49:f4:4c:7e Fingerprint (SHA-256): A8:D2:0B:66:1B:F9:82:BC:EE:A8:71:C1:0D:02:8B:B4:99:19:10:EB:69:97:5D:FF:38:19:99:03:AA:DD:D8:44 Fingerprint (SHA1): C5:08:36:04:FB:BA:58:BE:E5:C2:DD:F2:51:75:3E:B3:B9:21:99:F3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194436 (0x433ee184) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:13 2025 Not After : Thu Nov 28 11:45:13 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:94:70:95:62:f7:7e:5f:12:41:49:3e:5d:5f:64:ab: ff:e7:44:60:76:44:69:9f:c6:6d:a0:fd:ba:13:c3:bf: 39:73:3a:cc:4a:05:52:81:31:c9:da:de:68:5b:4a:80: 95:29:7c:89:6c:a0:8c:a0:09:fa:cb:4c:4c:d0:48:ec: e8:70:5a:37:70:3f:f0:74:2d:89:50:6d:25:98:6b:a4: de:ce:10:e6:12:b3:f6:80:d4:90:97:58:2c:0f:97:1e: ab:4d:60:4d:f3:4f:72:9b:16:12:33:a9:9b:5f:58:ea: 51:ae:b4:0a:ce:82:29:8d:40:c7:14:5c:30:1f:2b:c5: 74:a9:0a:56:f7:ca:4e:9b:45:f0:97:95:42:1c:9c:30: 8e:de:b6:81:29:96:6b:00:9a:88:42:e1:e0:6d:d2:9e: fb:6c:ea:fb:39:fa:f2:39:31:cf:d9:f6:13:95:fd:8f: ef:8a:53:29:be:af:c3:d7:eb:23:a8:f5:a9:ac:66:2d: e0:d1:23:aa:9f:53:d2:aa:92:ac:58:96:09:b2:52:f3: 57:d5:ff:33:04:2e:50:f0:ef:d1:2b:b5:31:eb:aa:6b: f2:60:fa:2c:3b:fa:75:69:5b:43:6c:d7:41:42:8b:a8: ab:be:b3:01:00:31:2a:5b:3f:d3:e5:c1:7f:76:1f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:8b:8a:66:18:52:d2:b3:39:15:33:33:0d:5e:b6:c8: 22:a3:95:bd:91:8e:07:cb:d2:d9:42:68:30:26:dd:95: 86:1f:3d:e8:2e:cd:ce:12:fb:04:62:8b:8b:d0:00:a9: bd:ac:c0:db:cc:58:48:bf:4a:98:14:46:15:74:d5:d9: 33:c1:cc:ba:57:10:a1:97:b1:5a:13:6c:0d:7f:51:69: cf:ef:88:58:b5:70:da:11:3e:3f:d2:e2:e6:0e:33:02: 1b:c5:72:0a:08:b3:90:dd:52:d3:24:32:a2:db:90:e9: 14:14:20:02:e7:97:5e:35:f3:af:c3:8a:17:a3:9d:5f: 53:d8:08:df:22:81:37:ee:80:b9:3a:9f:15:2e:9b:90: 88:34:85:86:d4:50:be:b1:72:06:79:54:35:85:ba:06: 0d:95:49:0c:56:ce:f2:b8:bb:d9:75:57:4b:1c:a0:0a: 14:c4:76:c4:f5:40:0d:69:74:ff:38:6e:5c:b1:62:b6: 24:9f:e4:75:90:75:ae:84:f3:ba:25:a9:f9:ff:4f:1d: be:42:01:c4:00:75:0e:bc:74:9c:25:35:1f:f0:1f:c8: fd:64:42:1c:6e:be:df:7b:ed:0a:78:cd:75:44:08:cb: 2d:8d:8d:10:84:84:4a:40:23:7d:89:17:49:f4:4c:7e Fingerprint (SHA-256): A8:D2:0B:66:1B:F9:82:BC:EE:A8:71:C1:0D:02:8B:B4:99:19:10:EB:69:97:5D:FF:38:19:99:03:AA:DD:D8:44 Fingerprint (SHA1): C5:08:36:04:FB:BA:58:BE:E5:C2:DD:F2:51:75:3E:B3:B9:21:99:F3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194443 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194444 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128194445 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128194446 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128194447 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128194448 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194449 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194450 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194451 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194452 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194443 (0x433ee18b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:45:18 2025 Not After : Thu Nov 28 11:45:18 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:0a:ba:35:ee:e5:66:4f:15:2f:f6:9e:42:8c:a0:31: 0e:dd:a5:74:58:b9:51:03:b5:74:5d:bf:98:ec:14:7c: 11:3e:3a:e8:52:e2:79:a2:48:aa:fc:4b:c7:8c:a5:ad: 46:75:3e:da:24:9a:b9:4f:bf:75:26:ba:ee:fd:d5:99: e3:15:b9:23:76:8d:85:60:39:cd:a6:b1:15:af:7a:6b: 05:ce:3a:ca:9a:57:1a:ee:e1:05:03:9a:aa:8b:4f:04: fd:02:b2:b0:37:aa:0f:6d:75:1b:4f:c8:55:a6:65:91: c7:13:8f:79:4f:2e:7e:cd:6b:65:08:84:b1:bf:86:24: 9e:15:9a:28:9e:f5:ab:a3:f7:d4:94:44:de:8d:9e:6b: a3:e7:e0:e0:7e:76:66:40:3f:ee:e5:25:6c:3b:30:c8: 5c:1e:13:60:2e:32:b6:5e:ff:a3:38:4e:c4:51:bb:e0: 58:e5:74:fb:49:ab:0c:ab:9f:6d:af:18:9f:50:9a:4e: ed:a5:cf:2c:db:e6:fd:d6:b9:84:97:8d:f6:92:8a:49: b5:b6:20:91:0d:c6:68:78:c2:f1:4a:1b:ad:15:f2:f9: 2a:3e:36:49:6f:e0:27:92:a4:d3:7e:db:8d:c6:5c:5a: 4c:a7:57:80:90:69:31:ef:fd:7d:4a:bd:8d:1a:a0:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c9:81:8c:3e:72:51:4f:e5:ce:47:43:ae:a1:ec:83:50: 6b:aa:e6:f0:e4:cb:dd:e8:e4:6e:13:bd:17:8b:53:36: 96:57:1b:a4:1a:46:8e:da:1f:8c:1d:fe:04:d2:7b:83: fc:25:25:37:ad:a3:b2:39:7e:96:2c:9b:1f:f4:b3:80: 42:a2:da:2c:23:ee:4d:7e:56:73:b5:95:e3:df:42:7d: 35:5d:7c:c0:70:36:7a:24:08:25:f8:f4:fa:32:a3:64: 84:75:8a:42:45:30:4a:b4:f1:97:31:fb:bf:1f:0e:f3: 95:a0:b3:4c:53:bc:26:03:66:ff:ff:49:ac:46:56:be: e3:bb:b1:8d:6b:d2:4d:00:61:86:a1:f7:93:1e:18:a3: 69:0b:9a:71:a9:40:89:62:8c:e9:f2:69:64:ff:89:03: 93:0c:31:2b:d5:8c:3d:ca:b8:a0:e4:8f:70:6a:69:84: 61:e5:f7:e6:4d:6d:50:45:a5:d7:db:70:99:be:46:ab: 4b:e3:8a:db:79:09:26:b8:4c:29:05:5c:7a:05:66:ee: 88:25:ac:eb:06:cd:1b:a8:89:20:ed:83:5d:8c:be:b1: 2a:4f:50:9e:38:04:d5:6f:10:59:05:d8:ef:03:ef:f3: 58:9c:cf:0b:5f:75:9b:ec:27:6a:48:af:2c:79:e6:ca Fingerprint (SHA-256): AF:3A:58:F5:B5:F7:01:F0:75:6A:7F:E8:5D:11:20:02:01:0F:15:00:DA:03:26:CC:86:1F:78:D7:2F:5E:99:A6 Fingerprint (SHA1): 4B:A6:1E:C6:F9:58:B2:5C:79:B5:7F:7B:53:CA:30:FB:CC:23:88:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194444 (0x433ee18c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:45:19 2025 Not After : Thu Nov 28 11:45:19 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:97:b7:bf:90:b8:8c:71:34:1f:59:6d:bd:df:1d:56: ce:e6:3b:13:d2:bc:d9:f6:65:01:4d:a2:00:f5:49:e2: d7:c2:7e:ba:ba:90:f9:8c:eb:98:c5:ce:11:f9:a6:13: 4c:25:9b:34:ce:42:24:fe:eb:09:00:04:17:46:4f:c9: 57:2b:0f:e6:65:e5:11:87:37:1a:df:61:a5:e5:bb:cd: 78:c4:22:ef:5c:a5:50:be:24:0d:f5:8d:23:63:5e:0c: 31:9f:4a:20:af:a0:58:55:18:b3:c9:e5:dc:a7:e7:30: 12:36:38:c4:14:d8:9a:bd:6b:3e:0c:aa:d5:63:68:02: 3a:ea:e1:ed:1f:a5:e4:28:b1:68:a3:ed:03:c3:a4:19: 8d:82:99:bc:76:94:25:59:a9:94:52:0a:e1:82:b1:9c: 8d:2c:59:ff:cd:33:15:c8:4a:5a:ea:9c:e9:f7:48:39: ed:6d:33:f4:d7:ae:fc:53:0b:1c:0b:c1:08:1c:30:0a: a6:66:ca:43:5d:27:36:55:6a:42:97:6d:40:b5:13:99: 42:1b:2f:dc:c8:7c:74:18:6e:ce:01:d2:a6:58:41:e0: 65:7d:e8:51:17:c3:2f:97:f3:40:6c:fa:0e:ab:84:22: 16:53:8b:e3:31:f7:4f:22:cc:d9:89:2c:3b:93:bc:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:42:90:8c:f2:69:93:59:9c:8a:04:81:90:f9:81:91: f0:4f:75:2e:fe:9d:32:63:f0:cf:25:ea:a8:41:46:e8: 90:f4:dc:1c:be:75:30:81:d6:4e:1e:c3:84:7f:60:c5: ba:c2:6f:07:a3:49:51:59:cd:27:0b:c8:37:22:55:ae: 2d:dc:d0:e0:9a:af:4a:cc:6b:06:45:74:b7:f4:01:45: e7:03:95:47:04:4c:d3:a7:e4:e4:d5:22:12:83:10:a9: f0:c9:6a:78:80:ec:cd:20:1f:43:44:f0:08:15:1d:91: 8c:9e:b3:5e:18:ca:4e:94:e1:08:13:f1:55:21:fb:f2: 4e:ae:05:53:cd:22:23:fa:75:f8:1e:b0:80:a0:b1:f9: 91:23:2f:13:94:1d:53:9f:d6:47:61:e8:3e:1a:7c:79: 3b:8a:83:b5:f8:2f:36:82:a5:40:73:9a:b6:e9:2a:63: d5:1a:d8:ec:a8:de:f9:ae:a3:32:a8:8d:6f:92:5e:1a: 58:04:04:2a:25:a9:ad:17:15:2a:f2:4f:a7:42:34:68: 27:ee:05:10:c1:c1:a1:25:09:ae:26:9c:a7:52:ee:73: dc:58:84:4b:78:cb:42:fa:f3:1c:21:ad:bb:79:3d:5e: cb:be:87:04:a4:78:9b:36:3e:0f:b4:de:b1:e0:76:d2 Fingerprint (SHA-256): BE:2F:99:D2:A4:3D:3F:14:1C:D1:33:17:0D:F6:35:2E:85:A8:F8:08:D5:48:4D:36:06:D4:70:CE:1B:E6:E4:33 Fingerprint (SHA1): 10:99:18:1D:8C:E7:D3:CA:20:06:26:99:F6:61:14:42:28:07:F3:54 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194453 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194454 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194455 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128194456 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194457 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128194458 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128194459 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128194460 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128194461 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194453 (0x433ee195) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:26 2025 Not After : Thu Nov 28 11:45:26 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:6b:9c:eb:a7:93:89:d8:f7:92:e5:82:14:34:42:6c: e2:af:36:ea:ec:79:cc:4a:0c:89:1b:cd:d4:7c:2f:1c: 45:0f:d3:1b:39:cd:9e:83:9e:64:a7:1b:19:e4:4c:8f: 63:a6:3a:ab:41:67:9e:6c:07:5e:b7:7a:1e:d4:49:d4: df:fe:c1:9b:af:2e:75:23:8e:2a:8c:ac:0c:a8:fd:29: 31:f8:71:29:41:ca:81:e0:73:21:91:62:35:78:1c:b5: 13:0f:8e:cb:bf:ec:30:a4:00:bd:ad:07:ab:e6:01:50: 3d:0f:9a:b2:18:93:75:d6:16:3c:7a:4a:7b:87:c4:23: 0a:f6:fe:29:53:dc:5d:73:7c:c2:94:81:05:1f:e2:6f: 9c:d6:42:57:bf:72:4a:69:c8:ff:9e:11:ac:46:c9:59: 39:22:76:b8:f4:0c:80:15:f5:1c:9c:94:e2:14:e9:91: 9a:90:c5:c5:54:f0:c7:72:e2:a1:31:12:27:f1:c3:ac: b0:25:24:38:d3:19:83:ae:f9:4d:70:2f:12:a7:a4:f3: 17:6a:06:dd:6a:66:6c:1f:ed:15:a2:cc:23:43:d0:49: 43:8b:4e:fb:e7:b1:ae:b7:19:a3:c8:4e:08:56:17:00: f9:5b:d0:4f:13:d5:27:d0:5a:a9:dd:e9:4f:c9:1c:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:2d:5b:73:00:d6:2c:73:ab:30:02:b0:b9: b1:f7:92:ac:b1:03:a7:9c:18:79:87:b7:07:49:d4:66: 02:1c:7e:a7:46:f2:87:9a:f8:b5:77:ed:02:00:8b:df: 15:a4:2a:75:b9:4c:33:9c:8e:94:7f:94:3e:8a Fingerprint (SHA-256): E9:81:7F:85:72:A1:61:7D:D3:DA:0D:14:D9:F6:7E:10:7B:E4:AE:EC:AF:F5:83:EB:8E:00:9B:7D:83:06:24:28 Fingerprint (SHA1): 1D:5F:5B:EB:CF:9F:D9:64:DF:0D:FC:3F:BB:66:BB:11:F3:D7:F8:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194453 (0x433ee195) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:26 2025 Not After : Thu Nov 28 11:45:26 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:6b:9c:eb:a7:93:89:d8:f7:92:e5:82:14:34:42:6c: e2:af:36:ea:ec:79:cc:4a:0c:89:1b:cd:d4:7c:2f:1c: 45:0f:d3:1b:39:cd:9e:83:9e:64:a7:1b:19:e4:4c:8f: 63:a6:3a:ab:41:67:9e:6c:07:5e:b7:7a:1e:d4:49:d4: df:fe:c1:9b:af:2e:75:23:8e:2a:8c:ac:0c:a8:fd:29: 31:f8:71:29:41:ca:81:e0:73:21:91:62:35:78:1c:b5: 13:0f:8e:cb:bf:ec:30:a4:00:bd:ad:07:ab:e6:01:50: 3d:0f:9a:b2:18:93:75:d6:16:3c:7a:4a:7b:87:c4:23: 0a:f6:fe:29:53:dc:5d:73:7c:c2:94:81:05:1f:e2:6f: 9c:d6:42:57:bf:72:4a:69:c8:ff:9e:11:ac:46:c9:59: 39:22:76:b8:f4:0c:80:15:f5:1c:9c:94:e2:14:e9:91: 9a:90:c5:c5:54:f0:c7:72:e2:a1:31:12:27:f1:c3:ac: b0:25:24:38:d3:19:83:ae:f9:4d:70:2f:12:a7:a4:f3: 17:6a:06:dd:6a:66:6c:1f:ed:15:a2:cc:23:43:d0:49: 43:8b:4e:fb:e7:b1:ae:b7:19:a3:c8:4e:08:56:17:00: f9:5b:d0:4f:13:d5:27:d0:5a:a9:dd:e9:4f:c9:1c:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:2d:5b:73:00:d6:2c:73:ab:30:02:b0:b9: b1:f7:92:ac:b1:03:a7:9c:18:79:87:b7:07:49:d4:66: 02:1c:7e:a7:46:f2:87:9a:f8:b5:77:ed:02:00:8b:df: 15:a4:2a:75:b9:4c:33:9c:8e:94:7f:94:3e:8a Fingerprint (SHA-256): E9:81:7F:85:72:A1:61:7D:D3:DA:0D:14:D9:F6:7E:10:7B:E4:AE:EC:AF:F5:83:EB:8E:00:9B:7D:83:06:24:28 Fingerprint (SHA1): 1D:5F:5B:EB:CF:9F:D9:64:DF:0D:FC:3F:BB:66:BB:11:F3:D7:F8:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194453 (0x433ee195) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:26 2025 Not After : Thu Nov 28 11:45:26 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:6b:9c:eb:a7:93:89:d8:f7:92:e5:82:14:34:42:6c: e2:af:36:ea:ec:79:cc:4a:0c:89:1b:cd:d4:7c:2f:1c: 45:0f:d3:1b:39:cd:9e:83:9e:64:a7:1b:19:e4:4c:8f: 63:a6:3a:ab:41:67:9e:6c:07:5e:b7:7a:1e:d4:49:d4: df:fe:c1:9b:af:2e:75:23:8e:2a:8c:ac:0c:a8:fd:29: 31:f8:71:29:41:ca:81:e0:73:21:91:62:35:78:1c:b5: 13:0f:8e:cb:bf:ec:30:a4:00:bd:ad:07:ab:e6:01:50: 3d:0f:9a:b2:18:93:75:d6:16:3c:7a:4a:7b:87:c4:23: 0a:f6:fe:29:53:dc:5d:73:7c:c2:94:81:05:1f:e2:6f: 9c:d6:42:57:bf:72:4a:69:c8:ff:9e:11:ac:46:c9:59: 39:22:76:b8:f4:0c:80:15:f5:1c:9c:94:e2:14:e9:91: 9a:90:c5:c5:54:f0:c7:72:e2:a1:31:12:27:f1:c3:ac: b0:25:24:38:d3:19:83:ae:f9:4d:70:2f:12:a7:a4:f3: 17:6a:06:dd:6a:66:6c:1f:ed:15:a2:cc:23:43:d0:49: 43:8b:4e:fb:e7:b1:ae:b7:19:a3:c8:4e:08:56:17:00: f9:5b:d0:4f:13:d5:27:d0:5a:a9:dd:e9:4f:c9:1c:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:2d:5b:73:00:d6:2c:73:ab:30:02:b0:b9: b1:f7:92:ac:b1:03:a7:9c:18:79:87:b7:07:49:d4:66: 02:1c:7e:a7:46:f2:87:9a:f8:b5:77:ed:02:00:8b:df: 15:a4:2a:75:b9:4c:33:9c:8e:94:7f:94:3e:8a Fingerprint (SHA-256): E9:81:7F:85:72:A1:61:7D:D3:DA:0D:14:D9:F6:7E:10:7B:E4:AE:EC:AF:F5:83:EB:8E:00:9B:7D:83:06:24:28 Fingerprint (SHA1): 1D:5F:5B:EB:CF:9F:D9:64:DF:0D:FC:3F:BB:66:BB:11:F3:D7:F8:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194453 (0x433ee195) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:26 2025 Not After : Thu Nov 28 11:45:26 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 66:6b:9c:eb:a7:93:89:d8:f7:92:e5:82:14:34:42:6c: e2:af:36:ea:ec:79:cc:4a:0c:89:1b:cd:d4:7c:2f:1c: 45:0f:d3:1b:39:cd:9e:83:9e:64:a7:1b:19:e4:4c:8f: 63:a6:3a:ab:41:67:9e:6c:07:5e:b7:7a:1e:d4:49:d4: df:fe:c1:9b:af:2e:75:23:8e:2a:8c:ac:0c:a8:fd:29: 31:f8:71:29:41:ca:81:e0:73:21:91:62:35:78:1c:b5: 13:0f:8e:cb:bf:ec:30:a4:00:bd:ad:07:ab:e6:01:50: 3d:0f:9a:b2:18:93:75:d6:16:3c:7a:4a:7b:87:c4:23: 0a:f6:fe:29:53:dc:5d:73:7c:c2:94:81:05:1f:e2:6f: 9c:d6:42:57:bf:72:4a:69:c8:ff:9e:11:ac:46:c9:59: 39:22:76:b8:f4:0c:80:15:f5:1c:9c:94:e2:14:e9:91: 9a:90:c5:c5:54:f0:c7:72:e2:a1:31:12:27:f1:c3:ac: b0:25:24:38:d3:19:83:ae:f9:4d:70:2f:12:a7:a4:f3: 17:6a:06:dd:6a:66:6c:1f:ed:15:a2:cc:23:43:d0:49: 43:8b:4e:fb:e7:b1:ae:b7:19:a3:c8:4e:08:56:17:00: f9:5b:d0:4f:13:d5:27:d0:5a:a9:dd:e9:4f:c9:1c:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:2d:5b:73:00:d6:2c:73:ab:30:02:b0:b9: b1:f7:92:ac:b1:03:a7:9c:18:79:87:b7:07:49:d4:66: 02:1c:7e:a7:46:f2:87:9a:f8:b5:77:ed:02:00:8b:df: 15:a4:2a:75:b9:4c:33:9c:8e:94:7f:94:3e:8a Fingerprint (SHA-256): E9:81:7F:85:72:A1:61:7D:D3:DA:0D:14:D9:F6:7E:10:7B:E4:AE:EC:AF:F5:83:EB:8E:00:9B:7D:83:06:24:28 Fingerprint (SHA1): 1D:5F:5B:EB:CF:9F:D9:64:DF:0D:FC:3F:BB:66:BB:11:F3:D7:F8:E0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128114535Z nextupdate=20261128114535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:45:35 2025 Next Update: Sat Nov 28 11:45:35 2026 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114535Z nextupdate=20261128114535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:45:35 2025 Next Update: Sat Nov 28 11:45:35 2026 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114535Z nextupdate=20261128114535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:45:35 2025 Next Update: Sat Nov 28 11:45:35 2026 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128114535Z nextupdate=20261128114535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:45:35 2025 Next Update: Sat Nov 28 11:45:35 2026 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114536Z addcert 14 20251128114536Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:45:36 2025 Next Update: Sat Nov 28 11:45:35 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:45:36 2025 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114537Z addcert 15 20251128114537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:45:37 2025 Next Update: Sat Nov 28 11:45:35 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:45:37 2025 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:31 2025 Not After : Thu Nov 28 11:45:31 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:2d:85:a4:6a:85:f9:20:ff:48:9f:0a:d9:f7:94:6c: 8e:a0:b3:2e:83:b2:ce:8f:09:b7:00:b8:ec:50:be:39: 63:85:04:fc:c9:77:5b:ef:fc:64:b2:f7:54:1d:7e:33: 3c:ae:cd:26:89:a2:cb:f1:a4:eb:af:65:03:ea:ef:08: da:83:ac:8f:7e:54:30:46:c6:af:84:dd:c3:c7:2e:c8: c5:ed:8f:13:8e:9e:8b:d4:97:b8:fa:87:e4:1c:60:7f: 71:38:1d:23:d9:c8:80:4b:00:8d:05:f1:a8:8f:2f:6a: 0a:42:c3:d8:58:8b:b7:65:bf:8e:98:81:3b:52:06:f4: 28:9a:49:52:5b:20:4a:8e:11:77:02:68:81:83:e1:59: 07:72:40:bc:fa:b6:20:50:1a:1f:d4:ae:3f:9e:bd:f3: 03:86:09:00:3c:fc:63:98:ea:ec:ec:2b:84:36:b6:f8: 46:27:8e:d4:f4:28:cd:12:68:9d:7b:04:25:a0:15:51: 3b:f7:4c:af:17:49:ac:e2:02:10:db:98:3e:ec:88:82: e2:4a:23:26:a3:db:9d:c2:92:b6:dd:1d:38:08:76:1c: ce:6e:e1:88:be:43:fa:fa:38:35:82:d8:03:6b:43:76: cb:9b:e5:3c:e0:53:a7:42:22:14:72:8b:00:8a:fa:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:96:ef:62:db:fb:36:8c:f8:f5:d5:32:7a:b2:c2:b7: 20:fb:5b:e3:76:ef:2a:66:26:bd:b4:19:7f:06:7f:16: 74:fb:5f:8c:d9:01:60:14:44:93:5f:ad:06:73:7b:97: 4c:5b:b8:c8:98:fa:c7:af:a9:72:46:02:e7:6c:2e:3e: 63:77:ce:26:68:33:f7:1e:dd:da:c1:b4:0b:79:2f:0b: fb:3b:8d:f5:a8:79:91:af:3f:66:35:56:17:71:0c:c2: f0:8d:ea:e3:9d:44:02:43:aa:ec:e0:f6:35:52:6e:db: a1:38:bb:51:65:31:58:2c:15:6c:70:82:23:cd:68:d1: 89:8b:07:57:dd:96:03:9d:8c:cd:70:3b:1b:a6:5b:6b: ef:63:47:4c:35:6e:c3:51:3f:3c:08:de:66:cc:e3:fc: 40:b0:b5:55:88:5b:5f:cd:e7:41:88:aa:42:60:08:ff: ea:be:08:0c:a6:84:7b:84:f7:ac:60:23:be:ec:9c:27: 29:c2:2e:f0:e5:b2:f2:01:88:21:71:32:ea:b4:fd:06: b7:e7:69:4a:55:a4:95:35:e7:b8:55:ec:2b:f4:af:3f: d7:84:2f:94:7e:e4:8b:da:13:c2:a4:fc:1f:e0:88:47: 93:c1:55:75:1d:02:55:85:68:36:33:71:fc:0d:10:4a Fingerprint (SHA-256): 4A:F5:E0:C5:20:2E:33:23:B6:BF:EC:1D:C5:E3:37:59:71:A7:E6:57:B5:26:78:EC:11:E4:A2:AC:71:53:0E:C3 Fingerprint (SHA1): 7F:9D:D2:E9:6A:FC:04:EF:C4:7E:BF:08:C2:53:02:E9:CF:FE:FB:09 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:31 2025 Not After : Thu Nov 28 11:45:31 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:2d:85:a4:6a:85:f9:20:ff:48:9f:0a:d9:f7:94:6c: 8e:a0:b3:2e:83:b2:ce:8f:09:b7:00:b8:ec:50:be:39: 63:85:04:fc:c9:77:5b:ef:fc:64:b2:f7:54:1d:7e:33: 3c:ae:cd:26:89:a2:cb:f1:a4:eb:af:65:03:ea:ef:08: da:83:ac:8f:7e:54:30:46:c6:af:84:dd:c3:c7:2e:c8: c5:ed:8f:13:8e:9e:8b:d4:97:b8:fa:87:e4:1c:60:7f: 71:38:1d:23:d9:c8:80:4b:00:8d:05:f1:a8:8f:2f:6a: 0a:42:c3:d8:58:8b:b7:65:bf:8e:98:81:3b:52:06:f4: 28:9a:49:52:5b:20:4a:8e:11:77:02:68:81:83:e1:59: 07:72:40:bc:fa:b6:20:50:1a:1f:d4:ae:3f:9e:bd:f3: 03:86:09:00:3c:fc:63:98:ea:ec:ec:2b:84:36:b6:f8: 46:27:8e:d4:f4:28:cd:12:68:9d:7b:04:25:a0:15:51: 3b:f7:4c:af:17:49:ac:e2:02:10:db:98:3e:ec:88:82: e2:4a:23:26:a3:db:9d:c2:92:b6:dd:1d:38:08:76:1c: ce:6e:e1:88:be:43:fa:fa:38:35:82:d8:03:6b:43:76: cb:9b:e5:3c:e0:53:a7:42:22:14:72:8b:00:8a:fa:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:96:ef:62:db:fb:36:8c:f8:f5:d5:32:7a:b2:c2:b7: 20:fb:5b:e3:76:ef:2a:66:26:bd:b4:19:7f:06:7f:16: 74:fb:5f:8c:d9:01:60:14:44:93:5f:ad:06:73:7b:97: 4c:5b:b8:c8:98:fa:c7:af:a9:72:46:02:e7:6c:2e:3e: 63:77:ce:26:68:33:f7:1e:dd:da:c1:b4:0b:79:2f:0b: fb:3b:8d:f5:a8:79:91:af:3f:66:35:56:17:71:0c:c2: f0:8d:ea:e3:9d:44:02:43:aa:ec:e0:f6:35:52:6e:db: a1:38:bb:51:65:31:58:2c:15:6c:70:82:23:cd:68:d1: 89:8b:07:57:dd:96:03:9d:8c:cd:70:3b:1b:a6:5b:6b: ef:63:47:4c:35:6e:c3:51:3f:3c:08:de:66:cc:e3:fc: 40:b0:b5:55:88:5b:5f:cd:e7:41:88:aa:42:60:08:ff: ea:be:08:0c:a6:84:7b:84:f7:ac:60:23:be:ec:9c:27: 29:c2:2e:f0:e5:b2:f2:01:88:21:71:32:ea:b4:fd:06: b7:e7:69:4a:55:a4:95:35:e7:b8:55:ec:2b:f4:af:3f: d7:84:2f:94:7e:e4:8b:da:13:c2:a4:fc:1f:e0:88:47: 93:c1:55:75:1d:02:55:85:68:36:33:71:fc:0d:10:4a Fingerprint (SHA-256): 4A:F5:E0:C5:20:2E:33:23:B6:BF:EC:1D:C5:E3:37:59:71:A7:E6:57:B5:26:78:EC:11:E4:A2:AC:71:53:0E:C3 Fingerprint (SHA1): 7F:9D:D2:E9:6A:FC:04:EF:C4:7E:BF:08:C2:53:02:E9:CF:FE:FB:09 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #914: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #915: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #916: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #917: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #918: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114539Z nextupdate=20261128114539Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:45:39 2025 Next Update: Sat Nov 28 11:45:39 2026 CRL Extensions: chains.sh: #919: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114540Z addcert 3 20251128114540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:45:40 2025 Next Update: Sat Nov 28 11:45:39 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:45:40 2025 CRL Extensions: chains.sh: #920: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114541Z addcert 4 20251128114541Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:45:41 2025 Next Update: Sat Nov 28 11:45:39 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:45:41 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:45:40 2025 CRL Extensions: chains.sh: #921: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #922: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #923: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #924: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #925: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #926: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #927: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #928: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #929: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #930: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #931: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #932: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #933: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #934: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:19 2025 Not After : Thu Nov 28 11:43:19 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d6:f1:0b:25:22:d3:c2:d4:cf:0c:fb:e3:e2:c5:49: d8:b0:f4:46:9b:88:03:6c:64:b1:ea:9b:93:b0:09:04: f1:10:d4:65:75:de:86:ee:4b:e7:2d:85:22:cd:2e:1c: 93:2e:f3:de:f8:d2:8f:ca:3f:1c:2a:ef:d8:85:0d:71: 2b:91:c9:81:80:02:16:42:72:69:23:a7:f7:7d:6d:76: ef:b8:1a:d9:e2:4b:74:7d:95:ef:a1:97:4f:83:47:7f: 7d:9d:87:ec:58:74:10:ed:3e:ea:06:1e:fc:dc:97:d4: dc:35:65:4d:db:01:df:ba:10:7e:36:82:85:be:1e:f5: ee:b3:35:be:5e:f1:2f:1e:a0:05:32:ef:57:42:26:4f: 26:01:14:84:ac:c9:28:80:89:34:57:65:31:4b:15:02: b0:ef:89:e8:e9:52:ee:db:58:21:45:39:fa:d7:9d:8a: 0d:40:69:54:8d:b3:b4:2c:f5:de:93:1b:c4:9b:38:4d: 67:84:1a:f6:08:66:1a:05:ef:0f:04:cb:b2:db:67:9f: 67:4f:c3:15:61:a3:d3:f6:c6:12:83:b1:41:f7:41:ce: 68:fd:32:10:72:1b:f5:95:7e:be:41:cc:b6:95:a9:9b: 1d:c6:82:2e:d5:e0:1b:18:af:95:1f:2b:b3:14:bd:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:8c:b0:32:75:bd:a8:10:ca:5c:cc:23:6a:22:f6:38: 4a:a3:8e:41:36:5a:9f:98:fd:d9:f4:66:30:90:71:71: 11:44:58:ec:56:7d:56:5f:d3:a1:26:b1:a4:56:54:68: 62:a0:61:6d:c5:37:bc:03:82:95:c0:ad:d1:4b:b4:10: 9b:10:87:91:ce:45:c8:25:a1:af:84:bc:21:47:98:8a: 42:11:36:30:f2:01:7e:72:ee:3c:ea:dd:4b:8c:56:b9: 28:25:1f:1d:01:5f:4d:66:6d:ef:c8:b1:88:1d:ab:d7: 5e:df:ef:04:0e:85:ee:fa:7d:45:75:ef:74:da:3f:27: f8:9b:63:e7:e2:72:cd:5a:cd:4c:52:77:45:60:78:99: b2:8b:2a:96:e9:79:0b:7d:d7:2b:1a:84:64:e3:93:6e: 26:fa:82:5e:dc:97:92:3d:3d:bb:ea:d3:72:6e:98:08: 15:2f:1b:24:38:a8:0c:6a:60:e3:e8:07:79:6c:ac:7c: 96:57:b3:ce:5d:d7:4e:5e:63:ff:78:0d:3b:1d:82:b1: 21:ef:63:9d:87:cc:05:6d:af:dc:55:fb:14:e1:4d:03: 36:30:7d:cb:4e:ff:e3:0e:82:19:62:13:67:0d:59:71: af:6c:36:53:95:1f:99:48:07:a3:f8:11:02:9d:5f:0c Fingerprint (SHA-256): 57:EA:58:A2:4D:27:1D:9D:E7:D4:FE:10:EA:06:CC:2B:CC:E8:84:A0:17:40:0A:20:4F:F1:4D:FA:66:7E:87:FE Fingerprint (SHA1): 39:4C:AF:9B:41:9E:A2:BC:8C:F9:B1:11:D9:2E:35:E0:3D:A8:5C:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #935: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #936: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #937: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #938: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #939: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #940: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #941: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #942: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194462 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #944: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #945: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #946: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128194463 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #947: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #948: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #949: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194339.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #950: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194322.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #951: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #953: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194339.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #954: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128194464 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #955: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #956: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #957: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194339.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #958: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194323.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #959: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #960: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #961: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128194465 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #963: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #965: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194339.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #966: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194324.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #967: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #969: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194339.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #970: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194325.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #971: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128114548Z nextupdate=20261128114548Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:45:48 2025 Next Update: Sat Nov 28 11:45:48 2026 CRL Extensions: chains.sh: #973: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114548Z nextupdate=20261128114548Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:45:48 2025 Next Update: Sat Nov 28 11:45:48 2026 CRL Extensions: chains.sh: #974: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114548Z nextupdate=20261128114548Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:45:48 2025 Next Update: Sat Nov 28 11:45:48 2026 CRL Extensions: chains.sh: #975: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128114549Z nextupdate=20261128114549Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:45:49 2025 Next Update: Sat Nov 28 11:45:49 2026 CRL Extensions: chains.sh: #976: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114550Z addcert 20 20251128114550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:45:50 2025 Next Update: Sat Nov 28 11:45:48 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:45:50 2025 CRL Extensions: chains.sh: #977: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114551Z addcert 40 20251128114551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:45:51 2025 Next Update: Sat Nov 28 11:45:48 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:45:50 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:45:51 2025 CRL Extensions: chains.sh: #978: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #979: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #980: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #981: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194462 (0x433ee19e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:43 2025 Not After : Thu Nov 28 11:45:43 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:19:cd:b9:a4:58:38:6e:66:c0:47:95:f9:53:22:e0: 5a:28:b2:9a:6f:b4:d7:95:80:48:b8:2d:e2:40:b1:1b: da:f1:15:f5:51:5d:9d:b9:15:dc:5a:e0:d8:9c:e0:c4: 2a:b5:c0:ca:01:98:98:2d:3d:b5:c3:6a:97:c8:3b:b5: c3:2a:88:ea:26:0d:71:ca:2a:a4:93:1f:65:a7:ff:ec: 17:fd:88:d2:42:e8:65:70:e5:bc:53:3e:ee:43:89:a1: a0:0c:55:ce:47:cd:a6:2e:b9:8e:a4:2b:67:db:7b:cf: 80:9f:49:cb:c6:fb:a8:a5:70:e1:b3:af:60:b4:d9:78: d6:e0:cf:7a:f5:38:0e:80:6e:d0:6a:41:f7:a7:d3:60: e0:7e:89:fa:5a:24:d4:53:20:b6:28:d4:ee:e6:9d:67: e8:c9:0f:95:6f:46:db:f5:16:3f:ab:25:6c:40:a4:51: 3b:81:ec:1f:9e:52:79:b8:95:ac:c5:7a:98:9b:1e:da: e3:41:c8:c4:be:73:f2:33:e0:5c:5e:b3:ae:8f:b9:f2: 9d:ca:5d:98:31:bc:30:04:45:34:6e:a7:1c:a1:f4:a4: 1b:c9:ab:26:f1:11:3a:cd:01:3b:c4:78:b6:2e:78:1c: 52:83:61:05:03:b7:d6:e3:96:c0:84:25:1e:94:37:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:25:2b:29:84:0f:70:92:08:55:4f:0f:42:24:63:da: 37:75:e8:5a:8d:16:fb:b4:06:64:37:83:db:fd:35:e2: 87:ee:14:23:9c:b1:42:81:d6:19:8d:fa:4b:00:ec:d6: 26:aa:32:98:52:d3:6e:84:16:db:d9:63:91:cc:80:af: 84:a6:35:4f:27:7f:de:0b:eb:58:52:58:a8:d6:10:e9: 7f:74:08:aa:6a:af:26:99:bc:3a:89:6a:21:c5:b4:d4: 55:ef:99:fc:a4:26:4a:41:66:ed:72:7a:11:26:51:8d: e1:6f:08:53:8a:e3:9a:ae:e4:29:80:7a:a7:81:56:9a: 60:5b:79:44:69:9e:44:6b:9b:3d:77:78:58:da:c2:06: 86:8d:99:57:a0:29:73:49:72:7f:74:a6:66:1b:e5:64: 4e:5e:7c:5e:f5:f2:60:cd:af:db:fb:45:98:72:e2:ea: f6:69:00:11:14:d8:da:db:13:84:2a:84:6a:2b:ad:01: bb:1d:1d:d9:63:86:4b:86:ec:2b:ec:d2:4b:22:b8:00: ae:ee:9f:f4:91:63:55:07:1b:e2:38:8f:af:85:6e:69: 95:d1:8a:0d:1d:62:12:03:a0:dd:5a:fc:90:94:6b:86: b3:9b:69:f6:71:2d:61:ed:e9:56:5a:ee:86:8c:fb:3c Fingerprint (SHA-256): B8:0C:DD:CD:F2:71:95:2E:71:5A:C9:9C:6E:E4:BD:29:E8:AA:EF:E6:00:B4:2B:CA:4E:36:26:1C:5E:57:27:1C Fingerprint (SHA1): FB:60:BA:D4:0E:D5:A0:B5:C1:B2:41:A4:1F:E6:45:76:8E:EE:DE:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #982: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #983: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194462 (0x433ee19e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:45:43 2025 Not After : Thu Nov 28 11:45:43 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:19:cd:b9:a4:58:38:6e:66:c0:47:95:f9:53:22:e0: 5a:28:b2:9a:6f:b4:d7:95:80:48:b8:2d:e2:40:b1:1b: da:f1:15:f5:51:5d:9d:b9:15:dc:5a:e0:d8:9c:e0:c4: 2a:b5:c0:ca:01:98:98:2d:3d:b5:c3:6a:97:c8:3b:b5: c3:2a:88:ea:26:0d:71:ca:2a:a4:93:1f:65:a7:ff:ec: 17:fd:88:d2:42:e8:65:70:e5:bc:53:3e:ee:43:89:a1: a0:0c:55:ce:47:cd:a6:2e:b9:8e:a4:2b:67:db:7b:cf: 80:9f:49:cb:c6:fb:a8:a5:70:e1:b3:af:60:b4:d9:78: d6:e0:cf:7a:f5:38:0e:80:6e:d0:6a:41:f7:a7:d3:60: e0:7e:89:fa:5a:24:d4:53:20:b6:28:d4:ee:e6:9d:67: e8:c9:0f:95:6f:46:db:f5:16:3f:ab:25:6c:40:a4:51: 3b:81:ec:1f:9e:52:79:b8:95:ac:c5:7a:98:9b:1e:da: e3:41:c8:c4:be:73:f2:33:e0:5c:5e:b3:ae:8f:b9:f2: 9d:ca:5d:98:31:bc:30:04:45:34:6e:a7:1c:a1:f4:a4: 1b:c9:ab:26:f1:11:3a:cd:01:3b:c4:78:b6:2e:78:1c: 52:83:61:05:03:b7:d6:e3:96:c0:84:25:1e:94:37:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:25:2b:29:84:0f:70:92:08:55:4f:0f:42:24:63:da: 37:75:e8:5a:8d:16:fb:b4:06:64:37:83:db:fd:35:e2: 87:ee:14:23:9c:b1:42:81:d6:19:8d:fa:4b:00:ec:d6: 26:aa:32:98:52:d3:6e:84:16:db:d9:63:91:cc:80:af: 84:a6:35:4f:27:7f:de:0b:eb:58:52:58:a8:d6:10:e9: 7f:74:08:aa:6a:af:26:99:bc:3a:89:6a:21:c5:b4:d4: 55:ef:99:fc:a4:26:4a:41:66:ed:72:7a:11:26:51:8d: e1:6f:08:53:8a:e3:9a:ae:e4:29:80:7a:a7:81:56:9a: 60:5b:79:44:69:9e:44:6b:9b:3d:77:78:58:da:c2:06: 86:8d:99:57:a0:29:73:49:72:7f:74:a6:66:1b:e5:64: 4e:5e:7c:5e:f5:f2:60:cd:af:db:fb:45:98:72:e2:ea: f6:69:00:11:14:d8:da:db:13:84:2a:84:6a:2b:ad:01: bb:1d:1d:d9:63:86:4b:86:ec:2b:ec:d2:4b:22:b8:00: ae:ee:9f:f4:91:63:55:07:1b:e2:38:8f:af:85:6e:69: 95:d1:8a:0d:1d:62:12:03:a0:dd:5a:fc:90:94:6b:86: b3:9b:69:f6:71:2d:61:ed:e9:56:5a:ee:86:8c:fb:3c Fingerprint (SHA-256): B8:0C:DD:CD:F2:71:95:2E:71:5A:C9:9C:6E:E4:BD:29:E8:AA:EF:E6:00:B4:2B:CA:4E:36:26:1C:5E:57:27:1C Fingerprint (SHA1): FB:60:BA:D4:0E:D5:A0:B5:C1:B2:41:A4:1F:E6:45:76:8E:EE:DE:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #984: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #985: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #986: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194466 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #987: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #988: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #989: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #990: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194467 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #991: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #992: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #994: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194468 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #995: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #996: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #997: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #998: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128194469 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #999: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1000: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1001: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194470 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1002: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1003: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1004: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1005: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128194471 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1006: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1007: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1008: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1009: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128194472 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1010: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1011: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1012: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1013: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1014: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194466 (0x433ee1a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:45:52 2025 Not After : Thu Nov 28 11:45:52 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2c:e4:50:13:6a:c6:ec:1d:9d:a3:6d:52:92:b0:9d: 22:1c:24:97:9f:42:ab:a0:48:67:65:10:d5:ee:de:f5: a1:8f:75:71:9b:9e:3e:c6:36:58:df:5e:d8:b0:2f:db: 37:0f:ac:8a:6e:78:2d:1e:2d:07:17:00:7a:bd:2a:b0: f1:fa:9f:09:e0:3e:cb:fa:53:10:26:75:c3:df:a0:af: 22:47:49:b3:d1:d0:29:63:99:15:12:58:e1:ee:74:c1: 3d:3a:68:3b:81:ac:b8:6d:b1:b3:e6:97:42:ac:e3:91: cf:3e:c7:28:62:32:50:69:fc:49:4f:15:87:cf:20:61: bb:4f:56:4f:76:ab:89:5f:54:be:e4:55:8f:ef:64:4e: a1:ec:d8:fe:f8:ca:a7:d5:0b:4c:6b:e2:16:86:fb:35: de:80:d1:3c:ae:53:7b:d5:d3:72:16:70:88:6c:38:bb: fb:3b:ca:83:62:fe:43:46:72:0e:81:e1:99:0e:95:36: 0b:01:24:84:4d:34:11:f3:80:76:b0:6e:26:23:7c:0f: 6b:c5:2b:80:1c:04:ad:59:40:e5:2d:b4:fc:31:fe:34: 01:ec:db:c6:61:f1:fc:d8:34:86:91:07:68:7a:4f:4d: b6:bb:af:da:2e:fd:24:7c:8c:50:ae:66:dc:22:b9:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:e9:aa:07:a7:6f:f0:6f:49:28:d5:83:23:7d:76:56: 03:47:83:d3:47:b9:2b:fd:6f:e7:b0:76:7e:ff:f4:5f: 2c:4c:2b:31:c7:91:58:a7:3f:75:08:58:78:86:af:ff: 11:b6:b1:c5:16:87:22:5b:7e:cb:b1:47:55:e2:24:cd: 7b:d7:2e:5b:ae:6f:a3:58:17:8d:24:d2:c0:b1:d4:7f: f9:13:d0:6f:6e:e6:90:bb:dd:74:05:3d:25:d0:54:c4: 1e:5b:54:99:39:05:09:4d:e9:4a:68:43:65:5c:f9:1d: 1b:1f:19:a4:e3:ad:d2:16:be:41:14:cb:8c:74:01:40: bf:43:03:0a:61:d2:1f:31:c1:63:f0:5e:6f:1d:7a:ff: f5:0d:5e:2a:ff:d9:80:f5:fd:d2:ec:02:9b:b2:6d:10: 7e:2a:d6:c4:19:7f:da:4c:c5:e0:92:55:34:5f:f7:96: d4:bf:11:63:3c:1d:71:c3:ee:c2:e2:be:17:b4:86:9c: 1e:1d:58:d8:bb:43:93:ba:6a:99:3c:cf:9c:67:87:3b: 9d:da:58:84:1b:40:06:8b:93:f0:7a:9c:18:30:ea:86: 2d:ba:65:68:7f:35:23:20:4a:d0:7e:ce:d0:ff:83:f3: 8f:1e:e1:53:47:a3:6e:95:0c:4a:0a:89:43:da:26:35 Fingerprint (SHA-256): 17:11:E2:BE:86:64:04:8C:77:41:D4:44:62:BA:9C:C7:16:1E:2B:CF:45:AD:DF:FC:2C:A4:D8:29:7F:CE:F3:B4 Fingerprint (SHA1): 66:F8:67:F3:66:B5:E0:B1:2C:7E:C6:DE:4F:37:38:D8:97:06:C8:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194468 (0x433ee1a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:45:53 2025 Not After : Thu Nov 28 11:45:53 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:14:42:91:5f:8f:d3:5c:59:7e:bf:89:d7:0d:22:bd: e8:d9:c7:cb:10:aa:d8:68:6e:e3:75:45:83:55:1d:e4: 6a:4e:1e:4b:16:05:e0:5e:b5:e2:0f:e7:67:a6:ae:bd: f1:d5:21:67:bd:5f:af:38:ce:14:05:a4:80:0c:1d:2f: 4b:4d:82:97:d8:83:f4:aa:b8:78:c3:4e:b2:08:fb:df: 52:96:cb:03:db:d5:e2:fa:ea:52:79:f3:11:19:e9:74: 48:cb:13:1a:8e:4b:17:ff:a7:12:4a:c8:86:27:9a:e4: 8d:76:d4:6f:70:b2:4b:e3:96:72:c5:4a:54:17:ab:11: 56:fb:41:98:18:fe:05:77:0e:4a:fe:87:a5:33:0c:03: 61:08:af:d4:1f:0e:ea:37:36:60:02:59:44:50:82:a4: db:09:16:fe:55:43:c1:70:1d:f1:5c:63:e8:a3:d6:8f: 80:db:f1:f2:31:ab:80:04:67:93:47:58:0b:75:b4:7d: bf:73:0b:26:0a:e3:23:5f:11:9c:c8:b0:9a:7c:1f:28: a2:33:ae:ae:33:5e:93:fb:51:a5:4d:1f:85:d9:20:61: 20:e6:80:bd:97:54:78:14:74:be:7f:66:0b:4d:ce:89: 69:d8:c4:94:88:d8:b6:b8:b9:df:a1:6b:8c:74:93:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:5a:51:8f:20:2a:dd:1f:ef:a3:18:28:f7:f6:dc:b2: 99:c2:ec:ca:4f:b8:40:c5:79:96:37:f7:1a:a4:d1:25: 38:94:d4:fa:78:ed:af:ec:b0:8f:2c:fc:6d:21:a5:85: e3:ab:29:57:58:0c:ea:62:1c:c8:a8:f8:52:e3:2e:25: 6b:47:29:a8:d2:35:c8:93:62:0d:bc:0d:12:39:ab:39: 44:8e:e8:71:a7:4b:9d:a6:8e:41:95:6c:45:72:f8:26: 17:0a:fa:44:fc:24:5a:27:20:e8:c3:e7:44:ad:41:93: af:67:87:f3:7c:65:96:69:41:be:13:d2:fa:56:76:f8: c4:b7:85:ae:84:d7:69:41:13:48:99:b2:d1:34:fc:0e: 7e:fa:e1:3e:77:b7:54:39:7f:e0:72:00:21:bc:59:67: ee:93:de:70:20:4e:2b:91:c9:08:62:a3:49:39:ee:c7: 5a:80:b5:97:b2:d6:5e:26:5e:26:e4:9c:37:9a:da:b4: 5e:1b:8f:cb:c6:8e:9a:04:2c:e5:cc:3a:23:d4:9d:21: 22:8e:d8:51:92:fa:d4:2b:27:50:af:9b:40:79:3d:16: 0e:6c:a3:da:cb:f8:f8:56:f2:db:21:4b:e2:a5:5b:95: f8:bc:6d:39:25:12:1a:9c:61:c9:f6:e4:bc:20:72:08 Fingerprint (SHA-256): 6F:C1:2E:BB:14:F1:BC:E9:6A:E8:1E:F4:2A:CA:66:08:77:C2:40:96:89:D4:D2:04:33:54:5E:E6:DA:BC:D0:DA Fingerprint (SHA1): 57:7D:8E:20:94:FA:96:07:D3:4B:E0:DC:F8:5A:AF:62:83:E1:05:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194466 (0x433ee1a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:45:52 2025 Not After : Thu Nov 28 11:45:52 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2c:e4:50:13:6a:c6:ec:1d:9d:a3:6d:52:92:b0:9d: 22:1c:24:97:9f:42:ab:a0:48:67:65:10:d5:ee:de:f5: a1:8f:75:71:9b:9e:3e:c6:36:58:df:5e:d8:b0:2f:db: 37:0f:ac:8a:6e:78:2d:1e:2d:07:17:00:7a:bd:2a:b0: f1:fa:9f:09:e0:3e:cb:fa:53:10:26:75:c3:df:a0:af: 22:47:49:b3:d1:d0:29:63:99:15:12:58:e1:ee:74:c1: 3d:3a:68:3b:81:ac:b8:6d:b1:b3:e6:97:42:ac:e3:91: cf:3e:c7:28:62:32:50:69:fc:49:4f:15:87:cf:20:61: bb:4f:56:4f:76:ab:89:5f:54:be:e4:55:8f:ef:64:4e: a1:ec:d8:fe:f8:ca:a7:d5:0b:4c:6b:e2:16:86:fb:35: de:80:d1:3c:ae:53:7b:d5:d3:72:16:70:88:6c:38:bb: fb:3b:ca:83:62:fe:43:46:72:0e:81:e1:99:0e:95:36: 0b:01:24:84:4d:34:11:f3:80:76:b0:6e:26:23:7c:0f: 6b:c5:2b:80:1c:04:ad:59:40:e5:2d:b4:fc:31:fe:34: 01:ec:db:c6:61:f1:fc:d8:34:86:91:07:68:7a:4f:4d: b6:bb:af:da:2e:fd:24:7c:8c:50:ae:66:dc:22:b9:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:e9:aa:07:a7:6f:f0:6f:49:28:d5:83:23:7d:76:56: 03:47:83:d3:47:b9:2b:fd:6f:e7:b0:76:7e:ff:f4:5f: 2c:4c:2b:31:c7:91:58:a7:3f:75:08:58:78:86:af:ff: 11:b6:b1:c5:16:87:22:5b:7e:cb:b1:47:55:e2:24:cd: 7b:d7:2e:5b:ae:6f:a3:58:17:8d:24:d2:c0:b1:d4:7f: f9:13:d0:6f:6e:e6:90:bb:dd:74:05:3d:25:d0:54:c4: 1e:5b:54:99:39:05:09:4d:e9:4a:68:43:65:5c:f9:1d: 1b:1f:19:a4:e3:ad:d2:16:be:41:14:cb:8c:74:01:40: bf:43:03:0a:61:d2:1f:31:c1:63:f0:5e:6f:1d:7a:ff: f5:0d:5e:2a:ff:d9:80:f5:fd:d2:ec:02:9b:b2:6d:10: 7e:2a:d6:c4:19:7f:da:4c:c5:e0:92:55:34:5f:f7:96: d4:bf:11:63:3c:1d:71:c3:ee:c2:e2:be:17:b4:86:9c: 1e:1d:58:d8:bb:43:93:ba:6a:99:3c:cf:9c:67:87:3b: 9d:da:58:84:1b:40:06:8b:93:f0:7a:9c:18:30:ea:86: 2d:ba:65:68:7f:35:23:20:4a:d0:7e:ce:d0:ff:83:f3: 8f:1e:e1:53:47:a3:6e:95:0c:4a:0a:89:43:da:26:35 Fingerprint (SHA-256): 17:11:E2:BE:86:64:04:8C:77:41:D4:44:62:BA:9C:C7:16:1E:2B:CF:45:AD:DF:FC:2C:A4:D8:29:7F:CE:F3:B4 Fingerprint (SHA1): 66:F8:67:F3:66:B5:E0:B1:2C:7E:C6:DE:4F:37:38:D8:97:06:C8:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1018: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194466 (0x433ee1a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:45:52 2025 Not After : Thu Nov 28 11:45:52 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2c:e4:50:13:6a:c6:ec:1d:9d:a3:6d:52:92:b0:9d: 22:1c:24:97:9f:42:ab:a0:48:67:65:10:d5:ee:de:f5: a1:8f:75:71:9b:9e:3e:c6:36:58:df:5e:d8:b0:2f:db: 37:0f:ac:8a:6e:78:2d:1e:2d:07:17:00:7a:bd:2a:b0: f1:fa:9f:09:e0:3e:cb:fa:53:10:26:75:c3:df:a0:af: 22:47:49:b3:d1:d0:29:63:99:15:12:58:e1:ee:74:c1: 3d:3a:68:3b:81:ac:b8:6d:b1:b3:e6:97:42:ac:e3:91: cf:3e:c7:28:62:32:50:69:fc:49:4f:15:87:cf:20:61: bb:4f:56:4f:76:ab:89:5f:54:be:e4:55:8f:ef:64:4e: a1:ec:d8:fe:f8:ca:a7:d5:0b:4c:6b:e2:16:86:fb:35: de:80:d1:3c:ae:53:7b:d5:d3:72:16:70:88:6c:38:bb: fb:3b:ca:83:62:fe:43:46:72:0e:81:e1:99:0e:95:36: 0b:01:24:84:4d:34:11:f3:80:76:b0:6e:26:23:7c:0f: 6b:c5:2b:80:1c:04:ad:59:40:e5:2d:b4:fc:31:fe:34: 01:ec:db:c6:61:f1:fc:d8:34:86:91:07:68:7a:4f:4d: b6:bb:af:da:2e:fd:24:7c:8c:50:ae:66:dc:22:b9:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:e9:aa:07:a7:6f:f0:6f:49:28:d5:83:23:7d:76:56: 03:47:83:d3:47:b9:2b:fd:6f:e7:b0:76:7e:ff:f4:5f: 2c:4c:2b:31:c7:91:58:a7:3f:75:08:58:78:86:af:ff: 11:b6:b1:c5:16:87:22:5b:7e:cb:b1:47:55:e2:24:cd: 7b:d7:2e:5b:ae:6f:a3:58:17:8d:24:d2:c0:b1:d4:7f: f9:13:d0:6f:6e:e6:90:bb:dd:74:05:3d:25:d0:54:c4: 1e:5b:54:99:39:05:09:4d:e9:4a:68:43:65:5c:f9:1d: 1b:1f:19:a4:e3:ad:d2:16:be:41:14:cb:8c:74:01:40: bf:43:03:0a:61:d2:1f:31:c1:63:f0:5e:6f:1d:7a:ff: f5:0d:5e:2a:ff:d9:80:f5:fd:d2:ec:02:9b:b2:6d:10: 7e:2a:d6:c4:19:7f:da:4c:c5:e0:92:55:34:5f:f7:96: d4:bf:11:63:3c:1d:71:c3:ee:c2:e2:be:17:b4:86:9c: 1e:1d:58:d8:bb:43:93:ba:6a:99:3c:cf:9c:67:87:3b: 9d:da:58:84:1b:40:06:8b:93:f0:7a:9c:18:30:ea:86: 2d:ba:65:68:7f:35:23:20:4a:d0:7e:ce:d0:ff:83:f3: 8f:1e:e1:53:47:a3:6e:95:0c:4a:0a:89:43:da:26:35 Fingerprint (SHA-256): 17:11:E2:BE:86:64:04:8C:77:41:D4:44:62:BA:9C:C7:16:1E:2B:CF:45:AD:DF:FC:2C:A4:D8:29:7F:CE:F3:B4 Fingerprint (SHA1): 66:F8:67:F3:66:B5:E0:B1:2C:7E:C6:DE:4F:37:38:D8:97:06:C8:B8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1019: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194468 (0x433ee1a4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:45:53 2025 Not After : Thu Nov 28 11:45:53 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:14:42:91:5f:8f:d3:5c:59:7e:bf:89:d7:0d:22:bd: e8:d9:c7:cb:10:aa:d8:68:6e:e3:75:45:83:55:1d:e4: 6a:4e:1e:4b:16:05:e0:5e:b5:e2:0f:e7:67:a6:ae:bd: f1:d5:21:67:bd:5f:af:38:ce:14:05:a4:80:0c:1d:2f: 4b:4d:82:97:d8:83:f4:aa:b8:78:c3:4e:b2:08:fb:df: 52:96:cb:03:db:d5:e2:fa:ea:52:79:f3:11:19:e9:74: 48:cb:13:1a:8e:4b:17:ff:a7:12:4a:c8:86:27:9a:e4: 8d:76:d4:6f:70:b2:4b:e3:96:72:c5:4a:54:17:ab:11: 56:fb:41:98:18:fe:05:77:0e:4a:fe:87:a5:33:0c:03: 61:08:af:d4:1f:0e:ea:37:36:60:02:59:44:50:82:a4: db:09:16:fe:55:43:c1:70:1d:f1:5c:63:e8:a3:d6:8f: 80:db:f1:f2:31:ab:80:04:67:93:47:58:0b:75:b4:7d: bf:73:0b:26:0a:e3:23:5f:11:9c:c8:b0:9a:7c:1f:28: a2:33:ae:ae:33:5e:93:fb:51:a5:4d:1f:85:d9:20:61: 20:e6:80:bd:97:54:78:14:74:be:7f:66:0b:4d:ce:89: 69:d8:c4:94:88:d8:b6:b8:b9:df:a1:6b:8c:74:93:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:5a:51:8f:20:2a:dd:1f:ef:a3:18:28:f7:f6:dc:b2: 99:c2:ec:ca:4f:b8:40:c5:79:96:37:f7:1a:a4:d1:25: 38:94:d4:fa:78:ed:af:ec:b0:8f:2c:fc:6d:21:a5:85: e3:ab:29:57:58:0c:ea:62:1c:c8:a8:f8:52:e3:2e:25: 6b:47:29:a8:d2:35:c8:93:62:0d:bc:0d:12:39:ab:39: 44:8e:e8:71:a7:4b:9d:a6:8e:41:95:6c:45:72:f8:26: 17:0a:fa:44:fc:24:5a:27:20:e8:c3:e7:44:ad:41:93: af:67:87:f3:7c:65:96:69:41:be:13:d2:fa:56:76:f8: c4:b7:85:ae:84:d7:69:41:13:48:99:b2:d1:34:fc:0e: 7e:fa:e1:3e:77:b7:54:39:7f:e0:72:00:21:bc:59:67: ee:93:de:70:20:4e:2b:91:c9:08:62:a3:49:39:ee:c7: 5a:80:b5:97:b2:d6:5e:26:5e:26:e4:9c:37:9a:da:b4: 5e:1b:8f:cb:c6:8e:9a:04:2c:e5:cc:3a:23:d4:9d:21: 22:8e:d8:51:92:fa:d4:2b:27:50:af:9b:40:79:3d:16: 0e:6c:a3:da:cb:f8:f8:56:f2:db:21:4b:e2:a5:5b:95: f8:bc:6d:39:25:12:1a:9c:61:c9:f6:e4:bc:20:72:08 Fingerprint (SHA-256): 6F:C1:2E:BB:14:F1:BC:E9:6A:E8:1E:F4:2A:CA:66:08:77:C2:40:96:89:D4:D2:04:33:54:5E:E6:DA:BC:D0:DA Fingerprint (SHA1): 57:7D:8E:20:94:FA:96:07:D3:4B:E0:DC:F8:5A:AF:62:83:E1:05:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1021: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1022: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1023: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194466 (0x433ee1a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:45:52 2025 Not After : Thu Nov 28 11:45:52 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2c:e4:50:13:6a:c6:ec:1d:9d:a3:6d:52:92:b0:9d: 22:1c:24:97:9f:42:ab:a0:48:67:65:10:d5:ee:de:f5: a1:8f:75:71:9b:9e:3e:c6:36:58:df:5e:d8:b0:2f:db: 37:0f:ac:8a:6e:78:2d:1e:2d:07:17:00:7a:bd:2a:b0: f1:fa:9f:09:e0:3e:cb:fa:53:10:26:75:c3:df:a0:af: 22:47:49:b3:d1:d0:29:63:99:15:12:58:e1:ee:74:c1: 3d:3a:68:3b:81:ac:b8:6d:b1:b3:e6:97:42:ac:e3:91: cf:3e:c7:28:62:32:50:69:fc:49:4f:15:87:cf:20:61: bb:4f:56:4f:76:ab:89:5f:54:be:e4:55:8f:ef:64:4e: a1:ec:d8:fe:f8:ca:a7:d5:0b:4c:6b:e2:16:86:fb:35: de:80:d1:3c:ae:53:7b:d5:d3:72:16:70:88:6c:38:bb: fb:3b:ca:83:62:fe:43:46:72:0e:81:e1:99:0e:95:36: 0b:01:24:84:4d:34:11:f3:80:76:b0:6e:26:23:7c:0f: 6b:c5:2b:80:1c:04:ad:59:40:e5:2d:b4:fc:31:fe:34: 01:ec:db:c6:61:f1:fc:d8:34:86:91:07:68:7a:4f:4d: b6:bb:af:da:2e:fd:24:7c:8c:50:ae:66:dc:22:b9:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:e9:aa:07:a7:6f:f0:6f:49:28:d5:83:23:7d:76:56: 03:47:83:d3:47:b9:2b:fd:6f:e7:b0:76:7e:ff:f4:5f: 2c:4c:2b:31:c7:91:58:a7:3f:75:08:58:78:86:af:ff: 11:b6:b1:c5:16:87:22:5b:7e:cb:b1:47:55:e2:24:cd: 7b:d7:2e:5b:ae:6f:a3:58:17:8d:24:d2:c0:b1:d4:7f: f9:13:d0:6f:6e:e6:90:bb:dd:74:05:3d:25:d0:54:c4: 1e:5b:54:99:39:05:09:4d:e9:4a:68:43:65:5c:f9:1d: 1b:1f:19:a4:e3:ad:d2:16:be:41:14:cb:8c:74:01:40: bf:43:03:0a:61:d2:1f:31:c1:63:f0:5e:6f:1d:7a:ff: f5:0d:5e:2a:ff:d9:80:f5:fd:d2:ec:02:9b:b2:6d:10: 7e:2a:d6:c4:19:7f:da:4c:c5:e0:92:55:34:5f:f7:96: d4:bf:11:63:3c:1d:71:c3:ee:c2:e2:be:17:b4:86:9c: 1e:1d:58:d8:bb:43:93:ba:6a:99:3c:cf:9c:67:87:3b: 9d:da:58:84:1b:40:06:8b:93:f0:7a:9c:18:30:ea:86: 2d:ba:65:68:7f:35:23:20:4a:d0:7e:ce:d0:ff:83:f3: 8f:1e:e1:53:47:a3:6e:95:0c:4a:0a:89:43:da:26:35 Fingerprint (SHA-256): 17:11:E2:BE:86:64:04:8C:77:41:D4:44:62:BA:9C:C7:16:1E:2B:CF:45:AD:DF:FC:2C:A4:D8:29:7F:CE:F3:B4 Fingerprint (SHA1): 66:F8:67:F3:66:B5:E0:B1:2C:7E:C6:DE:4F:37:38:D8:97:06:C8:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1024: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194470 (0x433ee1a6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:45:55 2025 Not After : Thu Nov 28 11:45:55 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:cf:1a:cd:76:b2:6c:a5:99:26:29:86:31:99:f3:28: 75:21:2d:08:c0:36:2b:9d:e0:f3:98:64:87:93:ee:7a: 6f:9a:39:2b:4c:8a:be:bd:10:db:5e:7b:4d:50:ba:47: 28:9b:1f:da:1d:ca:01:32:a9:c8:b2:e4:12:09:c1:dc: 4f:73:f2:82:fb:4b:85:c9:2d:39:8d:a3:16:c8:6e:23: 7b:69:87:e0:46:0b:b0:c7:95:89:00:14:7f:13:4b:ed: 2a:bf:59:56:c8:4d:dc:7b:a3:e9:c2:ba:77:fc:c3:b6: bb:b5:b5:ec:3b:b5:38:a3:27:08:e8:99:50:d4:2a:65: 4f:f0:86:d1:47:6a:f1:bc:b6:2f:3c:72:1d:f3:c7:ab: 72:b7:fd:ce:4f:78:00:37:d8:b3:be:a5:8b:81:f2:0d: bb:a0:3f:bc:23:a0:d4:63:e5:ac:41:e9:3a:fb:48:ad: 21:b6:36:91:f7:33:66:94:e3:78:7a:3f:a7:77:75:57: c9:63:0b:4d:e0:be:af:82:9f:03:4c:6c:db:c3:8a:02: 3d:a7:13:fd:60:1d:aa:a4:4f:2a:3e:44:dd:27:62:57: 9f:0a:8e:72:c7:f0:3e:14:c4:1d:09:2c:a2:28:3b:0e: ab:1b:97:b6:35:f5:14:7a:54:ed:31:99:c2:6f:1f:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:03:e5:f0:e6:42:f1:d2:b8:19:65:96:09:96:b0:33: a2:31:2c:72:a5:d9:fc:ad:48:b6:9e:fd:4f:e6:71:a7: 34:d4:9c:5f:d4:c0:19:f8:62:7f:6e:e0:e9:02:6b:37: 44:29:0b:4d:8a:e4:c4:14:61:3d:06:79:8e:60:c1:d1: 12:05:2e:64:e4:be:75:13:67:01:3d:a2:52:32:d4:03: 96:7f:d3:59:30:59:1a:9b:1d:fc:96:5a:cd:ad:c0:eb: 2b:1b:e2:69:1c:3e:01:2a:41:39:46:a8:32:92:9e:d7: b4:06:a0:2a:da:db:7d:64:52:89:ea:42:3e:04:e3:b3: 00:3c:26:1e:86:80:52:24:c5:d9:59:bf:96:35:22:59: e3:16:6c:eb:91:5d:0d:3e:d4:2c:2d:7b:0a:01:94:77: 04:66:36:64:b6:a1:d3:a6:31:f5:72:f1:c1:2a:be:8f: f5:05:a9:ae:67:15:73:31:e8:34:32:5f:70:d2:f0:74: 27:e4:c4:f8:20:fd:6c:fa:29:53:56:5f:ff:f6:96:a3: f1:42:08:90:7a:7f:eb:59:54:13:1e:85:a4:f2:47:18: 5c:17:2e:e1:de:7c:65:84:bb:d9:7a:92:c9:7f:ca:22: 5a:a0:5b:88:6c:8b:28:f0:1b:d0:e6:b1:ee:33:a6:28 Fingerprint (SHA-256): 49:86:5F:9A:2F:AA:B8:22:39:8C:B3:CC:93:4A:31:02:DF:0E:8C:F0:E9:35:5A:20:39:B9:1C:DC:DE:7A:56:A6 Fingerprint (SHA1): 70:B5:BE:E0:E6:85:F9:BA:06:08:61:3C:6D:0A:E0:2C:51:63:8F:2B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1025: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194466 (0x433ee1a2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:45:52 2025 Not After : Thu Nov 28 11:45:52 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:2c:e4:50:13:6a:c6:ec:1d:9d:a3:6d:52:92:b0:9d: 22:1c:24:97:9f:42:ab:a0:48:67:65:10:d5:ee:de:f5: a1:8f:75:71:9b:9e:3e:c6:36:58:df:5e:d8:b0:2f:db: 37:0f:ac:8a:6e:78:2d:1e:2d:07:17:00:7a:bd:2a:b0: f1:fa:9f:09:e0:3e:cb:fa:53:10:26:75:c3:df:a0:af: 22:47:49:b3:d1:d0:29:63:99:15:12:58:e1:ee:74:c1: 3d:3a:68:3b:81:ac:b8:6d:b1:b3:e6:97:42:ac:e3:91: cf:3e:c7:28:62:32:50:69:fc:49:4f:15:87:cf:20:61: bb:4f:56:4f:76:ab:89:5f:54:be:e4:55:8f:ef:64:4e: a1:ec:d8:fe:f8:ca:a7:d5:0b:4c:6b:e2:16:86:fb:35: de:80:d1:3c:ae:53:7b:d5:d3:72:16:70:88:6c:38:bb: fb:3b:ca:83:62:fe:43:46:72:0e:81:e1:99:0e:95:36: 0b:01:24:84:4d:34:11:f3:80:76:b0:6e:26:23:7c:0f: 6b:c5:2b:80:1c:04:ad:59:40:e5:2d:b4:fc:31:fe:34: 01:ec:db:c6:61:f1:fc:d8:34:86:91:07:68:7a:4f:4d: b6:bb:af:da:2e:fd:24:7c:8c:50:ae:66:dc:22:b9:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:e9:aa:07:a7:6f:f0:6f:49:28:d5:83:23:7d:76:56: 03:47:83:d3:47:b9:2b:fd:6f:e7:b0:76:7e:ff:f4:5f: 2c:4c:2b:31:c7:91:58:a7:3f:75:08:58:78:86:af:ff: 11:b6:b1:c5:16:87:22:5b:7e:cb:b1:47:55:e2:24:cd: 7b:d7:2e:5b:ae:6f:a3:58:17:8d:24:d2:c0:b1:d4:7f: f9:13:d0:6f:6e:e6:90:bb:dd:74:05:3d:25:d0:54:c4: 1e:5b:54:99:39:05:09:4d:e9:4a:68:43:65:5c:f9:1d: 1b:1f:19:a4:e3:ad:d2:16:be:41:14:cb:8c:74:01:40: bf:43:03:0a:61:d2:1f:31:c1:63:f0:5e:6f:1d:7a:ff: f5:0d:5e:2a:ff:d9:80:f5:fd:d2:ec:02:9b:b2:6d:10: 7e:2a:d6:c4:19:7f:da:4c:c5:e0:92:55:34:5f:f7:96: d4:bf:11:63:3c:1d:71:c3:ee:c2:e2:be:17:b4:86:9c: 1e:1d:58:d8:bb:43:93:ba:6a:99:3c:cf:9c:67:87:3b: 9d:da:58:84:1b:40:06:8b:93:f0:7a:9c:18:30:ea:86: 2d:ba:65:68:7f:35:23:20:4a:d0:7e:ce:d0:ff:83:f3: 8f:1e:e1:53:47:a3:6e:95:0c:4a:0a:89:43:da:26:35 Fingerprint (SHA-256): 17:11:E2:BE:86:64:04:8C:77:41:D4:44:62:BA:9C:C7:16:1E:2B:CF:45:AD:DF:FC:2C:A4:D8:29:7F:CE:F3:B4 Fingerprint (SHA1): 66:F8:67:F3:66:B5:E0:B1:2C:7E:C6:DE:4F:37:38:D8:97:06:C8:B8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1027: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1028: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1029: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1030: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1031: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194471 (0x433ee1a7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:45:56 2025 Not After : Thu Nov 28 11:45:56 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ff:80:05:71:7a:58:42:6f:ac:65:b8:57:9e:ca:75: 4a:fb:0a:7a:ab:2b:69:0f:ae:b6:aa:dd:b8:e2:84:bc: 34:08:b2:84:31:4b:f8:07:60:69:8f:25:2e:ec:5b:b5: d9:0c:fb:e4:09:82:4e:e7:c8:b0:3b:df:27:b2:df:59: 21:c5:54:77:ac:1f:82:7d:20:78:aa:54:b8:13:88:46: 2e:67:f7:92:6c:20:c8:38:c5:49:61:63:7c:ea:b1:57: de:3c:e8:80:dc:71:2d:c1:6d:e7:8a:19:73:31:b1:a6: 56:22:51:b6:17:84:a9:b6:33:75:17:f0:ed:28:14:b8: 19:0d:95:85:ce:86:8f:96:f3:9d:87:77:44:08:46:0d: 62:fa:ca:b5:98:d4:bf:c1:08:e9:e7:66:81:df:a9:89: 63:7a:31:d9:38:03:c7:0f:32:93:06:80:6e:a9:b3:2c: b7:76:af:29:f0:61:4a:76:75:28:9a:28:27:85:03:6a: 65:21:76:74:77:a4:45:05:88:4f:1c:0d:4d:49:8d:8f: 2d:3f:77:1a:ab:57:1f:d6:1d:9a:1b:5c:ec:25:cf:79: 6e:3d:91:d8:16:bd:38:fe:ce:0e:c6:56:67:17:24:0c: 9c:be:ac:1b:3c:80:25:dd:2a:a4:d7:fb:cd:90:37:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:1d:1b:25:9e:30:6f:b1:10:47:17:94:5e:9f:8c:9b: cd:d1:cb:ee:d2:66:23:5a:a5:0c:cc:19:12:6f:8d:64: 48:40:ea:25:dd:86:2d:ba:8a:19:31:f5:46:ad:b7:39: 13:89:26:54:58:be:e5:88:38:ce:6f:06:db:a0:f5:39: 00:75:c9:2d:3c:91:00:06:ed:c0:f8:dc:31:a1:96:c9: 1d:d8:f9:10:a9:80:c3:29:31:2f:31:d8:4f:e6:ae:95: c3:7c:a4:e9:f2:aa:a2:ed:a2:aa:35:1f:d4:c4:f1:fe: e5:60:df:b9:c2:7b:59:fd:39:bf:71:e3:20:fe:fc:b2: 3b:34:af:1b:b2:a2:6b:81:37:41:24:a7:36:31:fa:a4: be:28:c7:af:65:d1:f2:a9:ce:1f:fe:6c:61:9f:fc:9e: f3:15:cc:26:1d:92:5c:1f:5a:cb:6e:64:50:1d:fd:db: af:8f:6a:da:0a:64:28:14:1b:8d:5d:99:b6:5d:27:ed: 70:1d:e9:ca:ad:99:cc:36:36:81:4e:3d:df:03:f9:9c: 6f:ba:a7:a1:6e:b0:0e:58:f4:f6:4c:8a:62:15:c8:f8: d8:e1:bf:3d:c2:df:95:0e:6f:df:8d:bc:4b:ca:d3:6b: 86:8b:fb:d4:72:8d:78:dd:bf:48:80:9c:e0:64:94:1c Fingerprint (SHA-256): 46:9C:EC:36:61:26:2D:FE:29:DA:FB:FC:6A:B0:61:60:D2:D9:AF:EB:5C:CA:30:91:D8:1A:4A:6F:94:34:43:59 Fingerprint (SHA1): A1:52:D4:9B:9F:AD:9C:62:AB:2F:9F:CB:D0:51:7B:ED:80:3D:86:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1032: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1033: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1034: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1035: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1036: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1037: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1038: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1039: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1040: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1041: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1042: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1043: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1044: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1045: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1046: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1047: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1048: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #1049: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1050: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1051: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1052: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1053: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1054: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1055: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1056: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1057: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2309126 at Fri Nov 28 19:46:00 CST 2025 kill -USR1 2309126 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2309126 killed at Fri Nov 28 19:46:00 CST 2025 httpserv starting at Fri Nov 28 19:46:00 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:46:00 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2321533 >/dev/null 2>/dev/null httpserv with PID 2321533 found at Fri Nov 28 19:46:00 CST 2025 httpserv with PID 2321533 started at Fri Nov 28 19:46:00 CST 2025 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1058: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1059: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194473 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1060: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1061: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1062: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194474 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1063: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1064: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1065: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1066: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194475 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1067: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1068: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194476 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1069: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1070: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1071: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1072: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1073: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128194477 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1074: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1075: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1076: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1077: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1078: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194474 (0x433ee1aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:46:01 2025 Not After : Thu Nov 28 11:46:01 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:31:0c:37:07:00:e8:83:5b:cd:11:96:19:c5:e1:26: 30:d8:a9:13:61:31:4d:86:2a:e3:b9:c0:45:fa:30:26: 0a:90:24:16:ab:91:78:af:e5:6f:4e:a7:ef:5e:c4:24: 06:87:79:57:fb:4a:d3:d7:13:c7:ee:25:99:7c:53:f1: 4b:64:20:f6:18:63:d7:83:c4:88:66:3a:09:af:fd:a1: b4:6a:cd:05:d5:9d:66:e9:9c:dd:cc:e3:f2:77:c5:94: f8:08:f5:f2:ae:d7:c3:95:7e:85:e7:41:d7:98:c8:ee: 5c:79:04:4a:70:c4:bb:30:86:df:29:07:b6:6e:42:4b: 3b:d3:0d:f2:b2:e4:10:6f:d0:95:e9:7b:5d:e7:ac:e3: 33:c5:92:94:96:ba:d8:76:56:8a:36:59:0f:ea:d8:9e: b5:d3:be:30:19:f0:ef:ee:77:a6:88:31:aa:8b:22:a5: 13:e0:0e:95:17:65:a2:a7:9a:6e:08:c3:ba:49:ba:00: f6:0a:e5:4b:8b:64:4f:b0:30:c5:22:e9:e4:74:a7:a5: be:38:84:88:4e:bd:7d:06:45:a9:6e:44:c5:2e:af:e4: 56:e0:05:c8:77:67:70:bc:02:54:94:55:d0:29:41:64: ce:c9:42:a9:72:72:5a:3d:ea:51:7e:59:7a:46:37:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:48:ca:5e:d6:fe:35:9e:7d:33:9f:a3:b5:70:4b:a8: 81:ca:22:36:12:f5:2a:d1:a7:e2:f9:5c:6d:06:eb:fb: a8:1f:39:44:11:75:7d:ae:3c:4f:72:a9:96:90:1c:5d: e2:c9:e8:bc:b8:de:52:00:b7:f6:42:fd:b1:6b:7f:8e: 1b:9f:88:78:a3:d6:67:d5:86:4d:32:a6:ff:ed:f8:72: f0:33:23:cd:d4:0d:bd:9f:37:dc:f4:73:48:9a:ad:34: 0a:30:f4:bc:b2:b6:9d:34:2b:45:77:fa:04:ad:14:d9: 4d:ec:88:86:73:d6:cf:43:15:84:aa:3f:bc:ff:ac:a9: 83:5e:2f:a1:03:11:af:b9:9f:4f:b3:7f:26:44:25:30: ee:3b:ca:4f:0e:9c:fb:1f:e4:40:a1:a9:26:16:22:70: 4b:ec:d6:c8:80:c9:39:04:42:5a:7f:1e:54:d7:0b:8f: c0:73:ff:a8:15:fa:67:b8:99:7d:cc:86:80:e1:34:19: 9c:48:57:1f:6e:61:ad:2a:99:7a:c1:be:35:b0:97:8b: 44:38:6b:1c:a3:34:df:ab:89:aa:0a:39:6f:17:bf:9e: 63:71:31:13:25:e6:12:9e:41:21:a8:f9:bf:6e:a4:bc: f4:a8:e4:93:9e:0d:45:d5:b8:86:fb:cb:d3:8c:10:5d Fingerprint (SHA-256): 50:1A:75:F9:92:95:B4:EA:C6:91:8F:8F:32:83:74:18:21:C4:59:AA:78:A7:5A:07:D2:4B:C2:6C:76:1A:C9:E9 Fingerprint (SHA1): 78:94:67:05:CD:C3:52:D9:75:5E:38:43:73:EA:AB:20:82:72:65:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1079: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194473 (0x433ee1a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:46:00 2025 Not After : Thu Nov 28 11:46:00 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b3:3e:91:d5:0f:7a:80:26:1e:ce:f2:2f:bb:fa:f8: 4b:a8:c3:95:75:b7:78:44:96:e7:44:07:83:12:e2:d0: 6e:a8:2b:99:f2:1f:5e:2b:5e:0e:50:d7:8d:27:c5:3f: 2e:07:1d:7d:0b:d2:61:ae:25:e5:af:f0:f0:3d:bb:51: 6d:e1:c5:df:35:05:69:7d:99:08:83:d4:91:6a:e4:a6: 46:ac:55:82:87:a8:7a:ff:58:9f:60:9d:49:06:c2:6d: 39:c7:97:7c:2a:67:73:3a:9c:89:11:4a:8b:a9:6a:06: 10:5d:23:75:54:d6:ff:3d:94:7c:8e:56:75:c8:ed:4b: 26:51:2c:9b:8f:89:46:f1:4f:a5:73:b8:ee:7c:bb:d5: 29:50:1a:5c:19:4d:f4:3d:a1:98:c7:0b:1f:e0:cc:4e: 11:4a:ac:dd:00:e3:56:5e:4c:a8:76:e5:7d:8b:04:4e: 82:de:02:e6:a0:fe:a5:e0:1d:f6:dc:49:84:da:1b:a7: a5:4f:12:eb:f1:da:fc:6f:b3:1a:71:8b:ea:fa:46:aa: f5:f8:13:0f:c2:58:5e:f2:6c:dc:ab:b7:ad:00:bb:55: 4e:0a:d0:1b:0a:ff:d4:9f:45:b9:45:5b:5e:e2:0a:4d: 70:df:9e:21:a2:16:5e:90:66:76:86:15:db:fa:db:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:3e:33:4f:65:3c:87:73:a7:3c:d4:ab:4d:ca:42:a2: b6:fc:a7:ca:79:e2:24:3e:cf:42:24:9c:8c:18:be:93: 18:cf:0c:2a:05:30:e2:eb:b3:d4:0a:fb:48:44:d1:3d: cd:a4:d0:70:46:41:a1:f5:23:0b:3f:c5:f2:33:f2:80: 8e:da:39:0b:30:f4:51:e8:df:3c:30:c1:ba:d6:70:4a: 76:9c:8b:f7:38:aa:c9:82:2d:c2:ad:78:89:d1:94:a6: 91:f4:aa:5b:70:3b:a5:d1:a6:8e:e6:10:04:50:05:d4: 3d:75:47:f4:04:57:9a:fb:8b:7c:2f:d6:d9:5e:73:b7: 2b:6d:5c:69:48:65:38:33:ec:84:5b:c1:a7:0d:cf:ee: 0b:47:d4:ac:c1:40:3a:0a:be:1f:dd:06:af:76:5b:29: 40:61:23:79:09:fd:d6:8a:f7:6c:b9:3e:4d:cc:24:2b: 08:d8:02:75:44:ac:50:ed:d0:ff:24:55:77:d7:56:b8: 4b:d7:f6:46:f1:c1:f9:78:f1:aa:7c:04:f4:10:72:12: 84:e5:d3:d4:62:26:3e:c5:56:b8:79:69:ef:7f:c6:7b: b3:dc:57:63:0e:e4:4f:45:eb:78:31:93:d7:91:78:f6: 8f:b3:07:37:52:fc:ee:a9:8f:eb:41:09:db:3f:ba:c0 Fingerprint (SHA-256): 66:12:E6:3D:58:01:6B:A4:A2:98:F2:F4:EA:2A:40:60:98:42:13:E6:15:32:26:BB:9D:7F:56:96:78:2E:B2:27 Fingerprint (SHA1): AF:E7:96:65:7F:2A:43:2A:71:09:FE:00:D6:E1:9C:CE:B3:F1:D0:32 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1080: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1081: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1082: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1083: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194473 (0x433ee1a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:46:00 2025 Not After : Thu Nov 28 11:46:00 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b3:3e:91:d5:0f:7a:80:26:1e:ce:f2:2f:bb:fa:f8: 4b:a8:c3:95:75:b7:78:44:96:e7:44:07:83:12:e2:d0: 6e:a8:2b:99:f2:1f:5e:2b:5e:0e:50:d7:8d:27:c5:3f: 2e:07:1d:7d:0b:d2:61:ae:25:e5:af:f0:f0:3d:bb:51: 6d:e1:c5:df:35:05:69:7d:99:08:83:d4:91:6a:e4:a6: 46:ac:55:82:87:a8:7a:ff:58:9f:60:9d:49:06:c2:6d: 39:c7:97:7c:2a:67:73:3a:9c:89:11:4a:8b:a9:6a:06: 10:5d:23:75:54:d6:ff:3d:94:7c:8e:56:75:c8:ed:4b: 26:51:2c:9b:8f:89:46:f1:4f:a5:73:b8:ee:7c:bb:d5: 29:50:1a:5c:19:4d:f4:3d:a1:98:c7:0b:1f:e0:cc:4e: 11:4a:ac:dd:00:e3:56:5e:4c:a8:76:e5:7d:8b:04:4e: 82:de:02:e6:a0:fe:a5:e0:1d:f6:dc:49:84:da:1b:a7: a5:4f:12:eb:f1:da:fc:6f:b3:1a:71:8b:ea:fa:46:aa: f5:f8:13:0f:c2:58:5e:f2:6c:dc:ab:b7:ad:00:bb:55: 4e:0a:d0:1b:0a:ff:d4:9f:45:b9:45:5b:5e:e2:0a:4d: 70:df:9e:21:a2:16:5e:90:66:76:86:15:db:fa:db:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:3e:33:4f:65:3c:87:73:a7:3c:d4:ab:4d:ca:42:a2: b6:fc:a7:ca:79:e2:24:3e:cf:42:24:9c:8c:18:be:93: 18:cf:0c:2a:05:30:e2:eb:b3:d4:0a:fb:48:44:d1:3d: cd:a4:d0:70:46:41:a1:f5:23:0b:3f:c5:f2:33:f2:80: 8e:da:39:0b:30:f4:51:e8:df:3c:30:c1:ba:d6:70:4a: 76:9c:8b:f7:38:aa:c9:82:2d:c2:ad:78:89:d1:94:a6: 91:f4:aa:5b:70:3b:a5:d1:a6:8e:e6:10:04:50:05:d4: 3d:75:47:f4:04:57:9a:fb:8b:7c:2f:d6:d9:5e:73:b7: 2b:6d:5c:69:48:65:38:33:ec:84:5b:c1:a7:0d:cf:ee: 0b:47:d4:ac:c1:40:3a:0a:be:1f:dd:06:af:76:5b:29: 40:61:23:79:09:fd:d6:8a:f7:6c:b9:3e:4d:cc:24:2b: 08:d8:02:75:44:ac:50:ed:d0:ff:24:55:77:d7:56:b8: 4b:d7:f6:46:f1:c1:f9:78:f1:aa:7c:04:f4:10:72:12: 84:e5:d3:d4:62:26:3e:c5:56:b8:79:69:ef:7f:c6:7b: b3:dc:57:63:0e:e4:4f:45:eb:78:31:93:d7:91:78:f6: 8f:b3:07:37:52:fc:ee:a9:8f:eb:41:09:db:3f:ba:c0 Fingerprint (SHA-256): 66:12:E6:3D:58:01:6B:A4:A2:98:F2:F4:EA:2A:40:60:98:42:13:E6:15:32:26:BB:9D:7F:56:96:78:2E:B2:27 Fingerprint (SHA1): AF:E7:96:65:7F:2A:43:2A:71:09:FE:00:D6:E1:9C:CE:B3:F1:D0:32 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1084: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194474 (0x433ee1aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:46:01 2025 Not After : Thu Nov 28 11:46:01 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:31:0c:37:07:00:e8:83:5b:cd:11:96:19:c5:e1:26: 30:d8:a9:13:61:31:4d:86:2a:e3:b9:c0:45:fa:30:26: 0a:90:24:16:ab:91:78:af:e5:6f:4e:a7:ef:5e:c4:24: 06:87:79:57:fb:4a:d3:d7:13:c7:ee:25:99:7c:53:f1: 4b:64:20:f6:18:63:d7:83:c4:88:66:3a:09:af:fd:a1: b4:6a:cd:05:d5:9d:66:e9:9c:dd:cc:e3:f2:77:c5:94: f8:08:f5:f2:ae:d7:c3:95:7e:85:e7:41:d7:98:c8:ee: 5c:79:04:4a:70:c4:bb:30:86:df:29:07:b6:6e:42:4b: 3b:d3:0d:f2:b2:e4:10:6f:d0:95:e9:7b:5d:e7:ac:e3: 33:c5:92:94:96:ba:d8:76:56:8a:36:59:0f:ea:d8:9e: b5:d3:be:30:19:f0:ef:ee:77:a6:88:31:aa:8b:22:a5: 13:e0:0e:95:17:65:a2:a7:9a:6e:08:c3:ba:49:ba:00: f6:0a:e5:4b:8b:64:4f:b0:30:c5:22:e9:e4:74:a7:a5: be:38:84:88:4e:bd:7d:06:45:a9:6e:44:c5:2e:af:e4: 56:e0:05:c8:77:67:70:bc:02:54:94:55:d0:29:41:64: ce:c9:42:a9:72:72:5a:3d:ea:51:7e:59:7a:46:37:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:48:ca:5e:d6:fe:35:9e:7d:33:9f:a3:b5:70:4b:a8: 81:ca:22:36:12:f5:2a:d1:a7:e2:f9:5c:6d:06:eb:fb: a8:1f:39:44:11:75:7d:ae:3c:4f:72:a9:96:90:1c:5d: e2:c9:e8:bc:b8:de:52:00:b7:f6:42:fd:b1:6b:7f:8e: 1b:9f:88:78:a3:d6:67:d5:86:4d:32:a6:ff:ed:f8:72: f0:33:23:cd:d4:0d:bd:9f:37:dc:f4:73:48:9a:ad:34: 0a:30:f4:bc:b2:b6:9d:34:2b:45:77:fa:04:ad:14:d9: 4d:ec:88:86:73:d6:cf:43:15:84:aa:3f:bc:ff:ac:a9: 83:5e:2f:a1:03:11:af:b9:9f:4f:b3:7f:26:44:25:30: ee:3b:ca:4f:0e:9c:fb:1f:e4:40:a1:a9:26:16:22:70: 4b:ec:d6:c8:80:c9:39:04:42:5a:7f:1e:54:d7:0b:8f: c0:73:ff:a8:15:fa:67:b8:99:7d:cc:86:80:e1:34:19: 9c:48:57:1f:6e:61:ad:2a:99:7a:c1:be:35:b0:97:8b: 44:38:6b:1c:a3:34:df:ab:89:aa:0a:39:6f:17:bf:9e: 63:71:31:13:25:e6:12:9e:41:21:a8:f9:bf:6e:a4:bc: f4:a8:e4:93:9e:0d:45:d5:b8:86:fb:cb:d3:8c:10:5d Fingerprint (SHA-256): 50:1A:75:F9:92:95:B4:EA:C6:91:8F:8F:32:83:74:18:21:C4:59:AA:78:A7:5A:07:D2:4B:C2:6C:76:1A:C9:E9 Fingerprint (SHA1): 78:94:67:05:CD:C3:52:D9:75:5E:38:43:73:EA:AB:20:82:72:65:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1085: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1086: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1087: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1088: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1089: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1090: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194474 (0x433ee1aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:46:01 2025 Not After : Thu Nov 28 11:46:01 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:31:0c:37:07:00:e8:83:5b:cd:11:96:19:c5:e1:26: 30:d8:a9:13:61:31:4d:86:2a:e3:b9:c0:45:fa:30:26: 0a:90:24:16:ab:91:78:af:e5:6f:4e:a7:ef:5e:c4:24: 06:87:79:57:fb:4a:d3:d7:13:c7:ee:25:99:7c:53:f1: 4b:64:20:f6:18:63:d7:83:c4:88:66:3a:09:af:fd:a1: b4:6a:cd:05:d5:9d:66:e9:9c:dd:cc:e3:f2:77:c5:94: f8:08:f5:f2:ae:d7:c3:95:7e:85:e7:41:d7:98:c8:ee: 5c:79:04:4a:70:c4:bb:30:86:df:29:07:b6:6e:42:4b: 3b:d3:0d:f2:b2:e4:10:6f:d0:95:e9:7b:5d:e7:ac:e3: 33:c5:92:94:96:ba:d8:76:56:8a:36:59:0f:ea:d8:9e: b5:d3:be:30:19:f0:ef:ee:77:a6:88:31:aa:8b:22:a5: 13:e0:0e:95:17:65:a2:a7:9a:6e:08:c3:ba:49:ba:00: f6:0a:e5:4b:8b:64:4f:b0:30:c5:22:e9:e4:74:a7:a5: be:38:84:88:4e:bd:7d:06:45:a9:6e:44:c5:2e:af:e4: 56:e0:05:c8:77:67:70:bc:02:54:94:55:d0:29:41:64: ce:c9:42:a9:72:72:5a:3d:ea:51:7e:59:7a:46:37:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:48:ca:5e:d6:fe:35:9e:7d:33:9f:a3:b5:70:4b:a8: 81:ca:22:36:12:f5:2a:d1:a7:e2:f9:5c:6d:06:eb:fb: a8:1f:39:44:11:75:7d:ae:3c:4f:72:a9:96:90:1c:5d: e2:c9:e8:bc:b8:de:52:00:b7:f6:42:fd:b1:6b:7f:8e: 1b:9f:88:78:a3:d6:67:d5:86:4d:32:a6:ff:ed:f8:72: f0:33:23:cd:d4:0d:bd:9f:37:dc:f4:73:48:9a:ad:34: 0a:30:f4:bc:b2:b6:9d:34:2b:45:77:fa:04:ad:14:d9: 4d:ec:88:86:73:d6:cf:43:15:84:aa:3f:bc:ff:ac:a9: 83:5e:2f:a1:03:11:af:b9:9f:4f:b3:7f:26:44:25:30: ee:3b:ca:4f:0e:9c:fb:1f:e4:40:a1:a9:26:16:22:70: 4b:ec:d6:c8:80:c9:39:04:42:5a:7f:1e:54:d7:0b:8f: c0:73:ff:a8:15:fa:67:b8:99:7d:cc:86:80:e1:34:19: 9c:48:57:1f:6e:61:ad:2a:99:7a:c1:be:35:b0:97:8b: 44:38:6b:1c:a3:34:df:ab:89:aa:0a:39:6f:17:bf:9e: 63:71:31:13:25:e6:12:9e:41:21:a8:f9:bf:6e:a4:bc: f4:a8:e4:93:9e:0d:45:d5:b8:86:fb:cb:d3:8c:10:5d Fingerprint (SHA-256): 50:1A:75:F9:92:95:B4:EA:C6:91:8F:8F:32:83:74:18:21:C4:59:AA:78:A7:5A:07:D2:4B:C2:6C:76:1A:C9:E9 Fingerprint (SHA1): 78:94:67:05:CD:C3:52:D9:75:5E:38:43:73:EA:AB:20:82:72:65:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1091: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194474 (0x433ee1aa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:46:01 2025 Not After : Thu Nov 28 11:46:01 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:31:0c:37:07:00:e8:83:5b:cd:11:96:19:c5:e1:26: 30:d8:a9:13:61:31:4d:86:2a:e3:b9:c0:45:fa:30:26: 0a:90:24:16:ab:91:78:af:e5:6f:4e:a7:ef:5e:c4:24: 06:87:79:57:fb:4a:d3:d7:13:c7:ee:25:99:7c:53:f1: 4b:64:20:f6:18:63:d7:83:c4:88:66:3a:09:af:fd:a1: b4:6a:cd:05:d5:9d:66:e9:9c:dd:cc:e3:f2:77:c5:94: f8:08:f5:f2:ae:d7:c3:95:7e:85:e7:41:d7:98:c8:ee: 5c:79:04:4a:70:c4:bb:30:86:df:29:07:b6:6e:42:4b: 3b:d3:0d:f2:b2:e4:10:6f:d0:95:e9:7b:5d:e7:ac:e3: 33:c5:92:94:96:ba:d8:76:56:8a:36:59:0f:ea:d8:9e: b5:d3:be:30:19:f0:ef:ee:77:a6:88:31:aa:8b:22:a5: 13:e0:0e:95:17:65:a2:a7:9a:6e:08:c3:ba:49:ba:00: f6:0a:e5:4b:8b:64:4f:b0:30:c5:22:e9:e4:74:a7:a5: be:38:84:88:4e:bd:7d:06:45:a9:6e:44:c5:2e:af:e4: 56:e0:05:c8:77:67:70:bc:02:54:94:55:d0:29:41:64: ce:c9:42:a9:72:72:5a:3d:ea:51:7e:59:7a:46:37:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:48:ca:5e:d6:fe:35:9e:7d:33:9f:a3:b5:70:4b:a8: 81:ca:22:36:12:f5:2a:d1:a7:e2:f9:5c:6d:06:eb:fb: a8:1f:39:44:11:75:7d:ae:3c:4f:72:a9:96:90:1c:5d: e2:c9:e8:bc:b8:de:52:00:b7:f6:42:fd:b1:6b:7f:8e: 1b:9f:88:78:a3:d6:67:d5:86:4d:32:a6:ff:ed:f8:72: f0:33:23:cd:d4:0d:bd:9f:37:dc:f4:73:48:9a:ad:34: 0a:30:f4:bc:b2:b6:9d:34:2b:45:77:fa:04:ad:14:d9: 4d:ec:88:86:73:d6:cf:43:15:84:aa:3f:bc:ff:ac:a9: 83:5e:2f:a1:03:11:af:b9:9f:4f:b3:7f:26:44:25:30: ee:3b:ca:4f:0e:9c:fb:1f:e4:40:a1:a9:26:16:22:70: 4b:ec:d6:c8:80:c9:39:04:42:5a:7f:1e:54:d7:0b:8f: c0:73:ff:a8:15:fa:67:b8:99:7d:cc:86:80:e1:34:19: 9c:48:57:1f:6e:61:ad:2a:99:7a:c1:be:35:b0:97:8b: 44:38:6b:1c:a3:34:df:ab:89:aa:0a:39:6f:17:bf:9e: 63:71:31:13:25:e6:12:9e:41:21:a8:f9:bf:6e:a4:bc: f4:a8:e4:93:9e:0d:45:d5:b8:86:fb:cb:d3:8c:10:5d Fingerprint (SHA-256): 50:1A:75:F9:92:95:B4:EA:C6:91:8F:8F:32:83:74:18:21:C4:59:AA:78:A7:5A:07:D2:4B:C2:6C:76:1A:C9:E9 Fingerprint (SHA1): 78:94:67:05:CD:C3:52:D9:75:5E:38:43:73:EA:AB:20:82:72:65:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1092: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1093: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1094: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1095: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1096: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1097: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194473 (0x433ee1a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:46:00 2025 Not After : Thu Nov 28 11:46:00 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b3:3e:91:d5:0f:7a:80:26:1e:ce:f2:2f:bb:fa:f8: 4b:a8:c3:95:75:b7:78:44:96:e7:44:07:83:12:e2:d0: 6e:a8:2b:99:f2:1f:5e:2b:5e:0e:50:d7:8d:27:c5:3f: 2e:07:1d:7d:0b:d2:61:ae:25:e5:af:f0:f0:3d:bb:51: 6d:e1:c5:df:35:05:69:7d:99:08:83:d4:91:6a:e4:a6: 46:ac:55:82:87:a8:7a:ff:58:9f:60:9d:49:06:c2:6d: 39:c7:97:7c:2a:67:73:3a:9c:89:11:4a:8b:a9:6a:06: 10:5d:23:75:54:d6:ff:3d:94:7c:8e:56:75:c8:ed:4b: 26:51:2c:9b:8f:89:46:f1:4f:a5:73:b8:ee:7c:bb:d5: 29:50:1a:5c:19:4d:f4:3d:a1:98:c7:0b:1f:e0:cc:4e: 11:4a:ac:dd:00:e3:56:5e:4c:a8:76:e5:7d:8b:04:4e: 82:de:02:e6:a0:fe:a5:e0:1d:f6:dc:49:84:da:1b:a7: a5:4f:12:eb:f1:da:fc:6f:b3:1a:71:8b:ea:fa:46:aa: f5:f8:13:0f:c2:58:5e:f2:6c:dc:ab:b7:ad:00:bb:55: 4e:0a:d0:1b:0a:ff:d4:9f:45:b9:45:5b:5e:e2:0a:4d: 70:df:9e:21:a2:16:5e:90:66:76:86:15:db:fa:db:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:3e:33:4f:65:3c:87:73:a7:3c:d4:ab:4d:ca:42:a2: b6:fc:a7:ca:79:e2:24:3e:cf:42:24:9c:8c:18:be:93: 18:cf:0c:2a:05:30:e2:eb:b3:d4:0a:fb:48:44:d1:3d: cd:a4:d0:70:46:41:a1:f5:23:0b:3f:c5:f2:33:f2:80: 8e:da:39:0b:30:f4:51:e8:df:3c:30:c1:ba:d6:70:4a: 76:9c:8b:f7:38:aa:c9:82:2d:c2:ad:78:89:d1:94:a6: 91:f4:aa:5b:70:3b:a5:d1:a6:8e:e6:10:04:50:05:d4: 3d:75:47:f4:04:57:9a:fb:8b:7c:2f:d6:d9:5e:73:b7: 2b:6d:5c:69:48:65:38:33:ec:84:5b:c1:a7:0d:cf:ee: 0b:47:d4:ac:c1:40:3a:0a:be:1f:dd:06:af:76:5b:29: 40:61:23:79:09:fd:d6:8a:f7:6c:b9:3e:4d:cc:24:2b: 08:d8:02:75:44:ac:50:ed:d0:ff:24:55:77:d7:56:b8: 4b:d7:f6:46:f1:c1:f9:78:f1:aa:7c:04:f4:10:72:12: 84:e5:d3:d4:62:26:3e:c5:56:b8:79:69:ef:7f:c6:7b: b3:dc:57:63:0e:e4:4f:45:eb:78:31:93:d7:91:78:f6: 8f:b3:07:37:52:fc:ee:a9:8f:eb:41:09:db:3f:ba:c0 Fingerprint (SHA-256): 66:12:E6:3D:58:01:6B:A4:A2:98:F2:F4:EA:2A:40:60:98:42:13:E6:15:32:26:BB:9D:7F:56:96:78:2E:B2:27 Fingerprint (SHA1): AF:E7:96:65:7F:2A:43:2A:71:09:FE:00:D6:E1:9C:CE:B3:F1:D0:32 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1098: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194473 (0x433ee1a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:46:00 2025 Not After : Thu Nov 28 11:46:00 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b3:3e:91:d5:0f:7a:80:26:1e:ce:f2:2f:bb:fa:f8: 4b:a8:c3:95:75:b7:78:44:96:e7:44:07:83:12:e2:d0: 6e:a8:2b:99:f2:1f:5e:2b:5e:0e:50:d7:8d:27:c5:3f: 2e:07:1d:7d:0b:d2:61:ae:25:e5:af:f0:f0:3d:bb:51: 6d:e1:c5:df:35:05:69:7d:99:08:83:d4:91:6a:e4:a6: 46:ac:55:82:87:a8:7a:ff:58:9f:60:9d:49:06:c2:6d: 39:c7:97:7c:2a:67:73:3a:9c:89:11:4a:8b:a9:6a:06: 10:5d:23:75:54:d6:ff:3d:94:7c:8e:56:75:c8:ed:4b: 26:51:2c:9b:8f:89:46:f1:4f:a5:73:b8:ee:7c:bb:d5: 29:50:1a:5c:19:4d:f4:3d:a1:98:c7:0b:1f:e0:cc:4e: 11:4a:ac:dd:00:e3:56:5e:4c:a8:76:e5:7d:8b:04:4e: 82:de:02:e6:a0:fe:a5:e0:1d:f6:dc:49:84:da:1b:a7: a5:4f:12:eb:f1:da:fc:6f:b3:1a:71:8b:ea:fa:46:aa: f5:f8:13:0f:c2:58:5e:f2:6c:dc:ab:b7:ad:00:bb:55: 4e:0a:d0:1b:0a:ff:d4:9f:45:b9:45:5b:5e:e2:0a:4d: 70:df:9e:21:a2:16:5e:90:66:76:86:15:db:fa:db:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:3e:33:4f:65:3c:87:73:a7:3c:d4:ab:4d:ca:42:a2: b6:fc:a7:ca:79:e2:24:3e:cf:42:24:9c:8c:18:be:93: 18:cf:0c:2a:05:30:e2:eb:b3:d4:0a:fb:48:44:d1:3d: cd:a4:d0:70:46:41:a1:f5:23:0b:3f:c5:f2:33:f2:80: 8e:da:39:0b:30:f4:51:e8:df:3c:30:c1:ba:d6:70:4a: 76:9c:8b:f7:38:aa:c9:82:2d:c2:ad:78:89:d1:94:a6: 91:f4:aa:5b:70:3b:a5:d1:a6:8e:e6:10:04:50:05:d4: 3d:75:47:f4:04:57:9a:fb:8b:7c:2f:d6:d9:5e:73:b7: 2b:6d:5c:69:48:65:38:33:ec:84:5b:c1:a7:0d:cf:ee: 0b:47:d4:ac:c1:40:3a:0a:be:1f:dd:06:af:76:5b:29: 40:61:23:79:09:fd:d6:8a:f7:6c:b9:3e:4d:cc:24:2b: 08:d8:02:75:44:ac:50:ed:d0:ff:24:55:77:d7:56:b8: 4b:d7:f6:46:f1:c1:f9:78:f1:aa:7c:04:f4:10:72:12: 84:e5:d3:d4:62:26:3e:c5:56:b8:79:69:ef:7f:c6:7b: b3:dc:57:63:0e:e4:4f:45:eb:78:31:93:d7:91:78:f6: 8f:b3:07:37:52:fc:ee:a9:8f:eb:41:09:db:3f:ba:c0 Fingerprint (SHA-256): 66:12:E6:3D:58:01:6B:A4:A2:98:F2:F4:EA:2A:40:60:98:42:13:E6:15:32:26:BB:9D:7F:56:96:78:2E:B2:27 Fingerprint (SHA1): AF:E7:96:65:7F:2A:43:2A:71:09:FE:00:D6:E1:9C:CE:B3:F1:D0:32 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1099: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1100: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194478 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1101: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1102: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1103: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194479 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1104: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1105: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1106: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194480 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1107: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1108: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1109: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194481 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1110: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1111: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1112: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194482 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1113: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1114: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1115: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194483 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1116: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1117: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1118: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194484 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1119: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1120: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1121: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194485 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1122: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1123: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1124: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194486 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1125: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1126: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1127: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1128: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128194487 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1129: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1130: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128194488 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1131: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1132: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128194489 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1133: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1134: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1135: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1136: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1137: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128194490 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1138: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1139: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128194491 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1140: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1141: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128194492 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1142: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1143: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1144: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1145: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1146: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128194493 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1147: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1148: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128194494 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1149: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1150: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128194495 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1151: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1152: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1153: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1154: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1155: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128194496 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1156: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1157: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128194497 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1158: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1159: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128194498 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1160: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1161: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1162: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1163: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128194499 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1165: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1167: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1168: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194500 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1169: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1170: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194478 (0x433ee1ae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:46:05 2025 Not After : Thu Nov 28 11:46:05 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:46:70:90:61:56:06:46:44:7a:3f:82:6e:29:2d:3a: 8d:16:ea:8c:17:dd:93:c5:30:25:f7:47:8e:ca:98:3c: b2:66:63:e5:d7:1c:e4:42:0d:31:ea:3c:c0:9e:bf:d3: 83:a1:9b:d7:07:4c:e3:02:f3:08:97:bd:7e:16:4c:86: 57:22:3b:c5:32:52:43:be:16:62:9d:88:b6:b9:cc:52: 53:ce:f3:cc:50:77:4e:1c:d8:e5:8b:3d:75:ec:6c:0f: 8a:3f:f5:0d:c2:2e:da:f8:f5:bc:2a:fe:50:5b:b7:82: 04:72:1d:81:96:22:50:0e:84:ef:52:7d:53:f7:bb:8d: 7d:63:4f:d2:77:f9:aa:c1:14:79:d2:89:9a:f8:b8:9d: c5:9a:0f:ba:ed:7c:fe:43:a8:03:42:3e:d6:68:83:8b: 05:b8:3f:ab:a2:0f:3a:68:02:2d:b2:73:a6:e3:13:34: 49:f7:56:50:c1:88:5c:9e:dd:09:5e:a6:c0:d7:a7:4d: 82:b2:5f:3b:de:d8:97:75:59:ab:49:98:74:bd:76:90: ff:d5:6c:03:0b:3e:47:ee:1f:81:51:fa:9d:95:4b:cf: 60:12:72:7b:b6:aa:05:95:fc:c9:c4:b9:6a:30:eb:3e: 6c:7b:02:0e:8e:2a:6c:a1:44:bf:c2:ae:fd:9d:27:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:1a:b3:ef:be:12:8e:75:45:43:ae:8e:87:c3:f4:ee: 51:14:33:cd:61:05:5f:be:70:fd:02:d5:8f:76:63:28: a6:69:9d:93:5c:f1:34:60:83:44:54:0f:6e:c0:fd:13: 94:dc:4b:38:36:f3:53:55:1a:e2:fc:c4:ab:94:59:65: e8:e1:83:70:be:74:35:cc:6c:4a:ee:2b:6c:6e:d5:68: 7d:32:83:c9:86:e8:c9:38:a6:bf:f8:ff:82:fb:c3:64: b3:b5:a0:69:83:97:9e:3c:8f:54:68:36:9e:13:50:02: 2d:31:8b:a6:5e:34:11:91:ba:1c:e0:e9:d1:b0:02:01: 80:b9:4d:6e:e6:4d:c8:db:16:89:93:24:b2:36:80:04: 29:15:f5:99:19:0b:a6:da:be:e8:27:37:df:cc:41:06: 47:19:ac:b0:1e:94:4a:28:7f:71:a0:18:f3:27:ad:49: a9:2b:bf:95:18:60:fe:fe:6a:76:d3:88:51:92:e0:69: 69:38:db:9b:7f:22:1f:55:9a:0f:86:e3:54:b6:f2:1a: c4:20:73:92:b2:22:45:33:98:7a:56:78:67:44:9c:56: b0:0d:00:96:7d:83:53:fd:15:3e:86:8f:0d:43:ae:95: 38:d1:a0:b0:07:f5:af:08:cd:b0:1b:df:d2:f4:cd:e4 Fingerprint (SHA-256): 0A:43:C7:91:93:E2:C4:C2:95:3E:41:D9:8E:6C:02:22:FC:0C:58:27:F4:0D:F6:EB:CB:83:02:94:58:0F:E7:69 Fingerprint (SHA1): AF:A6:B6:C4:98:BA:8C:83:BF:63:7F:27:82:40:63:A7:31:AC:E9:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1171: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194479 (0x433ee1af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:46:05 2025 Not After : Thu Nov 28 11:46:05 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:3b:97:d6:a9:eb:90:5c:63:24:e7:b1:11:ff:64:15: 56:fa:2a:f7:2d:89:a2:22:ba:22:1d:4b:74:88:0f:e4: aa:76:ff:bd:7f:56:52:45:fd:15:46:2f:83:3a:7c:b7: 31:90:78:56:45:e7:10:ea:b7:c6:82:4b:cc:b5:e2:ce: 21:45:14:89:b0:03:bb:ce:3a:2b:f5:78:d6:ed:18:54: 44:76:9c:7a:ed:61:25:c1:9d:aa:45:84:cc:7a:9a:5c: da:cc:8f:c8:d6:d2:de:a0:93:d9:c8:12:21:4d:05:5a: 28:78:69:c1:44:e2:f7:b0:fb:a1:f9:31:24:da:15:fb: e2:45:31:d5:ad:14:4f:8d:a8:85:40:25:dd:26:83:df: 02:a1:c6:bc:35:44:a1:17:b7:21:11:9f:ca:9f:59:be: 30:16:13:15:d4:e8:c2:e2:cf:c9:bf:42:ae:52:db:3d: 3e:10:75:ab:5e:1c:13:c5:b1:35:0f:82:ce:84:91:50: 04:c7:9c:09:a7:fe:99:76:0a:50:dd:19:72:f7:ae:7d: cf:a5:cd:9e:25:40:82:43:ea:0c:0a:3d:48:6d:4b:06: 63:d6:db:52:d1:3b:df:2c:34:04:17:8d:ee:12:12:d0: 54:ba:1d:ba:c2:e8:7f:bf:61:56:0d:a1:1e:9f:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:49:61:b3:db:f8:77:b1:ba:4e:a2:de:ed:8f:93:0e: 60:dc:d0:8e:a2:41:b9:0f:3f:45:97:21:bb:5b:10:35: 9b:b1:49:ea:62:1e:6f:27:6e:37:8e:51:23:be:89:a1: 2d:55:02:75:8f:b1:b2:d2:31:af:47:f5:36:20:73:5f: 06:f2:e9:eb:62:ef:f5:80:2e:5c:4a:06:87:2e:25:3f: b1:83:c0:60:85:21:d6:41:8e:2b:d0:b2:e7:f9:7e:ff: 5d:a8:49:9a:a8:b2:ba:f7:ae:c8:07:49:1e:7d:b3:ba: bd:df:80:84:f4:45:85:8b:a5:99:87:5d:06:ad:cf:d3: 80:0c:28:4e:e7:68:9f:4a:70:91:cf:1f:c7:32:7f:a2: 1b:d0:83:05:76:43:1c:7a:98:1d:b4:03:1d:b9:a3:58: 78:b8:d4:1b:dd:b4:da:c2:7d:3c:be:5f:04:6e:3a:ec: e2:2d:b1:dd:e8:5f:a4:36:c8:10:12:dd:a3:46:a2:93: 1c:ac:dd:01:db:0c:8f:c5:6e:37:12:c2:07:19:2f:0d: eb:fd:dd:02:ca:9f:60:84:52:b9:c8:16:d1:d3:5d:c0: 84:62:f4:94:0f:a5:0c:6f:7a:9b:af:68:62:37:ac:09: fc:04:24:6d:3d:92:b9:82:1e:86:fe:92:26:68:5a:86 Fingerprint (SHA-256): AA:9B:06:E6:58:73:A4:88:1C:00:65:17:C6:D1:EB:B5:E0:FD:E8:65:A8:31:74:00:2D:24:91:6C:82:71:AB:67 Fingerprint (SHA1): 1E:C6:09:2B:4B:A4:BA:D0:A0:A8:D9:01:8E:91:A3:DD:52:24:E4:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1172: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194480 (0x433ee1b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:46:06 2025 Not After : Thu Nov 28 11:46:06 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:39:a7:7f:39:b9:21:40:38:24:82:48:43:7f:07:ff: 91:bc:b9:af:d9:db:04:9e:6e:87:36:b7:fd:8c:08:c9: 3d:50:48:ac:14:6f:0c:37:56:9e:af:58:62:88:fc:d6: 75:37:ad:36:2c:9d:96:52:32:13:21:20:36:16:f2:94: 54:1f:c5:68:01:64:99:e3:5f:ae:86:a0:fe:92:98:70: ef:92:70:89:c0:55:d3:1d:e5:9e:7d:65:e6:69:61:a0: ec:41:22:44:cd:3b:ba:00:a5:a5:bf:d7:98:fb:30:8a: 6c:ee:09:01:fa:73:79:4d:51:7e:6d:92:9e:55:fb:f5: 62:40:a1:3c:fa:d5:d0:54:2a:b8:c6:68:e3:d8:b5:ed: 4b:ad:e1:8d:3c:a2:98:f1:9f:b9:5b:7c:0c:39:8a:eb: 10:8c:77:3d:40:f4:a4:4a:43:fd:d4:fe:78:62:20:72: 28:83:e2:b5:cf:32:86:dd:02:a0:c7:7e:d7:f7:d1:a0: c7:de:e8:9a:69:bf:ad:ed:82:f3:4a:f1:82:6b:d4:d9: 9e:10:d9:34:e3:e7:81:58:db:3d:31:9b:89:e8:35:0b: 54:79:63:66:1d:7c:f8:db:27:d4:ad:02:99:34:a4:e0: 54:52:d3:72:ea:03:08:0f:09:a3:5f:c4:63:d6:ed:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:07:60:65:80:45:67:3b:8b:42:f7:ce:c8:52:06:62: 26:37:dd:cc:e0:58:4f:a3:48:3b:35:6c:16:58:e0:dc: 0f:c7:4e:07:e4:01:d7:0d:5c:9f:cf:43:3c:3a:e2:c7: d2:cd:b9:cf:fd:e7:2b:ac:4c:58:b1:b5:2d:98:e2:f4: 9f:25:ff:45:b4:49:00:66:1a:e1:ab:8f:7d:73:90:da: 61:5c:6e:b7:9b:b2:32:9c:68:3d:db:3d:38:bb:e3:a5: 28:7b:6e:22:5a:d9:c6:b5:e1:84:d4:2a:46:a5:c9:03: ce:85:6f:86:35:d2:60:1a:cf:c7:ca:f0:83:4a:01:1e: d6:4b:e4:90:54:21:85:a9:2f:08:8f:fc:df:c4:d7:4f: f2:73:f9:e1:2e:63:40:0b:ea:b2:94:7b:bc:ee:5f:c9: 61:a9:fc:44:86:f9:31:5d:51:46:d4:b5:d1:d0:03:b0: 67:f1:98:94:fb:63:91:ed:01:ef:75:5b:c7:fa:bc:73: 30:e3:3b:d8:17:1a:60:3b:01:93:28:1e:e2:9c:1b:5b: 7c:c4:84:29:94:0d:34:a5:16:0f:da:ae:f4:8e:a4:ad: e5:02:e1:d1:0e:7a:aa:8a:09:59:91:91:a4:ea:81:0c: 01:54:3d:f6:f7:e9:26:1d:cb:f5:cd:5d:47:ca:a6:af Fingerprint (SHA-256): E4:D6:E0:82:F8:2E:2F:AF:88:81:EB:2C:0C:FF:8B:6F:AD:30:CF:EA:45:6E:4B:D4:79:90:55:3B:76:8B:91:1F Fingerprint (SHA1): 3A:15:71:0C:BB:3E:F7:03:72:7D:3F:42:A9:7F:C7:E0:BD:A9:FF:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1173: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194481 (0x433ee1b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:46:07 2025 Not After : Thu Nov 28 11:46:07 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:82:43:71:4b:4d:2a:42:0a:ad:95:01:7c:9d:75:7f: 1b:db:f6:ba:c7:0d:d9:45:02:4f:af:73:f5:33:44:57: ff:d2:8f:f7:43:fb:e8:aa:b0:ef:75:90:6a:c0:30:98: b0:3d:91:a5:e3:98:43:e6:c4:f7:78:51:ce:49:bc:67: 1c:af:df:84:40:fa:98:26:3e:25:cc:04:20:e4:3e:5b: af:5a:3d:58:a9:8b:dc:ca:f3:8c:4a:42:f7:ad:ec:34: 24:fa:81:1e:40:ae:29:8d:df:39:fb:df:04:9e:0c:ef: 5f:5a:a9:75:ae:c6:00:c5:11:bf:29:24:e6:04:19:7e: ac:43:43:1e:21:3b:4d:04:a1:49:71:b9:15:71:21:6a: 7e:fd:7a:45:0c:a5:23:fc:33:3f:48:4d:c7:bb:ba:a3: 7c:2c:8a:1b:8b:84:1d:55:87:78:6f:11:32:d0:91:b9: 0f:1b:20:b8:27:74:93:6e:fd:75:bc:7d:96:fc:ad:a8: 16:4d:e0:e8:e2:96:4f:bf:e8:3f:7f:2c:09:35:4c:d6: a5:e9:ed:2a:01:b6:47:03:7c:6a:dc:94:17:78:ab:e4: b5:dc:f9:86:c3:22:34:83:7b:b3:a9:1b:a0:a2:f6:cf: f5:98:b2:e4:7c:54:58:0e:e0:93:a7:d3:6d:07:43:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:48:34:ce:9e:cf:8b:82:46:fa:4b:be:46:51:32:bd: d7:2c:31:a0:8f:e7:3f:98:f4:7d:a5:81:7d:d6:d5:0e: 20:3b:59:41:c7:03:1f:a0:2f:e9:be:81:f1:06:4e:56: d0:fc:7b:a2:dd:24:53:d5:6a:30:d9:3d:d2:e3:a7:a2: ba:12:b9:0f:eb:d3:a3:4f:c0:52:f4:ba:6f:37:aa:b8: 11:86:bc:38:ca:7f:ec:d2:e3:df:1c:72:d1:86:29:eb: 5f:7e:60:e0:b1:b6:63:a6:06:52:e6:c3:e2:e2:de:3c: 5f:08:43:f7:66:6e:ca:fd:f7:e0:9c:16:6b:4e:6f:d4: 88:9c:ec:d6:42:9f:a3:a1:35:2b:67:67:97:90:4e:71: 07:a8:4c:3d:c2:7c:63:37:c0:5c:a3:50:5c:93:15:20: ba:c9:fc:f7:ac:94:f4:fe:62:f8:a9:a7:b7:c7:a4:1d: 1e:8a:bf:a6:7f:50:c2:79:b4:de:c5:9e:e1:85:60:55: af:6e:d5:0e:c9:cb:e3:d7:6f:04:cc:2d:c0:2c:1e:59: 51:40:bf:68:94:be:d3:98:1d:96:f5:bc:10:38:6e:95: 6f:08:1a:db:44:72:7d:74:57:c5:a6:80:1c:ab:71:80: 94:7e:c4:5b:21:fb:6e:9f:c5:06:29:9b:96:f6:4a:a9 Fingerprint (SHA-256): 7D:33:F3:39:1C:F4:14:0B:8D:BD:18:53:4F:24:13:C9:88:BF:FD:6D:08:34:16:ED:FE:CE:19:54:B9:70:79:1C Fingerprint (SHA1): ED:AB:82:1C:F9:BD:D4:5C:9C:5E:73:B9:7F:77:9F:52:B7:C9:AF:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1174: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194482 (0x433ee1b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:46:08 2025 Not After : Thu Nov 28 11:46:08 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:37:c2:ae:ef:e9:8e:05:ed:ad:67:02:32:8b:e6:18: d9:d7:c4:6a:2f:c1:47:04:8d:de:fc:3b:36:68:d9:1c: 24:45:1d:4a:4b:cb:3c:6d:77:33:72:30:bc:97:66:d3: c0:c7:f9:f3:6c:b5:7c:16:65:96:68:56:43:58:2f:90: 45:01:be:28:05:d6:f9:ba:16:04:45:dd:b2:a3:af:aa: 23:00:33:0e:c6:9b:a9:f8:47:a3:79:c6:90:35:d3:c9: cc:5b:3d:93:06:4f:9b:da:12:b0:63:20:16:7c:b1:8a: ae:5f:6f:d7:5f:88:f0:f6:b2:07:62:86:1b:ea:00:14: 1f:7b:27:a5:dd:ff:51:73:1f:aa:18:9b:fc:89:8d:78: 27:4c:a7:c1:ba:bf:a0:9a:8d:2e:8a:41:a5:e1:08:02: 62:2c:44:22:c6:07:58:4f:17:f0:31:15:99:04:bb:8a: 0a:bf:4c:ab:e2:08:c5:e7:b8:23:49:62:c0:10:3c:10: 88:5e:dc:dd:33:d3:70:df:aa:03:63:d9:12:b8:cb:28: ed:f0:ce:63:59:8a:89:04:1b:00:7a:16:fb:f4:75:73: 3d:c8:d6:e4:87:a3:da:f3:6d:ea:a8:b7:ef:49:c5:56: 8c:e5:7e:8b:b3:27:08:16:ec:ac:f5:da:fa:cd:8a:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:d3:92:00:a2:9c:61:06:2e:17:c2:9a:ee:52:ac:2d: 9f:fb:8e:8e:53:72:d1:c1:f0:19:cf:66:90:cc:89:e6: 30:e3:ac:8b:c1:d5:57:1a:fc:71:3f:2a:75:f6:99:81: 46:bf:1a:96:a0:ac:84:2e:82:32:2e:9a:2f:53:5d:1c: d5:a5:89:98:41:53:e7:41:2e:1a:9f:1f:d2:7c:c5:60: 57:8f:a7:da:56:ad:c8:88:f8:4e:be:6d:d9:ea:f6:7a: 02:87:26:60:c0:da:bd:18:95:dd:17:05:ba:93:ab:62: 6a:28:b1:65:f4:36:47:65:2f:c3:ec:f5:72:bf:d0:3b: c7:3e:6e:db:25:57:25:dd:1e:a5:0b:ef:e7:de:c8:86: fe:c5:e8:9c:22:a2:3f:44:a3:49:3a:3a:66:27:7f:6c: 2a:f3:0d:b5:9c:02:92:82:8d:45:45:be:0d:1a:52:03: 51:b3:74:72:60:5e:6e:b6:69:23:c7:82:aa:99:4d:85: 17:5a:51:15:33:31:0a:d8:1e:ec:f3:67:66:fe:c5:5d: 88:5b:a9:4c:e2:73:f1:0f:24:37:49:9a:b5:44:45:d6: 6e:a7:ad:46:ce:98:09:6e:c9:f8:88:87:1c:6b:2e:52: f8:29:a9:45:fa:8c:99:c7:2e:18:48:5c:03:82:d1:0c Fingerprint (SHA-256): 2F:59:DD:F0:8A:6B:C8:21:93:2A:12:EE:47:E7:7C:70:79:A0:6D:69:D8:91:58:F0:44:12:60:9A:3B:99:47:C2 Fingerprint (SHA1): 7A:8B:81:D9:96:2F:22:B8:BC:75:EF:4D:D6:AB:B8:9A:A2:F6:9B:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1175: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194483 (0x433ee1b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:46:08 2025 Not After : Thu Nov 28 11:46:08 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:ae:83:ba:6d:14:d2:e6:f9:14:4b:0f:d4:b7:00:09: 79:74:9e:12:39:cc:13:44:a0:ce:f9:76:65:e0:9c:56: a2:fe:d1:ef:56:fb:76:d4:8e:9b:88:2d:61:ae:46:f9: 23:f7:dc:8b:4b:78:d2:a0:a9:6e:06:87:7d:97:20:6b: 29:a1:e1:64:b6:5c:69:45:68:63:89:b3:8d:72:90:d6: e3:6a:b1:1b:48:5c:81:47:b1:ca:e5:8d:4d:34:62:5d: e0:7a:d0:d5:c6:95:59:66:52:e4:06:17:34:0b:7c:5f: c1:33:cd:4f:02:20:7f:e8:dd:af:c6:cb:a3:23:d1:78: 3a:52:34:ce:3e:2a:9e:d5:b5:ff:63:99:d8:7e:7b:ca: 7b:c4:c6:ff:26:ad:dd:87:6d:5c:93:bc:8c:25:37:f4: 26:51:59:e9:f4:ef:34:5a:af:1c:60:04:2a:16:1b:e7: 79:6b:da:f7:a4:b4:8a:ea:fb:15:fa:37:ab:64:ca:8a: b4:fb:96:68:e1:8e:ff:6f:f4:51:78:be:4a:73:78:27: 26:d3:f7:c1:cf:e6:43:04:aa:f5:1e:2a:c3:a9:49:72: 3a:91:62:44:0d:7a:0a:ad:43:78:fd:bc:c7:42:a2:a9: ee:51:1a:c6:7a:d6:63:36:cb:8a:30:7f:4a:9d:37:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:58:ff:d0:1a:d9:89:8c:01:5b:1a:36:de:63:fc:5a: e7:ac:6a:72:ae:ca:5c:22:e1:d9:52:25:51:82:a1:c0: 93:e4:9f:c9:4a:aa:5c:b4:6a:46:8a:19:82:0f:85:9b: 9e:ad:9a:8f:cd:14:b6:12:11:d5:6a:d3:71:86:fd:a5: 45:09:de:cf:7c:30:90:a1:79:d2:90:b9:de:49:25:df: 96:52:67:a8:7c:fd:52:aa:f1:ef:f8:b3:e0:52:6c:05: 15:fc:78:cc:45:89:53:18:c0:a9:7d:c4:e6:04:89:ef: ff:6b:36:bb:9c:04:ac:0e:13:50:3f:a7:a4:21:17:77: 33:32:e6:e3:3a:80:40:f4:58:5c:db:07:c0:76:04:de: e9:7f:17:2f:29:51:18:06:ff:54:60:32:73:3c:a3:b0: 29:ef:08:df:aa:21:f6:0d:88:6e:3d:a3:c9:f7:7e:f3: c6:4e:aa:d5:4d:75:1a:0c:09:7a:d4:70:0e:1c:76:ca: 58:93:ff:dd:18:a8:97:91:e0:cf:69:22:d9:8b:40:f2: 79:7f:fe:49:78:18:cb:f1:47:87:de:7b:9d:db:ac:8f: 49:2a:31:5e:b7:a7:b9:bd:e7:09:d2:80:d8:62:04:91: a4:fa:7f:d8:74:e3:54:52:79:90:e4:98:e2:fc:f0:da Fingerprint (SHA-256): 11:6F:6A:E4:C3:62:60:00:A8:30:F3:30:D6:69:3D:6C:3C:28:02:02:43:08:AD:D5:C2:30:A3:8E:30:F0:30:40 Fingerprint (SHA1): 98:7E:AB:F4:E0:FF:15:B5:11:4B:F2:92:2F:C3:C4:49:4B:08:A0:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1176: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194484 (0x433ee1b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:46:09 2025 Not After : Thu Nov 28 11:46:09 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:7b:f3:19:46:4d:b1:39:b8:29:e9:2b:9b:bf:f5:92: 3d:64:92:6f:01:12:05:05:bd:89:66:4a:ef:4d:1a:30: 5a:06:5e:cc:e9:65:be:55:92:e4:e9:52:ab:3d:46:7e: 31:a2:4b:88:1a:52:e1:01:06:c4:d8:e1:46:c5:c2:84: b4:d7:f6:6a:c9:c2:e7:4c:96:38:bf:a2:df:3a:18:cc: 14:f9:74:8f:57:1f:62:e7:64:df:e7:95:2c:07:35:63: 93:6e:85:b8:21:7f:f8:99:d8:ed:50:25:df:52:63:22: 56:13:27:2a:72:eb:f8:02:d9:09:94:5c:d2:68:07:23: f9:96:c6:68:5a:49:3b:d1:e5:98:6f:00:d7:7c:32:a6: 64:75:32:76:cc:02:80:97:fa:21:75:a2:a4:b2:49:1f: 52:ab:e6:14:0a:ad:7a:bc:d8:ac:de:66:46:85:ce:e6: 13:f4:02:87:7c:76:53:c7:21:52:61:16:c9:86:26:b8: e5:5d:83:2b:cd:b9:46:b2:82:31:9a:0d:7e:02:cd:04: b8:90:78:c6:da:4f:2e:be:74:88:5d:c2:7f:12:ac:c8: 04:17:15:28:58:1a:38:7d:1a:fa:59:34:c5:43:14:fe: 84:c9:23:d4:85:41:32:ba:8f:45:fb:57:e1:5f:b5:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:9e:97:87:e4:ea:87:99:23:8f:c6:0d:ee:a4:71:af: b6:2c:2a:1c:74:7a:15:24:fa:6d:9e:da:64:f7:d8:17: 9f:6f:11:24:75:4a:74:24:14:4a:28:a9:bf:43:1a:3b: 37:0d:26:c1:e7:35:9c:9d:95:d8:c1:2a:dd:d4:14:45: 07:a7:63:4c:2a:dc:50:ff:46:f6:21:dd:83:5b:4c:6e: c9:23:14:ba:ec:53:73:04:dc:77:62:46:3e:05:57:06: 37:20:6c:50:3a:e0:51:ac:98:fa:45:79:d2:cb:5c:7c: 42:b1:f8:c2:6c:81:4d:bc:52:d0:a7:53:1f:6f:d9:c6: 5d:77:6b:00:2b:69:6a:4d:1f:1d:70:e2:b3:6b:0e:d8: e6:47:dc:62:de:9b:15:37:b0:b1:72:31:83:83:ef:00: af:3a:cd:c0:5f:59:b2:bd:9f:6c:5e:5a:9e:4e:06:c2: e3:b0:2f:64:bd:3f:d3:d5:a1:66:6a:65:5d:b1:b2:94: 7a:c7:a1:7d:24:f9:c6:4d:d1:5e:39:c9:8d:20:b5:da: 45:b7:4a:88:27:2a:05:4e:b5:ae:29:1c:85:9e:10:0f: eb:3e:b1:64:d5:05:fc:ee:a1:d1:1b:89:0f:d7:57:9b: b9:49:11:7e:03:ba:db:9e:d0:5f:f3:50:98:3c:db:ff Fingerprint (SHA-256): 12:61:4F:A0:A7:E9:97:D7:23:37:1A:79:90:A0:42:A2:D3:98:77:4C:B1:AB:C4:06:9E:5A:3B:BC:02:E7:A3:74 Fingerprint (SHA1): FB:09:3A:DE:D1:21:E5:F3:94:A6:F5:21:EA:3D:82:1C:67:07:70:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1177: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194485 (0x433ee1b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:46:09 2025 Not After : Thu Nov 28 11:46:09 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:46:5f:9c:97:1b:c7:03:ca:b5:c5:b1:00:9b:ba:05: 5c:82:a2:b7:46:35:a2:1f:6a:97:18:a5:b8:9d:b5:1f: 4f:14:19:93:83:8a:4b:c4:83:3f:6c:2b:a1:dd:40:07: a9:b0:77:25:bd:51:32:81:6e:4f:d4:c3:9a:f2:55:f9: 73:80:5d:8c:41:78:03:d3:22:4f:93:50:76:9b:08:21: 5f:13:21:ca:b4:99:c5:d5:e3:fc:96:61:11:de:d7:ac: 3b:0d:8f:cc:a2:51:3f:59:50:0a:70:c2:2b:f4:ce:a5: ee:8b:a3:28:7c:50:cf:d2:86:dd:c5:fb:69:6c:ab:91: 88:ba:72:2e:c4:90:29:ed:9a:19:20:df:49:e8:e9:2f: 3b:11:0b:b6:5f:eb:bd:ec:1a:93:fe:f8:f3:a9:e2:5b: 89:6c:83:59:63:de:b1:b8:e4:92:52:90:0e:78:75:de: e8:64:21:cd:f9:c1:ba:ac:c4:ed:64:c4:5a:73:af:79: 5e:b2:d1:15:e8:57:f7:57:46:79:63:d1:45:dd:c5:81: 9d:ed:fb:40:ca:69:44:6d:97:6f:43:c8:2a:56:01:23: 66:b4:4d:fb:ff:e4:10:56:07:8b:53:e9:eb:55:0c:e8: 5a:d2:a7:87:76:0a:14:9c:e3:57:d8:0c:29:9d:c5:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:a9:51:2f:05:2d:ac:42:75:ef:16:82:18:45:85:98: a8:96:ab:3d:ac:ca:0a:94:82:02:0c:56:79:44:e5:dc: 95:58:2c:06:dc:7a:3b:e8:ab:ef:b8:d5:0a:5b:5b:6b: f8:ea:4d:a2:71:dc:96:45:41:53:73:b8:32:cf:f0:69: dd:d1:d7:72:50:7f:b8:c9:ad:cc:28:c8:d5:19:14:71: 27:47:a7:3c:7d:ea:93:cf:0d:56:c8:b0:28:5f:32:fa: 0c:63:e0:bf:ce:68:d0:38:fc:9b:a8:0f:97:a1:78:0d: a8:df:23:35:40:53:f6:6b:3d:f9:d5:7b:38:e9:c6:a8: 6f:0b:28:7c:5a:0c:ca:f8:ef:b1:99:b8:67:25:fc:00: 82:ea:42:17:b0:7e:d6:60:6b:b0:cd:6b:e7:d8:74:a4: 0a:0d:77:3f:63:1b:a3:91:a1:b9:b2:bf:af:35:15:1b: 71:ef:ea:3b:39:ff:76:af:2d:27:fe:4d:36:c4:85:0d: 6f:cd:6d:06:95:fa:ae:f2:79:db:00:b0:02:c3:cf:e5: 11:f1:e5:6a:12:09:ac:a0:a4:48:0a:16:0e:ef:af:30: a0:2a:39:93:da:4b:84:11:d6:df:0c:31:ef:02:bb:7a: db:ac:bf:1e:6c:18:6c:a6:d4:95:c5:ee:d7:d4:df:fd Fingerprint (SHA-256): 38:AA:B7:30:A8:D2:A5:E0:BC:92:C7:64:7E:6B:08:33:48:74:52:6B:A1:C2:C7:1F:7F:D9:5A:9E:0B:12:3E:CF Fingerprint (SHA1): 6C:5E:2E:64:B3:09:C2:A5:E6:07:E8:3B:D3:90:F8:BC:EA:23:38:8C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1178: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194486 (0x433ee1b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:46:10 2025 Not After : Thu Nov 28 11:46:10 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:3a:6c:02:d8:45:03:18:24:b3:fe:68:cf:83:19:c1: ff:c0:53:90:f1:20:41:b9:17:a8:3e:86:26:c4:b1:52: a6:61:ee:bb:72:e6:2d:51:2e:f9:cc:21:4e:f4:a6:c9: e5:b6:d0:6a:e3:c8:46:1f:76:07:69:5a:f4:c4:a2:75: 73:94:59:32:2d:65:53:c3:65:96:35:e9:4d:0c:97:59: 79:a3:98:55:9e:d3:53:41:c0:c8:3d:56:ef:61:98:49: 91:d2:54:75:c3:05:c3:63:1c:e5:1b:4a:96:2e:36:0f: a0:2b:de:ac:5f:85:5c:15:84:bc:d4:e6:7c:db:3b:04: 55:f3:97:52:ca:4c:96:7a:28:34:f9:4b:8b:91:6c:3f: 27:5e:61:25:fb:8d:50:b8:28:00:5a:e8:4a:dd:70:ad: fa:fb:be:e5:2e:87:d4:9e:30:b4:ba:5d:6c:36:28:17: e6:30:0c:a8:c0:8b:eb:36:d6:2b:c5:9b:65:e8:bf:c6: 4a:e8:8b:53:41:a3:f7:8f:cd:2c:95:f1:4e:0d:95:87: 2f:38:39:be:a0:b2:77:a9:cc:68:01:f9:4d:e1:c8:e5: 2f:e8:4c:db:34:ad:ff:90:9a:4e:6b:92:e6:44:6c:8d: 06:79:54:6e:57:11:f0:30:21:9e:c1:91:33:75:3c:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:6c:29:a7:2a:36:c2:4b:cc:72:d5:b7:98:9c:cd:a6: 71:7c:70:b8:14:dd:f7:df:a0:a9:0a:29:ca:8a:ce:85: 63:5f:63:a2:7a:d4:42:47:f8:37:87:6b:a1:08:41:24: 36:d9:4c:a0:10:f5:e8:87:f5:0d:0f:81:3e:37:93:cd: eb:68:8e:4a:1c:22:cd:94:79:d5:a8:93:bd:ee:25:37: 1f:af:45:08:f3:7f:0e:d9:1d:bb:e6:e9:3a:a3:4f:68: 04:1b:cb:62:72:11:6a:04:7f:5e:26:08:a8:cd:c8:e5: 2f:2e:19:68:d2:7f:fa:ac:0c:13:1a:51:ac:75:ac:68: df:f5:5c:07:6f:77:4f:69:6a:14:13:e7:ed:6f:67:2f: 06:62:e0:7b:ac:f8:5b:57:e1:28:b2:40:27:f6:a0:35: bb:36:b6:de:5e:6d:13:0b:0b:68:a6:82:90:5a:83:18: 05:08:4d:44:97:f2:b8:a8:65:88:bf:20:c5:b8:a4:39: 81:4d:02:34:96:45:c8:b3:a7:da:f1:a9:ac:be:27:96: 3b:42:b7:a2:50:82:a6:ca:68:62:16:16:fd:39:c9:fa: ad:2a:fc:36:95:59:88:ae:0a:bd:04:d6:ac:03:c7:0d: 4e:f2:3c:e8:c5:0e:4a:84:61:25:6f:21:b7:9b:a5:c6 Fingerprint (SHA-256): 00:1B:B4:4B:D7:53:30:FF:85:CC:11:EC:97:B1:0F:8C:55:FF:EB:D5:85:8D:91:49:CA:BA:19:8A:4E:23:8F:C2 Fingerprint (SHA1): 39:07:E5:59:17:A2:74:9A:B2:DE:84:99:4F:58:54:3F:52:5A:92:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1179: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1180: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194501 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1181: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1182: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1183: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1184: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194502 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1185: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1186: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1187: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1188: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194503 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1189: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1190: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1191: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1192: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194504 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1193: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1194: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1195: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194501 (0x433ee1c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:17 2025 Not After : Thu Nov 28 11:46:17 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:51:95:45:86:d3:cb:d6:a4:3f:e0:6e:b0:e5:78:93: 6d:0a:72:3f:0d:96:69:37:a6:ea:20:3e:8d:f6:d3:48: 05:e9:f6:5b:fc:6a:03:31:38:dc:1e:9f:aa:8c:07:6f: 08:da:d5:b8:87:bd:55:e7:01:2d:15:52:04:e1:e3:27: 7f:1f:a5:02:b4:e3:d9:c4:16:a3:de:4b:b1:86:04:2a: 4d:1f:f7:05:4c:19:dd:67:31:a5:2f:c1:6c:5f:91:6c: cc:e8:40:23:35:a4:a6:63:5f:9e:51:19:97:be:ee:15: 17:a9:8d:d3:b2:30:84:5e:d4:91:76:29:64:4a:97:af: 9e:ec:3c:86:15:c9:7c:5c:67:1c:fd:f0:67:01:7f:a2: ad:a9:54:8b:77:18:c0:55:9e:fe:eb:2c:7a:02:46:bc: 40:0b:b6:8a:5f:64:e6:cd:0c:08:2d:5c:14:37:a1:ec: 18:25:84:eb:30:84:9d:a4:cb:c9:d0:68:54:2b:f7:0f: 65:02:40:37:e0:41:08:be:63:1d:be:23:9f:62:3c:a9: 15:94:bb:d6:95:fa:7d:99:41:78:bc:b6:33:5c:53:a8: 2a:00:55:6d:51:d4:ae:86:9e:48:68:17:78:02:52:a5: 61:97:ab:00:d5:11:d2:09:ec:b6:53:a0:71:e0:63:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:40:c1:49:23:d8:33:c1:d9:74:88:ca:74:b9:e4:9c: fd:54:9b:9b:95:83:34:9b:b1:37:39:48:bf:19:6b:91: 48:06:f1:9d:17:d2:5b:ad:e8:45:40:59:ca:b1:93:65: 07:c1:f6:e2:36:d9:6d:b5:59:12:f4:8f:7e:e7:d9:7f: c8:40:5a:f4:28:32:03:78:b0:57:1a:9c:c8:e6:47:b4: 60:ab:a4:09:b3:d9:91:d1:2c:38:a3:1b:8b:37:bf:fd: ca:5b:46:0c:20:e8:20:ab:31:a0:34:b5:b3:b1:b0:d9: 09:ab:67:a8:8b:29:f8:28:a9:17:26:70:b9:b7:94:a6: 44:09:bc:5e:01:d0:1c:8d:a2:d5:cc:36:93:2f:77:78: 01:6e:db:68:83:ff:3e:95:e5:5e:58:47:56:a9:38:e6: aa:a2:8d:42:16:3b:3a:a7:b1:58:03:ca:cb:4e:78:d1: cf:67:9d:ca:24:49:a2:68:7f:4c:5f:bc:cc:d5:9c:e9: 30:a3:39:c8:c9:71:6f:b1:0b:14:eb:4a:4c:cb:96:66: 4e:42:e3:97:65:4b:2d:df:92:97:c7:1a:ff:39:68:eb: 54:3c:fb:ef:37:0d:13:61:d2:b1:e5:ba:dd:27:7c:e2: 43:69:9f:4e:5d:50:81:b2:62:90:84:97:fd:4a:51:db Fingerprint (SHA-256): 73:60:BF:A4:C3:58:86:DC:1F:8E:83:97:7E:85:3E:21:CE:A4:02:EC:F3:2A:56:40:FB:B8:8B:F1:B3:5E:76:58 Fingerprint (SHA1): 0E:8C:4E:93:8E:01:A1:EA:F5:2E:25:C9:35:22:EE:9B:08:7C:51:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1196: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1197: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194502 (0x433ee1c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:18 2025 Not After : Thu Nov 28 11:46:18 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:b3:04:ed:2b:fa:2c:16:c8:b8:ed:c2:9a:d4:97:42: 8f:d9:36:30:44:d2:ef:d6:30:3e:09:7e:3c:09:bc:06: 53:dd:59:74:03:6c:25:b4:d4:54:e3:f2:1b:b5:b1:b2: db:f9:18:9a:c8:ec:2e:1a:fa:6f:00:f6:2a:b2:85:51: d7:35:5f:1b:8f:c3:5e:c1:e0:1b:7d:4a:de:13:e7:c9: 89:f8:ff:c4:17:9c:09:2b:10:5d:b4:be:19:b0:96:98: 55:69:a1:27:0f:df:4a:33:fe:b4:95:9a:db:e1:47:27: 04:dd:94:57:24:96:a3:01:a2:90:8b:6b:9e:c3:b8:45: 6e:72:68:6c:49:f2:f4:7e:1d:a5:9b:e1:37:e5:f1:2b: 75:ca:f7:70:10:05:47:42:1a:71:07:b6:56:98:a2:2a: 0d:54:92:f8:6b:cb:2a:df:48:51:0e:ee:40:ba:00:d5: 49:4a:66:6e:7f:69:38:c3:c2:2d:37:56:20:2c:d6:e4: 13:e0:d9:80:b9:75:e1:5b:47:0a:69:54:a2:56:1b:dc: 53:8b:fb:7c:04:0c:52:6e:4e:ee:95:0a:12:2e:84:52: 35:95:05:fb:3e:ac:21:48:1a:69:f4:88:ea:c8:1e:48: b0:ca:cd:3a:32:f8:c7:df:02:9b:40:95:2e:53:97:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:4d:c6:11:f9:cc:6d:13:c6:e4:84:5f:f4:80:f9:c0: 89:e9:7e:20:9f:d9:89:c1:8d:11:7d:0f:b0:4c:63:e4: 2a:c0:a7:63:09:38:4b:e7:39:fb:dc:ec:df:ee:b8:52: bf:37:78:64:6e:fb:a3:53:06:81:40:9c:b8:1d:50:d8: 76:90:04:91:35:ee:7f:c1:c3:f8:45:74:fe:08:86:fe: 9a:b9:ba:6d:f9:05:c5:c2:5f:6f:4a:d9:b6:9b:7e:b1: 15:2f:22:c8:dc:61:b0:96:ca:0a:a5:ee:99:ad:25:2d: 97:80:59:8f:cd:81:f8:10:56:1f:5d:d9:25:b3:2e:77: 63:4b:be:9e:e6:b9:95:b2:3e:1a:f6:fe:a8:a4:ce:51: fb:b8:37:17:cf:7f:86:00:b2:e1:c4:29:30:ca:58:6f: 02:e4:24:80:14:24:29:6b:b3:41:ad:76:85:74:9d:05: a9:3d:75:f1:43:eb:d6:5e:70:33:83:f0:06:45:c3:41: 27:23:5f:e6:d8:64:05:ea:60:a0:00:96:b5:af:9b:0b: 96:13:80:e6:83:09:fa:b6:97:39:2a:11:d1:b3:a4:f6: ca:06:4c:48:9a:3e:1e:06:97:b0:a5:cb:71:83:6d:48: d0:c1:32:b5:b2:fe:eb:7f:1e:61:ca:71:c8:62:c4:06 Fingerprint (SHA-256): 15:FF:A5:3F:75:87:42:C4:F3:C0:37:E6:83:E9:FE:4E:BB:B3:4B:92:6B:27:E8:26:34:07:7C:42:49:B1:89:43 Fingerprint (SHA1): C0:9A:AD:CB:FE:5C:70:6F:BB:0C:F8:A1:54:04:CA:0F:79:0E:DE:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1198: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1199: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194503 (0x433ee1c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:46:19 2025 Not After : Thu Nov 28 11:46:19 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:f9:9f:a9:ce:39:9b:4b:46:71:ff:82:77:24:23:98: d9:75:16:12:bc:ee:d8:2f:1a:6f:9d:1f:9b:b1:e2:e2: 24:ad:bd:64:64:ca:ed:07:e2:b2:68:30:77:f2:3c:77: f9:f9:57:d2:c5:7f:d3:c8:67:42:f5:da:7f:a9:61:ec: 31:ab:ce:cc:a8:ec:80:3c:77:6a:47:8a:ae:40:01:c5: c9:1e:32:53:0f:44:e4:15:ec:c5:e6:60:13:29:e3:03: c6:33:16:7a:44:48:73:30:79:0d:da:8c:3f:54:54:40: 0c:4b:86:e6:5c:2e:a8:fc:1c:18:9c:99:6b:6b:96:a1: d2:84:90:25:f2:fb:da:82:67:fb:85:fd:6c:cb:46:24: e5:88:5a:36:d5:b0:3e:97:30:8a:9f:79:c0:59:84:dc: 00:41:cd:48:a9:fc:f1:a2:ae:1e:9d:89:7c:89:9c:39: 9d:60:c8:de:ed:a6:c6:df:a6:da:b1:4a:92:84:a4:c9: 46:56:0f:92:2a:d6:0a:1f:1c:ca:7c:8a:c0:70:4d:60: e9:43:4d:80:6a:21:8a:0e:11:ce:79:81:fb:08:90:56: a6:64:97:ac:d6:da:d4:7c:6a:c9:8e:50:22:a3:c0:1a: f2:1e:c5:6d:57:2d:80:af:58:61:fb:d4:a6:22:31:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:54:9f:bd:fc:f7:23:5d:8a:e4:4b:cc:fa:b2:56:74: 5a:c8:17:11:c4:9a:cf:65:ad:17:8a:a3:94:30:13:a4: 61:3b:b2:19:19:4e:31:32:1f:c0:e4:2b:93:09:75:8d: 9c:75:fc:db:3a:a3:08:8d:4e:0e:f4:94:30:45:49:2b: b5:11:a2:64:66:a1:e1:3b:2f:05:98:69:56:ef:29:c8: ab:70:59:70:f8:79:02:28:ad:b0:8b:d0:86:6c:6b:ff: 33:0b:87:fd:75:f2:84:25:69:95:fd:03:c9:03:37:77: 94:4e:a8:92:77:bd:07:b4:68:25:15:bd:cb:33:05:f7: 69:3d:44:53:6f:a7:e5:4e:d9:78:0b:c6:50:d2:d8:7b: 9e:e1:51:65:c8:c6:2b:a4:6a:77:8a:4f:e1:11:46:25: ba:e5:12:21:67:b6:08:af:1c:6f:72:89:31:c3:69:af: be:91:ab:27:ca:48:1d:e2:d2:62:ae:be:0e:35:12:59: 16:4f:71:e3:31:0d:a5:a7:0b:7f:56:51:c4:f1:df:d5: 8f:16:21:39:c8:8c:ab:43:74:08:bf:4d:a2:a8:81:b8: 80:b0:c6:43:07:ac:ce:ab:d4:42:ce:6b:3f:46:38:0e: 62:5d:ab:7b:3e:87:07:8d:19:0a:91:85:68:79:9e:64 Fingerprint (SHA-256): 48:F8:DE:B9:4C:4F:DD:6D:B9:07:34:E7:8B:0C:87:AC:F5:90:76:8A:8C:68:F0:0E:47:92:4E:DF:8F:83:D6:FF Fingerprint (SHA1): 9C:7C:AC:B6:74:3D:23:EF:1D:7D:01:6D:1E:95:2E:C2:A7:C8:87:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1200: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1201: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1202: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1203: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1204: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194501 (0x433ee1c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:17 2025 Not After : Thu Nov 28 11:46:17 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:51:95:45:86:d3:cb:d6:a4:3f:e0:6e:b0:e5:78:93: 6d:0a:72:3f:0d:96:69:37:a6:ea:20:3e:8d:f6:d3:48: 05:e9:f6:5b:fc:6a:03:31:38:dc:1e:9f:aa:8c:07:6f: 08:da:d5:b8:87:bd:55:e7:01:2d:15:52:04:e1:e3:27: 7f:1f:a5:02:b4:e3:d9:c4:16:a3:de:4b:b1:86:04:2a: 4d:1f:f7:05:4c:19:dd:67:31:a5:2f:c1:6c:5f:91:6c: cc:e8:40:23:35:a4:a6:63:5f:9e:51:19:97:be:ee:15: 17:a9:8d:d3:b2:30:84:5e:d4:91:76:29:64:4a:97:af: 9e:ec:3c:86:15:c9:7c:5c:67:1c:fd:f0:67:01:7f:a2: ad:a9:54:8b:77:18:c0:55:9e:fe:eb:2c:7a:02:46:bc: 40:0b:b6:8a:5f:64:e6:cd:0c:08:2d:5c:14:37:a1:ec: 18:25:84:eb:30:84:9d:a4:cb:c9:d0:68:54:2b:f7:0f: 65:02:40:37:e0:41:08:be:63:1d:be:23:9f:62:3c:a9: 15:94:bb:d6:95:fa:7d:99:41:78:bc:b6:33:5c:53:a8: 2a:00:55:6d:51:d4:ae:86:9e:48:68:17:78:02:52:a5: 61:97:ab:00:d5:11:d2:09:ec:b6:53:a0:71:e0:63:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:40:c1:49:23:d8:33:c1:d9:74:88:ca:74:b9:e4:9c: fd:54:9b:9b:95:83:34:9b:b1:37:39:48:bf:19:6b:91: 48:06:f1:9d:17:d2:5b:ad:e8:45:40:59:ca:b1:93:65: 07:c1:f6:e2:36:d9:6d:b5:59:12:f4:8f:7e:e7:d9:7f: c8:40:5a:f4:28:32:03:78:b0:57:1a:9c:c8:e6:47:b4: 60:ab:a4:09:b3:d9:91:d1:2c:38:a3:1b:8b:37:bf:fd: ca:5b:46:0c:20:e8:20:ab:31:a0:34:b5:b3:b1:b0:d9: 09:ab:67:a8:8b:29:f8:28:a9:17:26:70:b9:b7:94:a6: 44:09:bc:5e:01:d0:1c:8d:a2:d5:cc:36:93:2f:77:78: 01:6e:db:68:83:ff:3e:95:e5:5e:58:47:56:a9:38:e6: aa:a2:8d:42:16:3b:3a:a7:b1:58:03:ca:cb:4e:78:d1: cf:67:9d:ca:24:49:a2:68:7f:4c:5f:bc:cc:d5:9c:e9: 30:a3:39:c8:c9:71:6f:b1:0b:14:eb:4a:4c:cb:96:66: 4e:42:e3:97:65:4b:2d:df:92:97:c7:1a:ff:39:68:eb: 54:3c:fb:ef:37:0d:13:61:d2:b1:e5:ba:dd:27:7c:e2: 43:69:9f:4e:5d:50:81:b2:62:90:84:97:fd:4a:51:db Fingerprint (SHA-256): 73:60:BF:A4:C3:58:86:DC:1F:8E:83:97:7E:85:3E:21:CE:A4:02:EC:F3:2A:56:40:FB:B8:8B:F1:B3:5E:76:58 Fingerprint (SHA1): 0E:8C:4E:93:8E:01:A1:EA:F5:2E:25:C9:35:22:EE:9B:08:7C:51:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194502 (0x433ee1c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:18 2025 Not After : Thu Nov 28 11:46:18 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:b3:04:ed:2b:fa:2c:16:c8:b8:ed:c2:9a:d4:97:42: 8f:d9:36:30:44:d2:ef:d6:30:3e:09:7e:3c:09:bc:06: 53:dd:59:74:03:6c:25:b4:d4:54:e3:f2:1b:b5:b1:b2: db:f9:18:9a:c8:ec:2e:1a:fa:6f:00:f6:2a:b2:85:51: d7:35:5f:1b:8f:c3:5e:c1:e0:1b:7d:4a:de:13:e7:c9: 89:f8:ff:c4:17:9c:09:2b:10:5d:b4:be:19:b0:96:98: 55:69:a1:27:0f:df:4a:33:fe:b4:95:9a:db:e1:47:27: 04:dd:94:57:24:96:a3:01:a2:90:8b:6b:9e:c3:b8:45: 6e:72:68:6c:49:f2:f4:7e:1d:a5:9b:e1:37:e5:f1:2b: 75:ca:f7:70:10:05:47:42:1a:71:07:b6:56:98:a2:2a: 0d:54:92:f8:6b:cb:2a:df:48:51:0e:ee:40:ba:00:d5: 49:4a:66:6e:7f:69:38:c3:c2:2d:37:56:20:2c:d6:e4: 13:e0:d9:80:b9:75:e1:5b:47:0a:69:54:a2:56:1b:dc: 53:8b:fb:7c:04:0c:52:6e:4e:ee:95:0a:12:2e:84:52: 35:95:05:fb:3e:ac:21:48:1a:69:f4:88:ea:c8:1e:48: b0:ca:cd:3a:32:f8:c7:df:02:9b:40:95:2e:53:97:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:4d:c6:11:f9:cc:6d:13:c6:e4:84:5f:f4:80:f9:c0: 89:e9:7e:20:9f:d9:89:c1:8d:11:7d:0f:b0:4c:63:e4: 2a:c0:a7:63:09:38:4b:e7:39:fb:dc:ec:df:ee:b8:52: bf:37:78:64:6e:fb:a3:53:06:81:40:9c:b8:1d:50:d8: 76:90:04:91:35:ee:7f:c1:c3:f8:45:74:fe:08:86:fe: 9a:b9:ba:6d:f9:05:c5:c2:5f:6f:4a:d9:b6:9b:7e:b1: 15:2f:22:c8:dc:61:b0:96:ca:0a:a5:ee:99:ad:25:2d: 97:80:59:8f:cd:81:f8:10:56:1f:5d:d9:25:b3:2e:77: 63:4b:be:9e:e6:b9:95:b2:3e:1a:f6:fe:a8:a4:ce:51: fb:b8:37:17:cf:7f:86:00:b2:e1:c4:29:30:ca:58:6f: 02:e4:24:80:14:24:29:6b:b3:41:ad:76:85:74:9d:05: a9:3d:75:f1:43:eb:d6:5e:70:33:83:f0:06:45:c3:41: 27:23:5f:e6:d8:64:05:ea:60:a0:00:96:b5:af:9b:0b: 96:13:80:e6:83:09:fa:b6:97:39:2a:11:d1:b3:a4:f6: ca:06:4c:48:9a:3e:1e:06:97:b0:a5:cb:71:83:6d:48: d0:c1:32:b5:b2:fe:eb:7f:1e:61:ca:71:c8:62:c4:06 Fingerprint (SHA-256): 15:FF:A5:3F:75:87:42:C4:F3:C0:37:E6:83:E9:FE:4E:BB:B3:4B:92:6B:27:E8:26:34:07:7C:42:49:B1:89:43 Fingerprint (SHA1): C0:9A:AD:CB:FE:5C:70:6F:BB:0C:F8:A1:54:04:CA:0F:79:0E:DE:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194503 (0x433ee1c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:46:19 2025 Not After : Thu Nov 28 11:46:19 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:f9:9f:a9:ce:39:9b:4b:46:71:ff:82:77:24:23:98: d9:75:16:12:bc:ee:d8:2f:1a:6f:9d:1f:9b:b1:e2:e2: 24:ad:bd:64:64:ca:ed:07:e2:b2:68:30:77:f2:3c:77: f9:f9:57:d2:c5:7f:d3:c8:67:42:f5:da:7f:a9:61:ec: 31:ab:ce:cc:a8:ec:80:3c:77:6a:47:8a:ae:40:01:c5: c9:1e:32:53:0f:44:e4:15:ec:c5:e6:60:13:29:e3:03: c6:33:16:7a:44:48:73:30:79:0d:da:8c:3f:54:54:40: 0c:4b:86:e6:5c:2e:a8:fc:1c:18:9c:99:6b:6b:96:a1: d2:84:90:25:f2:fb:da:82:67:fb:85:fd:6c:cb:46:24: e5:88:5a:36:d5:b0:3e:97:30:8a:9f:79:c0:59:84:dc: 00:41:cd:48:a9:fc:f1:a2:ae:1e:9d:89:7c:89:9c:39: 9d:60:c8:de:ed:a6:c6:df:a6:da:b1:4a:92:84:a4:c9: 46:56:0f:92:2a:d6:0a:1f:1c:ca:7c:8a:c0:70:4d:60: e9:43:4d:80:6a:21:8a:0e:11:ce:79:81:fb:08:90:56: a6:64:97:ac:d6:da:d4:7c:6a:c9:8e:50:22:a3:c0:1a: f2:1e:c5:6d:57:2d:80:af:58:61:fb:d4:a6:22:31:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:54:9f:bd:fc:f7:23:5d:8a:e4:4b:cc:fa:b2:56:74: 5a:c8:17:11:c4:9a:cf:65:ad:17:8a:a3:94:30:13:a4: 61:3b:b2:19:19:4e:31:32:1f:c0:e4:2b:93:09:75:8d: 9c:75:fc:db:3a:a3:08:8d:4e:0e:f4:94:30:45:49:2b: b5:11:a2:64:66:a1:e1:3b:2f:05:98:69:56:ef:29:c8: ab:70:59:70:f8:79:02:28:ad:b0:8b:d0:86:6c:6b:ff: 33:0b:87:fd:75:f2:84:25:69:95:fd:03:c9:03:37:77: 94:4e:a8:92:77:bd:07:b4:68:25:15:bd:cb:33:05:f7: 69:3d:44:53:6f:a7:e5:4e:d9:78:0b:c6:50:d2:d8:7b: 9e:e1:51:65:c8:c6:2b:a4:6a:77:8a:4f:e1:11:46:25: ba:e5:12:21:67:b6:08:af:1c:6f:72:89:31:c3:69:af: be:91:ab:27:ca:48:1d:e2:d2:62:ae:be:0e:35:12:59: 16:4f:71:e3:31:0d:a5:a7:0b:7f:56:51:c4:f1:df:d5: 8f:16:21:39:c8:8c:ab:43:74:08:bf:4d:a2:a8:81:b8: 80:b0:c6:43:07:ac:ce:ab:d4:42:ce:6b:3f:46:38:0e: 62:5d:ab:7b:3e:87:07:8d:19:0a:91:85:68:79:9e:64 Fingerprint (SHA-256): 48:F8:DE:B9:4C:4F:DD:6D:B9:07:34:E7:8B:0C:87:AC:F5:90:76:8A:8C:68:F0:0E:47:92:4E:DF:8F:83:D6:FF Fingerprint (SHA1): 9C:7C:AC:B6:74:3D:23:EF:1D:7D:01:6D:1E:95:2E:C2:A7:C8:87:47 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1209: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1210: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1211: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194505 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1212: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1213: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1214: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1215: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194506 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1216: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1217: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1218: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1219: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194507 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1220: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1221: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1222: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1223: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194508 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1224: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1225: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1226: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1227: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194509 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1228: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1229: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1230: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194505 (0x433ee1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:21 2025 Not After : Thu Nov 28 11:46:21 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ea:81:91:76:e6:bf:d6:3b:10:ba:60:d1:31:e1:3c: 63:25:fe:5f:6c:f7:ca:d6:ad:14:cc:fd:88:14:3e:c2: 19:51:71:9e:8f:4f:da:84:ae:c4:1e:66:4d:d4:7d:20: e9:d4:87:34:fb:24:0f:95:1e:e2:68:c6:00:16:43:de: 27:37:1c:88:09:cc:8c:dc:61:61:21:8f:bd:1c:94:9d: 99:32:3e:d1:12:16:df:62:49:18:da:c8:c9:02:7a:76: 71:cb:90:66:ac:2f:b9:e4:67:5e:a0:0a:c6:be:01:58: eb:d6:88:27:ae:48:a2:42:37:b2:08:62:0b:69:53:e8: c5:04:47:cc:74:1c:92:5f:9f:62:7f:af:21:d8:0d:4d: 8f:44:dc:33:17:23:8c:d7:42:2a:58:d5:72:9b:7a:fa: 59:4b:d1:f6:47:50:75:5a:17:7b:54:1d:f1:5e:4a:9c: 14:7d:e0:fc:d5:a7:ad:a0:45:89:b1:16:d8:56:76:cf: 92:dd:2b:ee:27:76:dd:51:26:fc:bc:9a:88:4a:31:f7: 34:b2:fc:05:42:d6:71:bf:04:b4:91:a2:6b:92:3e:7b: 06:7e:bd:6b:0c:2b:2e:de:58:67:e7:b2:66:f8:64:e0: 50:89:30:d2:2e:fc:12:32:7e:a2:5e:be:b6:d4:b5:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:ea:8e:ae:89:27:e8:59:62:c0:6a:1e:64:3a:17:b6: ec:de:b7:06:24:de:0c:68:6f:96:6a:34:ba:33:70:ec: de:cc:15:f9:b4:f7:96:bb:9c:c4:e8:87:53:17:bc:16: aa:02:39:61:ce:ee:c8:30:a2:e0:cd:8f:4d:52:6f:4f: c6:66:71:a7:29:15:f7:79:61:43:a7:03:98:b1:70:b5: 72:3b:71:00:4c:f6:3b:59:3f:88:60:01:f9:b2:db:c9: 52:ec:09:6c:3a:db:2c:e7:77:76:6d:27:7b:fd:cc:a7: 40:41:80:20:4a:aa:37:f1:55:fd:1c:fb:82:79:02:7b: 26:04:8d:45:79:31:fe:28:7e:72:f5:d3:37:6b:77:e4: f9:3b:6e:8d:7a:ea:b8:16:3e:39:d6:cb:82:89:db:24: 86:70:d7:88:31:cd:dc:29:d2:7c:86:28:2b:f2:9d:b2: 0d:6b:34:7a:09:ee:c9:ee:82:2f:89:4e:66:b9:b2:ae: 1f:f6:69:4f:b3:5c:a8:89:91:e1:3d:46:7b:4e:74:63: 6f:80:28:ad:03:b5:93:07:e3:39:14:03:d0:a0:c9:25: 55:45:1a:fa:7f:54:6c:9c:cc:4b:09:af:4e:73:8f:91: 2c:35:bf:ca:1d:b7:8e:22:dd:4d:7c:4f:a3:c2:f4:30 Fingerprint (SHA-256): EF:88:7C:CA:BA:C0:18:B9:6A:0E:E0:D8:DB:F1:C1:D5:A7:57:5B:67:9F:13:32:7F:CF:F5:23:75:7E:8C:94:24 Fingerprint (SHA1): CE:5D:CF:AA:8F:A5:93:C3:E2:B5:09:06:27:21:FA:DC:F3:D4:E3:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1231: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1232: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194506 (0x433ee1ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:71:70:a2:91:7a:89:12:f3:9f:d8:42:d0:d3:a7:0a: 6b:0d:c6:82:a1:43:f1:8d:fa:f3:f3:4a:9e:a4:8c:dc: 83:80:07:22:0b:35:ac:ed:4a:b4:79:bb:19:97:4b:75: 63:b6:59:ed:b5:fb:17:19:38:9f:3e:01:c0:cf:54:c0: d9:16:55:93:fd:54:ab:5a:5a:ac:30:0b:af:38:b0:aa: ac:81:c5:92:00:06:00:ca:32:c5:e5:81:2f:a5:76:30: 39:d5:28:33:6d:cf:50:02:db:d7:c9:df:4d:70:b6:aa: 9f:c2:f1:e6:5b:51:80:be:ad:36:3c:ea:ea:17:a3:ab: 60:4e:fe:68:68:35:78:6a:39:f5:b9:06:2f:de:3c:e2: ab:42:9f:1f:4d:40:4e:e5:78:68:13:94:8a:67:5c:14: 7e:c1:c2:d2:c7:a5:45:97:a5:91:2f:e3:49:5c:5e:01: aa:c3:c0:59:2e:73:23:ba:46:93:77:d1:af:6e:9e:c9: 15:02:ae:8e:a0:ff:10:f6:d4:f1:88:b6:dd:b0:66:9b: 05:ce:2d:7e:b1:b2:d6:51:8f:3a:38:ae:7a:88:5b:8c: ae:3e:ee:9a:ef:da:32:88:c8:bc:f2:ac:0f:0c:da:fe: ae:c7:bb:36:5a:56:68:70:a5:2d:60:86:a4:b9:be:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:e3:0d:b8:ba:fd:46:b0:b0:34:66:68:0a:c1:7c:54: 04:45:f2:1b:48:0c:e0:79:5b:7d:06:fc:a2:84:8a:33: 74:af:7f:76:2d:7b:d6:ff:e7:dd:07:00:4e:1a:18:64: 18:aa:25:8c:4e:42:4a:44:a0:48:9d:52:b9:f7:1e:9a: 70:36:fe:a3:54:18:78:80:9a:99:e6:75:9c:f1:a9:74: cf:db:51:9a:32:e3:09:d9:e4:38:61:bc:01:44:1c:68: 13:40:40:4e:94:b4:b9:cb:7f:9b:4c:ac:25:2d:f9:25: 0a:74:dc:9c:a9:0a:ac:39:d6:3a:df:34:b5:a7:f6:ba: 7a:3a:f7:1b:dc:67:94:c1:01:c0:7e:e2:6a:cc:d7:1a: 09:27:97:41:7d:6d:bd:41:17:2f:1c:59:c6:69:8f:b1: 27:88:7d:b4:78:a8:09:92:12:f7:7c:5d:68:63:f9:50: 00:44:1c:ec:fd:4f:63:62:bd:34:cb:fa:5d:7a:df:48: ad:1a:e0:cf:05:82:98:0a:8f:07:b1:69:74:36:8f:4e: c2:7a:8c:de:9f:64:59:44:6b:80:11:29:f0:65:3e:d6: 08:68:c8:93:0e:5b:00:97:5f:c4:8c:ef:56:ee:57:d3: 85:1c:69:14:f4:c3:82:00:46:f3:c6:5e:ff:f6:69:ab Fingerprint (SHA-256): 3D:4A:59:47:2F:D4:D2:DF:35:64:FE:B8:BF:44:20:42:11:C6:EC:F7:39:C0:EA:40:74:AD:F5:E1:A3:18:E5:BF Fingerprint (SHA1): 47:E6:06:12:11:DB:8A:4F:5F:56:04:0B:13:FF:C7:54:5B:C5:A8:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1233: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1234: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194507 (0x433ee1cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:94:65:f5:c7:f8:ee:95:ca:a9:22:f5:a9:ab:6f:e4: 39:31:c8:eb:15:14:03:b6:dd:90:d3:4b:31:eb:f4:a2: e4:d8:dd:36:e6:7a:78:2e:bd:ca:94:49:0e:57:4a:79: 71:9f:44:d6:ff:32:2c:8a:81:4e:3e:eb:ba:33:18:0f: ce:93:a3:fe:e1:e7:13:4f:93:6e:c4:80:4f:71:89:87: f9:c6:eb:59:22:dc:b1:4f:8f:5f:33:22:b4:11:f3:77: 76:01:4b:0c:f2:be:ce:9e:cd:b7:8f:7a:99:ad:59:3a: 94:e9:d9:9e:63:79:f6:ad:45:bf:48:40:d6:9a:1e:ae: ec:7e:1a:7c:05:c2:a6:3c:cc:a4:bf:9a:a8:88:24:ac: 3c:9e:6e:d7:98:63:19:58:2b:6d:69:b4:c6:e6:f9:53: b4:3f:7f:ea:a0:d6:cf:44:22:6b:8e:dd:b6:b9:20:9e: 69:93:35:21:e8:cc:68:54:3f:b6:5d:ae:f2:7d:f0:59: 6e:84:65:2c:fd:f2:45:b7:65:d1:66:e6:9c:ad:ec:cd: bf:b4:fc:90:a1:45:bb:63:16:3f:23:d8:00:81:fc:14: cb:91:55:2b:76:fc:c1:11:a8:ff:c7:42:61:3a:94:45: d5:3e:f6:c1:ac:f4:78:b7:c9:e7:0b:2c:37:3e:da:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:27:87:a5:d9:b3:8e:c9:51:89:e8:5b:9a:b3:64:92: 8e:82:09:4e:f3:13:0e:da:d0:39:d4:9f:09:ba:ca:60: a4:fb:96:1f:84:35:7c:79:a4:f1:6e:91:3d:88:cb:64: 6f:f2:cd:66:0f:63:17:1f:b5:75:bf:14:30:c9:aa:0f: a9:e4:99:4a:a2:6d:72:dc:5a:27:aa:6b:36:e4:bc:6a: 0f:71:92:f6:87:e4:ed:f1:c7:0f:58:28:f0:fa:3e:07: 23:04:cd:61:e0:93:00:f2:85:71:84:53:67:c8:7d:12: 18:c6:0e:a7:0d:4b:69:b1:12:2b:74:d2:f4:c8:b9:0e: a2:32:34:9f:c7:9f:95:3c:4d:74:14:65:1f:0a:96:0d: f4:c7:27:bb:9c:a0:47:3c:c4:29:bd:70:d6:ef:3e:33: 16:26:0c:ee:54:dd:9d:e4:a9:8d:cc:74:95:b9:67:7f: b7:d8:c9:f5:23:9b:15:9e:e7:da:0f:30:0c:64:f4:4e: 7f:ee:fc:c0:5c:e0:95:ff:e9:04:49:af:e2:55:d5:d4: 0f:9c:d9:e7:fc:6f:0b:e8:bc:02:34:6c:78:47:9d:a3: 38:41:68:f5:b2:85:6e:61:23:00:84:0c:f4:77:d2:a6: a6:b3:2c:fe:6c:85:30:6e:c7:23:4f:ef:9b:c6:bd:47 Fingerprint (SHA-256): 34:43:EE:3B:69:1E:61:A1:0E:27:53:B9:9D:4E:F0:25:FA:83:D0:27:4D:0B:AA:4F:6B:48:01:92:4E:57:86:47 Fingerprint (SHA1): A8:56:15:01:8A:49:4D:17:4C:FE:6B:39:1F:11:94:0C:63:DA:D9:87 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1235: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1236: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1237: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1238: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1239: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194505 (0x433ee1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:21 2025 Not After : Thu Nov 28 11:46:21 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ea:81:91:76:e6:bf:d6:3b:10:ba:60:d1:31:e1:3c: 63:25:fe:5f:6c:f7:ca:d6:ad:14:cc:fd:88:14:3e:c2: 19:51:71:9e:8f:4f:da:84:ae:c4:1e:66:4d:d4:7d:20: e9:d4:87:34:fb:24:0f:95:1e:e2:68:c6:00:16:43:de: 27:37:1c:88:09:cc:8c:dc:61:61:21:8f:bd:1c:94:9d: 99:32:3e:d1:12:16:df:62:49:18:da:c8:c9:02:7a:76: 71:cb:90:66:ac:2f:b9:e4:67:5e:a0:0a:c6:be:01:58: eb:d6:88:27:ae:48:a2:42:37:b2:08:62:0b:69:53:e8: c5:04:47:cc:74:1c:92:5f:9f:62:7f:af:21:d8:0d:4d: 8f:44:dc:33:17:23:8c:d7:42:2a:58:d5:72:9b:7a:fa: 59:4b:d1:f6:47:50:75:5a:17:7b:54:1d:f1:5e:4a:9c: 14:7d:e0:fc:d5:a7:ad:a0:45:89:b1:16:d8:56:76:cf: 92:dd:2b:ee:27:76:dd:51:26:fc:bc:9a:88:4a:31:f7: 34:b2:fc:05:42:d6:71:bf:04:b4:91:a2:6b:92:3e:7b: 06:7e:bd:6b:0c:2b:2e:de:58:67:e7:b2:66:f8:64:e0: 50:89:30:d2:2e:fc:12:32:7e:a2:5e:be:b6:d4:b5:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:ea:8e:ae:89:27:e8:59:62:c0:6a:1e:64:3a:17:b6: ec:de:b7:06:24:de:0c:68:6f:96:6a:34:ba:33:70:ec: de:cc:15:f9:b4:f7:96:bb:9c:c4:e8:87:53:17:bc:16: aa:02:39:61:ce:ee:c8:30:a2:e0:cd:8f:4d:52:6f:4f: c6:66:71:a7:29:15:f7:79:61:43:a7:03:98:b1:70:b5: 72:3b:71:00:4c:f6:3b:59:3f:88:60:01:f9:b2:db:c9: 52:ec:09:6c:3a:db:2c:e7:77:76:6d:27:7b:fd:cc:a7: 40:41:80:20:4a:aa:37:f1:55:fd:1c:fb:82:79:02:7b: 26:04:8d:45:79:31:fe:28:7e:72:f5:d3:37:6b:77:e4: f9:3b:6e:8d:7a:ea:b8:16:3e:39:d6:cb:82:89:db:24: 86:70:d7:88:31:cd:dc:29:d2:7c:86:28:2b:f2:9d:b2: 0d:6b:34:7a:09:ee:c9:ee:82:2f:89:4e:66:b9:b2:ae: 1f:f6:69:4f:b3:5c:a8:89:91:e1:3d:46:7b:4e:74:63: 6f:80:28:ad:03:b5:93:07:e3:39:14:03:d0:a0:c9:25: 55:45:1a:fa:7f:54:6c:9c:cc:4b:09:af:4e:73:8f:91: 2c:35:bf:ca:1d:b7:8e:22:dd:4d:7c:4f:a3:c2:f4:30 Fingerprint (SHA-256): EF:88:7C:CA:BA:C0:18:B9:6A:0E:E0:D8:DB:F1:C1:D5:A7:57:5B:67:9F:13:32:7F:CF:F5:23:75:7E:8C:94:24 Fingerprint (SHA1): CE:5D:CF:AA:8F:A5:93:C3:E2:B5:09:06:27:21:FA:DC:F3:D4:E3:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1240: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1241: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194506 (0x433ee1ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:71:70:a2:91:7a:89:12:f3:9f:d8:42:d0:d3:a7:0a: 6b:0d:c6:82:a1:43:f1:8d:fa:f3:f3:4a:9e:a4:8c:dc: 83:80:07:22:0b:35:ac:ed:4a:b4:79:bb:19:97:4b:75: 63:b6:59:ed:b5:fb:17:19:38:9f:3e:01:c0:cf:54:c0: d9:16:55:93:fd:54:ab:5a:5a:ac:30:0b:af:38:b0:aa: ac:81:c5:92:00:06:00:ca:32:c5:e5:81:2f:a5:76:30: 39:d5:28:33:6d:cf:50:02:db:d7:c9:df:4d:70:b6:aa: 9f:c2:f1:e6:5b:51:80:be:ad:36:3c:ea:ea:17:a3:ab: 60:4e:fe:68:68:35:78:6a:39:f5:b9:06:2f:de:3c:e2: ab:42:9f:1f:4d:40:4e:e5:78:68:13:94:8a:67:5c:14: 7e:c1:c2:d2:c7:a5:45:97:a5:91:2f:e3:49:5c:5e:01: aa:c3:c0:59:2e:73:23:ba:46:93:77:d1:af:6e:9e:c9: 15:02:ae:8e:a0:ff:10:f6:d4:f1:88:b6:dd:b0:66:9b: 05:ce:2d:7e:b1:b2:d6:51:8f:3a:38:ae:7a:88:5b:8c: ae:3e:ee:9a:ef:da:32:88:c8:bc:f2:ac:0f:0c:da:fe: ae:c7:bb:36:5a:56:68:70:a5:2d:60:86:a4:b9:be:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:e3:0d:b8:ba:fd:46:b0:b0:34:66:68:0a:c1:7c:54: 04:45:f2:1b:48:0c:e0:79:5b:7d:06:fc:a2:84:8a:33: 74:af:7f:76:2d:7b:d6:ff:e7:dd:07:00:4e:1a:18:64: 18:aa:25:8c:4e:42:4a:44:a0:48:9d:52:b9:f7:1e:9a: 70:36:fe:a3:54:18:78:80:9a:99:e6:75:9c:f1:a9:74: cf:db:51:9a:32:e3:09:d9:e4:38:61:bc:01:44:1c:68: 13:40:40:4e:94:b4:b9:cb:7f:9b:4c:ac:25:2d:f9:25: 0a:74:dc:9c:a9:0a:ac:39:d6:3a:df:34:b5:a7:f6:ba: 7a:3a:f7:1b:dc:67:94:c1:01:c0:7e:e2:6a:cc:d7:1a: 09:27:97:41:7d:6d:bd:41:17:2f:1c:59:c6:69:8f:b1: 27:88:7d:b4:78:a8:09:92:12:f7:7c:5d:68:63:f9:50: 00:44:1c:ec:fd:4f:63:62:bd:34:cb:fa:5d:7a:df:48: ad:1a:e0:cf:05:82:98:0a:8f:07:b1:69:74:36:8f:4e: c2:7a:8c:de:9f:64:59:44:6b:80:11:29:f0:65:3e:d6: 08:68:c8:93:0e:5b:00:97:5f:c4:8c:ef:56:ee:57:d3: 85:1c:69:14:f4:c3:82:00:46:f3:c6:5e:ff:f6:69:ab Fingerprint (SHA-256): 3D:4A:59:47:2F:D4:D2:DF:35:64:FE:B8:BF:44:20:42:11:C6:EC:F7:39:C0:EA:40:74:AD:F5:E1:A3:18:E5:BF Fingerprint (SHA1): 47:E6:06:12:11:DB:8A:4F:5F:56:04:0B:13:FF:C7:54:5B:C5:A8:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1242: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1243: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194507 (0x433ee1cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:94:65:f5:c7:f8:ee:95:ca:a9:22:f5:a9:ab:6f:e4: 39:31:c8:eb:15:14:03:b6:dd:90:d3:4b:31:eb:f4:a2: e4:d8:dd:36:e6:7a:78:2e:bd:ca:94:49:0e:57:4a:79: 71:9f:44:d6:ff:32:2c:8a:81:4e:3e:eb:ba:33:18:0f: ce:93:a3:fe:e1:e7:13:4f:93:6e:c4:80:4f:71:89:87: f9:c6:eb:59:22:dc:b1:4f:8f:5f:33:22:b4:11:f3:77: 76:01:4b:0c:f2:be:ce:9e:cd:b7:8f:7a:99:ad:59:3a: 94:e9:d9:9e:63:79:f6:ad:45:bf:48:40:d6:9a:1e:ae: ec:7e:1a:7c:05:c2:a6:3c:cc:a4:bf:9a:a8:88:24:ac: 3c:9e:6e:d7:98:63:19:58:2b:6d:69:b4:c6:e6:f9:53: b4:3f:7f:ea:a0:d6:cf:44:22:6b:8e:dd:b6:b9:20:9e: 69:93:35:21:e8:cc:68:54:3f:b6:5d:ae:f2:7d:f0:59: 6e:84:65:2c:fd:f2:45:b7:65:d1:66:e6:9c:ad:ec:cd: bf:b4:fc:90:a1:45:bb:63:16:3f:23:d8:00:81:fc:14: cb:91:55:2b:76:fc:c1:11:a8:ff:c7:42:61:3a:94:45: d5:3e:f6:c1:ac:f4:78:b7:c9:e7:0b:2c:37:3e:da:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:27:87:a5:d9:b3:8e:c9:51:89:e8:5b:9a:b3:64:92: 8e:82:09:4e:f3:13:0e:da:d0:39:d4:9f:09:ba:ca:60: a4:fb:96:1f:84:35:7c:79:a4:f1:6e:91:3d:88:cb:64: 6f:f2:cd:66:0f:63:17:1f:b5:75:bf:14:30:c9:aa:0f: a9:e4:99:4a:a2:6d:72:dc:5a:27:aa:6b:36:e4:bc:6a: 0f:71:92:f6:87:e4:ed:f1:c7:0f:58:28:f0:fa:3e:07: 23:04:cd:61:e0:93:00:f2:85:71:84:53:67:c8:7d:12: 18:c6:0e:a7:0d:4b:69:b1:12:2b:74:d2:f4:c8:b9:0e: a2:32:34:9f:c7:9f:95:3c:4d:74:14:65:1f:0a:96:0d: f4:c7:27:bb:9c:a0:47:3c:c4:29:bd:70:d6:ef:3e:33: 16:26:0c:ee:54:dd:9d:e4:a9:8d:cc:74:95:b9:67:7f: b7:d8:c9:f5:23:9b:15:9e:e7:da:0f:30:0c:64:f4:4e: 7f:ee:fc:c0:5c:e0:95:ff:e9:04:49:af:e2:55:d5:d4: 0f:9c:d9:e7:fc:6f:0b:e8:bc:02:34:6c:78:47:9d:a3: 38:41:68:f5:b2:85:6e:61:23:00:84:0c:f4:77:d2:a6: a6:b3:2c:fe:6c:85:30:6e:c7:23:4f:ef:9b:c6:bd:47 Fingerprint (SHA-256): 34:43:EE:3B:69:1E:61:A1:0E:27:53:B9:9D:4E:F0:25:FA:83:D0:27:4D:0B:AA:4F:6B:48:01:92:4E:57:86:47 Fingerprint (SHA1): A8:56:15:01:8A:49:4D:17:4C:FE:6B:39:1F:11:94:0C:63:DA:D9:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1244: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1245: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194505 (0x433ee1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:21 2025 Not After : Thu Nov 28 11:46:21 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ea:81:91:76:e6:bf:d6:3b:10:ba:60:d1:31:e1:3c: 63:25:fe:5f:6c:f7:ca:d6:ad:14:cc:fd:88:14:3e:c2: 19:51:71:9e:8f:4f:da:84:ae:c4:1e:66:4d:d4:7d:20: e9:d4:87:34:fb:24:0f:95:1e:e2:68:c6:00:16:43:de: 27:37:1c:88:09:cc:8c:dc:61:61:21:8f:bd:1c:94:9d: 99:32:3e:d1:12:16:df:62:49:18:da:c8:c9:02:7a:76: 71:cb:90:66:ac:2f:b9:e4:67:5e:a0:0a:c6:be:01:58: eb:d6:88:27:ae:48:a2:42:37:b2:08:62:0b:69:53:e8: c5:04:47:cc:74:1c:92:5f:9f:62:7f:af:21:d8:0d:4d: 8f:44:dc:33:17:23:8c:d7:42:2a:58:d5:72:9b:7a:fa: 59:4b:d1:f6:47:50:75:5a:17:7b:54:1d:f1:5e:4a:9c: 14:7d:e0:fc:d5:a7:ad:a0:45:89:b1:16:d8:56:76:cf: 92:dd:2b:ee:27:76:dd:51:26:fc:bc:9a:88:4a:31:f7: 34:b2:fc:05:42:d6:71:bf:04:b4:91:a2:6b:92:3e:7b: 06:7e:bd:6b:0c:2b:2e:de:58:67:e7:b2:66:f8:64:e0: 50:89:30:d2:2e:fc:12:32:7e:a2:5e:be:b6:d4:b5:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:ea:8e:ae:89:27:e8:59:62:c0:6a:1e:64:3a:17:b6: ec:de:b7:06:24:de:0c:68:6f:96:6a:34:ba:33:70:ec: de:cc:15:f9:b4:f7:96:bb:9c:c4:e8:87:53:17:bc:16: aa:02:39:61:ce:ee:c8:30:a2:e0:cd:8f:4d:52:6f:4f: c6:66:71:a7:29:15:f7:79:61:43:a7:03:98:b1:70:b5: 72:3b:71:00:4c:f6:3b:59:3f:88:60:01:f9:b2:db:c9: 52:ec:09:6c:3a:db:2c:e7:77:76:6d:27:7b:fd:cc:a7: 40:41:80:20:4a:aa:37:f1:55:fd:1c:fb:82:79:02:7b: 26:04:8d:45:79:31:fe:28:7e:72:f5:d3:37:6b:77:e4: f9:3b:6e:8d:7a:ea:b8:16:3e:39:d6:cb:82:89:db:24: 86:70:d7:88:31:cd:dc:29:d2:7c:86:28:2b:f2:9d:b2: 0d:6b:34:7a:09:ee:c9:ee:82:2f:89:4e:66:b9:b2:ae: 1f:f6:69:4f:b3:5c:a8:89:91:e1:3d:46:7b:4e:74:63: 6f:80:28:ad:03:b5:93:07:e3:39:14:03:d0:a0:c9:25: 55:45:1a:fa:7f:54:6c:9c:cc:4b:09:af:4e:73:8f:91: 2c:35:bf:ca:1d:b7:8e:22:dd:4d:7c:4f:a3:c2:f4:30 Fingerprint (SHA-256): EF:88:7C:CA:BA:C0:18:B9:6A:0E:E0:D8:DB:F1:C1:D5:A7:57:5B:67:9F:13:32:7F:CF:F5:23:75:7E:8C:94:24 Fingerprint (SHA1): CE:5D:CF:AA:8F:A5:93:C3:E2:B5:09:06:27:21:FA:DC:F3:D4:E3:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1246: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194505 (0x433ee1c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:21 2025 Not After : Thu Nov 28 11:46:21 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ea:81:91:76:e6:bf:d6:3b:10:ba:60:d1:31:e1:3c: 63:25:fe:5f:6c:f7:ca:d6:ad:14:cc:fd:88:14:3e:c2: 19:51:71:9e:8f:4f:da:84:ae:c4:1e:66:4d:d4:7d:20: e9:d4:87:34:fb:24:0f:95:1e:e2:68:c6:00:16:43:de: 27:37:1c:88:09:cc:8c:dc:61:61:21:8f:bd:1c:94:9d: 99:32:3e:d1:12:16:df:62:49:18:da:c8:c9:02:7a:76: 71:cb:90:66:ac:2f:b9:e4:67:5e:a0:0a:c6:be:01:58: eb:d6:88:27:ae:48:a2:42:37:b2:08:62:0b:69:53:e8: c5:04:47:cc:74:1c:92:5f:9f:62:7f:af:21:d8:0d:4d: 8f:44:dc:33:17:23:8c:d7:42:2a:58:d5:72:9b:7a:fa: 59:4b:d1:f6:47:50:75:5a:17:7b:54:1d:f1:5e:4a:9c: 14:7d:e0:fc:d5:a7:ad:a0:45:89:b1:16:d8:56:76:cf: 92:dd:2b:ee:27:76:dd:51:26:fc:bc:9a:88:4a:31:f7: 34:b2:fc:05:42:d6:71:bf:04:b4:91:a2:6b:92:3e:7b: 06:7e:bd:6b:0c:2b:2e:de:58:67:e7:b2:66:f8:64:e0: 50:89:30:d2:2e:fc:12:32:7e:a2:5e:be:b6:d4:b5:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:ea:8e:ae:89:27:e8:59:62:c0:6a:1e:64:3a:17:b6: ec:de:b7:06:24:de:0c:68:6f:96:6a:34:ba:33:70:ec: de:cc:15:f9:b4:f7:96:bb:9c:c4:e8:87:53:17:bc:16: aa:02:39:61:ce:ee:c8:30:a2:e0:cd:8f:4d:52:6f:4f: c6:66:71:a7:29:15:f7:79:61:43:a7:03:98:b1:70:b5: 72:3b:71:00:4c:f6:3b:59:3f:88:60:01:f9:b2:db:c9: 52:ec:09:6c:3a:db:2c:e7:77:76:6d:27:7b:fd:cc:a7: 40:41:80:20:4a:aa:37:f1:55:fd:1c:fb:82:79:02:7b: 26:04:8d:45:79:31:fe:28:7e:72:f5:d3:37:6b:77:e4: f9:3b:6e:8d:7a:ea:b8:16:3e:39:d6:cb:82:89:db:24: 86:70:d7:88:31:cd:dc:29:d2:7c:86:28:2b:f2:9d:b2: 0d:6b:34:7a:09:ee:c9:ee:82:2f:89:4e:66:b9:b2:ae: 1f:f6:69:4f:b3:5c:a8:89:91:e1:3d:46:7b:4e:74:63: 6f:80:28:ad:03:b5:93:07:e3:39:14:03:d0:a0:c9:25: 55:45:1a:fa:7f:54:6c:9c:cc:4b:09:af:4e:73:8f:91: 2c:35:bf:ca:1d:b7:8e:22:dd:4d:7c:4f:a3:c2:f4:30 Fingerprint (SHA-256): EF:88:7C:CA:BA:C0:18:B9:6A:0E:E0:D8:DB:F1:C1:D5:A7:57:5B:67:9F:13:32:7F:CF:F5:23:75:7E:8C:94:24 Fingerprint (SHA1): CE:5D:CF:AA:8F:A5:93:C3:E2:B5:09:06:27:21:FA:DC:F3:D4:E3:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1247: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194506 (0x433ee1ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:71:70:a2:91:7a:89:12:f3:9f:d8:42:d0:d3:a7:0a: 6b:0d:c6:82:a1:43:f1:8d:fa:f3:f3:4a:9e:a4:8c:dc: 83:80:07:22:0b:35:ac:ed:4a:b4:79:bb:19:97:4b:75: 63:b6:59:ed:b5:fb:17:19:38:9f:3e:01:c0:cf:54:c0: d9:16:55:93:fd:54:ab:5a:5a:ac:30:0b:af:38:b0:aa: ac:81:c5:92:00:06:00:ca:32:c5:e5:81:2f:a5:76:30: 39:d5:28:33:6d:cf:50:02:db:d7:c9:df:4d:70:b6:aa: 9f:c2:f1:e6:5b:51:80:be:ad:36:3c:ea:ea:17:a3:ab: 60:4e:fe:68:68:35:78:6a:39:f5:b9:06:2f:de:3c:e2: ab:42:9f:1f:4d:40:4e:e5:78:68:13:94:8a:67:5c:14: 7e:c1:c2:d2:c7:a5:45:97:a5:91:2f:e3:49:5c:5e:01: aa:c3:c0:59:2e:73:23:ba:46:93:77:d1:af:6e:9e:c9: 15:02:ae:8e:a0:ff:10:f6:d4:f1:88:b6:dd:b0:66:9b: 05:ce:2d:7e:b1:b2:d6:51:8f:3a:38:ae:7a:88:5b:8c: ae:3e:ee:9a:ef:da:32:88:c8:bc:f2:ac:0f:0c:da:fe: ae:c7:bb:36:5a:56:68:70:a5:2d:60:86:a4:b9:be:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:e3:0d:b8:ba:fd:46:b0:b0:34:66:68:0a:c1:7c:54: 04:45:f2:1b:48:0c:e0:79:5b:7d:06:fc:a2:84:8a:33: 74:af:7f:76:2d:7b:d6:ff:e7:dd:07:00:4e:1a:18:64: 18:aa:25:8c:4e:42:4a:44:a0:48:9d:52:b9:f7:1e:9a: 70:36:fe:a3:54:18:78:80:9a:99:e6:75:9c:f1:a9:74: cf:db:51:9a:32:e3:09:d9:e4:38:61:bc:01:44:1c:68: 13:40:40:4e:94:b4:b9:cb:7f:9b:4c:ac:25:2d:f9:25: 0a:74:dc:9c:a9:0a:ac:39:d6:3a:df:34:b5:a7:f6:ba: 7a:3a:f7:1b:dc:67:94:c1:01:c0:7e:e2:6a:cc:d7:1a: 09:27:97:41:7d:6d:bd:41:17:2f:1c:59:c6:69:8f:b1: 27:88:7d:b4:78:a8:09:92:12:f7:7c:5d:68:63:f9:50: 00:44:1c:ec:fd:4f:63:62:bd:34:cb:fa:5d:7a:df:48: ad:1a:e0:cf:05:82:98:0a:8f:07:b1:69:74:36:8f:4e: c2:7a:8c:de:9f:64:59:44:6b:80:11:29:f0:65:3e:d6: 08:68:c8:93:0e:5b:00:97:5f:c4:8c:ef:56:ee:57:d3: 85:1c:69:14:f4:c3:82:00:46:f3:c6:5e:ff:f6:69:ab Fingerprint (SHA-256): 3D:4A:59:47:2F:D4:D2:DF:35:64:FE:B8:BF:44:20:42:11:C6:EC:F7:39:C0:EA:40:74:AD:F5:E1:A3:18:E5:BF Fingerprint (SHA1): 47:E6:06:12:11:DB:8A:4F:5F:56:04:0B:13:FF:C7:54:5B:C5:A8:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1248: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194506 (0x433ee1ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:71:70:a2:91:7a:89:12:f3:9f:d8:42:d0:d3:a7:0a: 6b:0d:c6:82:a1:43:f1:8d:fa:f3:f3:4a:9e:a4:8c:dc: 83:80:07:22:0b:35:ac:ed:4a:b4:79:bb:19:97:4b:75: 63:b6:59:ed:b5:fb:17:19:38:9f:3e:01:c0:cf:54:c0: d9:16:55:93:fd:54:ab:5a:5a:ac:30:0b:af:38:b0:aa: ac:81:c5:92:00:06:00:ca:32:c5:e5:81:2f:a5:76:30: 39:d5:28:33:6d:cf:50:02:db:d7:c9:df:4d:70:b6:aa: 9f:c2:f1:e6:5b:51:80:be:ad:36:3c:ea:ea:17:a3:ab: 60:4e:fe:68:68:35:78:6a:39:f5:b9:06:2f:de:3c:e2: ab:42:9f:1f:4d:40:4e:e5:78:68:13:94:8a:67:5c:14: 7e:c1:c2:d2:c7:a5:45:97:a5:91:2f:e3:49:5c:5e:01: aa:c3:c0:59:2e:73:23:ba:46:93:77:d1:af:6e:9e:c9: 15:02:ae:8e:a0:ff:10:f6:d4:f1:88:b6:dd:b0:66:9b: 05:ce:2d:7e:b1:b2:d6:51:8f:3a:38:ae:7a:88:5b:8c: ae:3e:ee:9a:ef:da:32:88:c8:bc:f2:ac:0f:0c:da:fe: ae:c7:bb:36:5a:56:68:70:a5:2d:60:86:a4:b9:be:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:e3:0d:b8:ba:fd:46:b0:b0:34:66:68:0a:c1:7c:54: 04:45:f2:1b:48:0c:e0:79:5b:7d:06:fc:a2:84:8a:33: 74:af:7f:76:2d:7b:d6:ff:e7:dd:07:00:4e:1a:18:64: 18:aa:25:8c:4e:42:4a:44:a0:48:9d:52:b9:f7:1e:9a: 70:36:fe:a3:54:18:78:80:9a:99:e6:75:9c:f1:a9:74: cf:db:51:9a:32:e3:09:d9:e4:38:61:bc:01:44:1c:68: 13:40:40:4e:94:b4:b9:cb:7f:9b:4c:ac:25:2d:f9:25: 0a:74:dc:9c:a9:0a:ac:39:d6:3a:df:34:b5:a7:f6:ba: 7a:3a:f7:1b:dc:67:94:c1:01:c0:7e:e2:6a:cc:d7:1a: 09:27:97:41:7d:6d:bd:41:17:2f:1c:59:c6:69:8f:b1: 27:88:7d:b4:78:a8:09:92:12:f7:7c:5d:68:63:f9:50: 00:44:1c:ec:fd:4f:63:62:bd:34:cb:fa:5d:7a:df:48: ad:1a:e0:cf:05:82:98:0a:8f:07:b1:69:74:36:8f:4e: c2:7a:8c:de:9f:64:59:44:6b:80:11:29:f0:65:3e:d6: 08:68:c8:93:0e:5b:00:97:5f:c4:8c:ef:56:ee:57:d3: 85:1c:69:14:f4:c3:82:00:46:f3:c6:5e:ff:f6:69:ab Fingerprint (SHA-256): 3D:4A:59:47:2F:D4:D2:DF:35:64:FE:B8:BF:44:20:42:11:C6:EC:F7:39:C0:EA:40:74:AD:F5:E1:A3:18:E5:BF Fingerprint (SHA1): 47:E6:06:12:11:DB:8A:4F:5F:56:04:0B:13:FF:C7:54:5B:C5:A8:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1249: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194507 (0x433ee1cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:94:65:f5:c7:f8:ee:95:ca:a9:22:f5:a9:ab:6f:e4: 39:31:c8:eb:15:14:03:b6:dd:90:d3:4b:31:eb:f4:a2: e4:d8:dd:36:e6:7a:78:2e:bd:ca:94:49:0e:57:4a:79: 71:9f:44:d6:ff:32:2c:8a:81:4e:3e:eb:ba:33:18:0f: ce:93:a3:fe:e1:e7:13:4f:93:6e:c4:80:4f:71:89:87: f9:c6:eb:59:22:dc:b1:4f:8f:5f:33:22:b4:11:f3:77: 76:01:4b:0c:f2:be:ce:9e:cd:b7:8f:7a:99:ad:59:3a: 94:e9:d9:9e:63:79:f6:ad:45:bf:48:40:d6:9a:1e:ae: ec:7e:1a:7c:05:c2:a6:3c:cc:a4:bf:9a:a8:88:24:ac: 3c:9e:6e:d7:98:63:19:58:2b:6d:69:b4:c6:e6:f9:53: b4:3f:7f:ea:a0:d6:cf:44:22:6b:8e:dd:b6:b9:20:9e: 69:93:35:21:e8:cc:68:54:3f:b6:5d:ae:f2:7d:f0:59: 6e:84:65:2c:fd:f2:45:b7:65:d1:66:e6:9c:ad:ec:cd: bf:b4:fc:90:a1:45:bb:63:16:3f:23:d8:00:81:fc:14: cb:91:55:2b:76:fc:c1:11:a8:ff:c7:42:61:3a:94:45: d5:3e:f6:c1:ac:f4:78:b7:c9:e7:0b:2c:37:3e:da:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:27:87:a5:d9:b3:8e:c9:51:89:e8:5b:9a:b3:64:92: 8e:82:09:4e:f3:13:0e:da:d0:39:d4:9f:09:ba:ca:60: a4:fb:96:1f:84:35:7c:79:a4:f1:6e:91:3d:88:cb:64: 6f:f2:cd:66:0f:63:17:1f:b5:75:bf:14:30:c9:aa:0f: a9:e4:99:4a:a2:6d:72:dc:5a:27:aa:6b:36:e4:bc:6a: 0f:71:92:f6:87:e4:ed:f1:c7:0f:58:28:f0:fa:3e:07: 23:04:cd:61:e0:93:00:f2:85:71:84:53:67:c8:7d:12: 18:c6:0e:a7:0d:4b:69:b1:12:2b:74:d2:f4:c8:b9:0e: a2:32:34:9f:c7:9f:95:3c:4d:74:14:65:1f:0a:96:0d: f4:c7:27:bb:9c:a0:47:3c:c4:29:bd:70:d6:ef:3e:33: 16:26:0c:ee:54:dd:9d:e4:a9:8d:cc:74:95:b9:67:7f: b7:d8:c9:f5:23:9b:15:9e:e7:da:0f:30:0c:64:f4:4e: 7f:ee:fc:c0:5c:e0:95:ff:e9:04:49:af:e2:55:d5:d4: 0f:9c:d9:e7:fc:6f:0b:e8:bc:02:34:6c:78:47:9d:a3: 38:41:68:f5:b2:85:6e:61:23:00:84:0c:f4:77:d2:a6: a6:b3:2c:fe:6c:85:30:6e:c7:23:4f:ef:9b:c6:bd:47 Fingerprint (SHA-256): 34:43:EE:3B:69:1E:61:A1:0E:27:53:B9:9D:4E:F0:25:FA:83:D0:27:4D:0B:AA:4F:6B:48:01:92:4E:57:86:47 Fingerprint (SHA1): A8:56:15:01:8A:49:4D:17:4C:FE:6B:39:1F:11:94:0C:63:DA:D9:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1250: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194507 (0x433ee1cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:46:22 2025 Not After : Thu Nov 28 11:46:22 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:94:65:f5:c7:f8:ee:95:ca:a9:22:f5:a9:ab:6f:e4: 39:31:c8:eb:15:14:03:b6:dd:90:d3:4b:31:eb:f4:a2: e4:d8:dd:36:e6:7a:78:2e:bd:ca:94:49:0e:57:4a:79: 71:9f:44:d6:ff:32:2c:8a:81:4e:3e:eb:ba:33:18:0f: ce:93:a3:fe:e1:e7:13:4f:93:6e:c4:80:4f:71:89:87: f9:c6:eb:59:22:dc:b1:4f:8f:5f:33:22:b4:11:f3:77: 76:01:4b:0c:f2:be:ce:9e:cd:b7:8f:7a:99:ad:59:3a: 94:e9:d9:9e:63:79:f6:ad:45:bf:48:40:d6:9a:1e:ae: ec:7e:1a:7c:05:c2:a6:3c:cc:a4:bf:9a:a8:88:24:ac: 3c:9e:6e:d7:98:63:19:58:2b:6d:69:b4:c6:e6:f9:53: b4:3f:7f:ea:a0:d6:cf:44:22:6b:8e:dd:b6:b9:20:9e: 69:93:35:21:e8:cc:68:54:3f:b6:5d:ae:f2:7d:f0:59: 6e:84:65:2c:fd:f2:45:b7:65:d1:66:e6:9c:ad:ec:cd: bf:b4:fc:90:a1:45:bb:63:16:3f:23:d8:00:81:fc:14: cb:91:55:2b:76:fc:c1:11:a8:ff:c7:42:61:3a:94:45: d5:3e:f6:c1:ac:f4:78:b7:c9:e7:0b:2c:37:3e:da:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:27:87:a5:d9:b3:8e:c9:51:89:e8:5b:9a:b3:64:92: 8e:82:09:4e:f3:13:0e:da:d0:39:d4:9f:09:ba:ca:60: a4:fb:96:1f:84:35:7c:79:a4:f1:6e:91:3d:88:cb:64: 6f:f2:cd:66:0f:63:17:1f:b5:75:bf:14:30:c9:aa:0f: a9:e4:99:4a:a2:6d:72:dc:5a:27:aa:6b:36:e4:bc:6a: 0f:71:92:f6:87:e4:ed:f1:c7:0f:58:28:f0:fa:3e:07: 23:04:cd:61:e0:93:00:f2:85:71:84:53:67:c8:7d:12: 18:c6:0e:a7:0d:4b:69:b1:12:2b:74:d2:f4:c8:b9:0e: a2:32:34:9f:c7:9f:95:3c:4d:74:14:65:1f:0a:96:0d: f4:c7:27:bb:9c:a0:47:3c:c4:29:bd:70:d6:ef:3e:33: 16:26:0c:ee:54:dd:9d:e4:a9:8d:cc:74:95:b9:67:7f: b7:d8:c9:f5:23:9b:15:9e:e7:da:0f:30:0c:64:f4:4e: 7f:ee:fc:c0:5c:e0:95:ff:e9:04:49:af:e2:55:d5:d4: 0f:9c:d9:e7:fc:6f:0b:e8:bc:02:34:6c:78:47:9d:a3: 38:41:68:f5:b2:85:6e:61:23:00:84:0c:f4:77:d2:a6: a6:b3:2c:fe:6c:85:30:6e:c7:23:4f:ef:9b:c6:bd:47 Fingerprint (SHA-256): 34:43:EE:3B:69:1E:61:A1:0E:27:53:B9:9D:4E:F0:25:FA:83:D0:27:4D:0B:AA:4F:6B:48:01:92:4E:57:86:47 Fingerprint (SHA1): A8:56:15:01:8A:49:4D:17:4C:FE:6B:39:1F:11:94:0C:63:DA:D9:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1251: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1252: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194510 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1253: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1254: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1255: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1256: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194511 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1257: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1258: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1259: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1260: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194512 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1261: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1262: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1263: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1264: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128194513 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1265: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1266: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1267: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1268: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194514 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1269: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1270: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1271: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1272: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194515 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1273: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1274: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1275: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1276: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128194516 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1277: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1278: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1279: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1280: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1281: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1282: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1283: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194510 (0x433ee1ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:26 2025 Not After : Thu Nov 28 11:46:26 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:af:b9:e9:bf:86:b1:a6:d7:01:40:82:9a:f0:3b:0a: 6a:56:ae:39:88:a6:40:04:33:9e:94:68:11:24:ff:d2: c5:4a:7f:07:23:ba:ac:32:d7:b0:3c:73:fc:6e:6d:38: 2b:78:ee:f0:a5:3d:f6:73:16:b7:48:d6:6f:a3:c3:6d: ab:d2:22:51:2c:ce:f2:1f:72:f9:5b:45:e6:4c:b7:f4: 5a:ec:ef:e0:0f:8a:b0:10:98:a1:1c:10:83:50:af:79: 19:dd:05:50:8f:a9:5c:e5:31:f7:4c:87:cf:06:9f:75: bc:9d:3e:22:46:0f:70:df:d9:34:49:e0:1f:08:3e:a1: 44:98:25:76:51:fe:8f:33:47:f1:45:74:6f:ae:3c:fb: 8e:1f:1c:34:c0:af:2a:b1:75:cb:c6:0a:95:12:b1:31: fe:d7:1c:1d:9e:6c:3d:71:dd:06:22:09:43:73:65:42: c8:53:d7:54:af:c3:75:d9:db:ab:1f:4a:7c:e1:30:76: c9:0f:76:b8:d9:da:31:69:5a:7e:79:76:5c:68:de:84: 31:ee:28:c0:bd:d1:0a:61:5e:0e:40:31:9d:c3:10:af: a1:a0:5e:3c:2b:1f:a9:da:9f:b8:f6:df:df:ef:8e:2f: 41:ce:3d:95:25:94:97:6f:a2:cf:f3:85:b4:e8:74:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:ff:b9:cb:1c:96:f4:ee:1c:fb:0b:e9:40:20:7e:d0: bb:06:51:56:ab:61:91:f4:ab:a9:be:84:03:c0:15:f4: 9c:88:69:69:d0:96:bd:ee:7e:c7:aa:4a:b4:52:bf:e6: e6:21:61:b2:f6:b4:52:c3:93:05:ae:2f:53:be:fe:fd: 79:16:47:34:c3:32:bc:63:24:3e:59:f3:b1:3a:7c:c3: c9:21:cd:18:f1:1e:d1:6b:c3:1b:a8:e0:c1:58:4f:c1: e5:45:26:af:56:0a:4a:ea:9a:73:ca:e8:38:be:69:eb: 94:c6:56:32:86:98:96:0e:da:c4:c7:6b:97:d1:7a:46: 3b:e1:a1:e5:41:2c:eb:ff:57:fc:07:45:1c:09:3e:6a: 2a:f1:b8:2a:17:58:64:b4:5e:ab:3e:30:ef:3b:31:9e: 21:71:dc:cd:d2:df:5c:28:93:91:f3:b4:c1:ca:53:d8: 52:92:6b:e3:d3:56:bf:dc:9b:a9:cd:c7:c5:2b:f9:69: 03:5f:d7:a4:61:e4:a9:6d:65:de:5a:e6:d3:3d:8d:ea: e1:4e:0c:21:9f:9a:00:a9:f3:41:bf:1d:aa:ca:57:93: bd:b7:54:70:29:09:2c:ff:c5:9d:a3:92:6e:87:6c:6c: 6a:6b:cf:fc:f1:11:80:f1:77:b9:a2:33:f9:13:cf:fb Fingerprint (SHA-256): 27:0A:AD:17:11:83:F5:84:52:B6:81:DF:5A:2A:0F:33:E2:A0:46:5B:3B:CF:1F:90:1D:AF:AB:B6:F0:B8:3E:77 Fingerprint (SHA1): CB:BE:8F:65:D2:9F:80:8E:32:04:88:CC:D1:8E:AB:BA:E7:AD:F5:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1284: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1285: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1286: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1287: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194510 (0x433ee1ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:26 2025 Not After : Thu Nov 28 11:46:26 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:af:b9:e9:bf:86:b1:a6:d7:01:40:82:9a:f0:3b:0a: 6a:56:ae:39:88:a6:40:04:33:9e:94:68:11:24:ff:d2: c5:4a:7f:07:23:ba:ac:32:d7:b0:3c:73:fc:6e:6d:38: 2b:78:ee:f0:a5:3d:f6:73:16:b7:48:d6:6f:a3:c3:6d: ab:d2:22:51:2c:ce:f2:1f:72:f9:5b:45:e6:4c:b7:f4: 5a:ec:ef:e0:0f:8a:b0:10:98:a1:1c:10:83:50:af:79: 19:dd:05:50:8f:a9:5c:e5:31:f7:4c:87:cf:06:9f:75: bc:9d:3e:22:46:0f:70:df:d9:34:49:e0:1f:08:3e:a1: 44:98:25:76:51:fe:8f:33:47:f1:45:74:6f:ae:3c:fb: 8e:1f:1c:34:c0:af:2a:b1:75:cb:c6:0a:95:12:b1:31: fe:d7:1c:1d:9e:6c:3d:71:dd:06:22:09:43:73:65:42: c8:53:d7:54:af:c3:75:d9:db:ab:1f:4a:7c:e1:30:76: c9:0f:76:b8:d9:da:31:69:5a:7e:79:76:5c:68:de:84: 31:ee:28:c0:bd:d1:0a:61:5e:0e:40:31:9d:c3:10:af: a1:a0:5e:3c:2b:1f:a9:da:9f:b8:f6:df:df:ef:8e:2f: 41:ce:3d:95:25:94:97:6f:a2:cf:f3:85:b4:e8:74:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:ff:b9:cb:1c:96:f4:ee:1c:fb:0b:e9:40:20:7e:d0: bb:06:51:56:ab:61:91:f4:ab:a9:be:84:03:c0:15:f4: 9c:88:69:69:d0:96:bd:ee:7e:c7:aa:4a:b4:52:bf:e6: e6:21:61:b2:f6:b4:52:c3:93:05:ae:2f:53:be:fe:fd: 79:16:47:34:c3:32:bc:63:24:3e:59:f3:b1:3a:7c:c3: c9:21:cd:18:f1:1e:d1:6b:c3:1b:a8:e0:c1:58:4f:c1: e5:45:26:af:56:0a:4a:ea:9a:73:ca:e8:38:be:69:eb: 94:c6:56:32:86:98:96:0e:da:c4:c7:6b:97:d1:7a:46: 3b:e1:a1:e5:41:2c:eb:ff:57:fc:07:45:1c:09:3e:6a: 2a:f1:b8:2a:17:58:64:b4:5e:ab:3e:30:ef:3b:31:9e: 21:71:dc:cd:d2:df:5c:28:93:91:f3:b4:c1:ca:53:d8: 52:92:6b:e3:d3:56:bf:dc:9b:a9:cd:c7:c5:2b:f9:69: 03:5f:d7:a4:61:e4:a9:6d:65:de:5a:e6:d3:3d:8d:ea: e1:4e:0c:21:9f:9a:00:a9:f3:41:bf:1d:aa:ca:57:93: bd:b7:54:70:29:09:2c:ff:c5:9d:a3:92:6e:87:6c:6c: 6a:6b:cf:fc:f1:11:80:f1:77:b9:a2:33:f9:13:cf:fb Fingerprint (SHA-256): 27:0A:AD:17:11:83:F5:84:52:B6:81:DF:5A:2A:0F:33:E2:A0:46:5B:3B:CF:1F:90:1D:AF:AB:B6:F0:B8:3E:77 Fingerprint (SHA1): CB:BE:8F:65:D2:9F:80:8E:32:04:88:CC:D1:8E:AB:BA:E7:AD:F5:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1288: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1289: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1290: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194517 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1292: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194518 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128194519 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128194520 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128194521 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128194522 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128194523 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128194524 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128194525 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128194526 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128194527 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128194528 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128194529 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128194530 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128194531 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128194532 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128194533 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128194534 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128194535 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128194536 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128194537 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128194538 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128194539 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1382: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128194540 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1383: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1384: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1385: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1386: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128194541 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1387: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1388: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1389: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1390: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128194542 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1391: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1392: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1393: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1394: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128194543 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1395: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1396: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1397: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1398: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128194544 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1399: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1400: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1401: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1402: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128194545 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1403: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1404: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1405: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1406: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128194546 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1407: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1408: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1409: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1410: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1411: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1412: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1413: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1414: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1415: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1416: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1417: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1418: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1419: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1420: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1421: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1422: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1423: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1424: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1425: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1426: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1427: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1428: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1429: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1430: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1431: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194517 (0x433ee1d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:46:32 2025 Not After : Thu Nov 28 11:46:32 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:f0:9a:a8:48:27:33:d7:76:b8:26:37:dc:20:cd:97: 16:65:ee:c9:d1:b3:0f:27:1a:08:eb:ec:53:8b:ad:c1: 21:2f:e5:df:ee:f4:0d:fb:12:cb:45:a8:3f:59:07:b1: 53:13:9a:30:1e:11:a9:9a:72:f7:d7:d4:a3:5b:e5:d6: 49:e9:60:05:e3:d2:29:0c:ae:bd:00:39:be:18:6b:32: 66:ea:60:fa:05:96:ac:59:91:1f:e9:3f:2f:2d:47:b2: 3f:6e:b8:b5:ea:e4:ec:9c:61:18:d4:ec:10:55:c0:f7: 19:f5:7a:38:5b:58:db:02:29:d9:07:69:54:b0:3b:ad: 2d:32:fa:42:ae:4c:38:8f:9e:65:b2:31:f9:12:ae:ff: b2:84:a2:82:25:a4:25:8f:42:12:f5:3d:d4:15:f2:21: ff:ee:8f:fa:b0:2e:2f:19:4c:62:00:ac:d2:c2:c5:ba: d3:bd:e1:4a:62:32:14:8f:82:11:3f:08:df:5f:68:fd: 8b:28:44:ea:9e:0b:45:d7:cb:0b:82:8c:15:40:26:32: 72:41:5a:8f:5b:6f:60:21:b4:f9:9c:25:e8:76:3e:11: 26:06:a2:d2:eb:2a:89:b4:61:a9:5d:7e:7a:2d:01:ca: 4f:30:6a:41:70:31:9f:93:bc:67:90:d1:f0:c5:dd:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:e9:37:9c:b4:95:86:72:5e:2a:74:a3:3c:ea:bc:23: ab:73:33:09:b2:47:66:d7:17:f6:e7:71:7e:db:06:6e: 18:d0:e8:aa:29:55:73:7a:1e:ba:0f:f3:b7:10:1c:e9: e9:0d:61:6b:b9:00:2f:68:06:69:94:ff:05:9a:33:ec: f3:28:af:6d:f3:f5:cb:3a:af:13:33:ab:f0:68:f0:12: ff:d6:c5:e8:46:a5:34:87:fe:b5:31:80:36:bb:b3:b1: 09:05:de:92:6d:e4:15:bc:22:b4:a7:a1:00:13:fc:d8: 6a:be:a3:c4:da:9a:ff:05:96:ba:c3:70:05:4b:a5:9f: ad:88:2d:77:a2:d3:f7:30:54:8a:9e:f5:33:a7:da:8e: 38:d6:fc:b6:8a:4c:53:76:ef:e4:e3:b5:c6:d9:f8:36: c8:3b:8d:79:fd:74:36:32:bb:50:45:a0:ca:88:cd:c8: ab:61:a3:3d:3d:0c:cb:8a:a7:84:c0:2a:de:73:c0:58: 58:5e:e7:99:2e:86:90:36:42:83:ed:e0:75:ce:e3:33: 16:b9:a9:5d:37:f3:c9:61:6a:a2:50:f0:c0:ac:c0:4e: 28:4f:5b:99:e5:f2:8d:31:54:f4:e6:cf:8d:e7:6d:09: bc:09:6f:5c:57:36:60:43:4c:e6:8d:52:a2:20:f9:2b Fingerprint (SHA-256): 19:00:C6:AA:A0:BE:24:01:47:A8:F8:73:90:F6:B9:2E:42:63:BF:53:20:1A:39:6D:19:F9:67:74:E2:C2:12:F7 Fingerprint (SHA1): 1F:03:A1:30:9A:75:89:29:B0:41:5F:F4:3E:33:EC:50:39:F6:4E:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1432: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1433: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1434: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194547 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1435: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1436: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1437: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1438: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128194548 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1439: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1440: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1441: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1442: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128194549 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1443: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1444: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1445: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1446: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128194550 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1447: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1448: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1449: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1450: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128194551 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1451: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1452: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1453: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1454: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128194552 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1455: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1456: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1457: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1458: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128194553 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1459: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1460: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1461: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194547 (0x433ee1f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:55 2025 Not After : Thu Nov 28 11:46:55 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:52:0f:99:fe:d9:43:29:d1:e7:38:bc:15:25:64:0e: 30:9f:d3:12:36:b6:c7:8d:0f:c2:dc:e9:d2:06:84:df: cc:e8:86:83:7d:73:7c:ea:99:2c:07:bd:b3:11:fe:e7: 45:7e:aa:e0:d4:74:fa:c4:f0:d2:4e:4c:41:aa:c6:08: 7e:1b:b5:a1:7a:fe:90:dd:18:3a:d5:44:5c:9f:d4:78: 05:c3:5e:83:b1:7e:23:19:b4:91:64:61:6b:2b:6b:61: a9:37:49:20:48:e9:59:e5:48:3c:6f:ec:e1:06:62:cb: 28:0a:0e:5c:91:11:e5:5e:b4:4f:5b:95:d2:d5:12:dc: ed:92:87:fa:ef:a5:04:cf:2c:40:8e:1f:34:2a:45:09: 2e:8e:a7:20:0e:90:30:0f:d0:dd:e0:2d:1d:f5:e1:0e: 25:a1:30:16:e0:cc:f6:19:97:1b:41:19:a4:1d:70:1a: cd:e3:27:c4:1b:86:13:1d:fc:c6:45:11:40:f6:cd:13: bd:03:89:cb:24:a6:78:d6:94:c5:c7:fc:b4:e4:76:71: f2:3d:b2:11:42:5a:b7:4a:37:57:1c:7b:fe:bc:13:b4: c8:17:8b:36:69:af:79:42:74:3a:a3:ea:9a:4d:52:1f: 32:cb:2e:08:81:1d:98:fb:b2:1b:90:e2:b2:95:4e:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:ac:ca:ca:0a:df:2c:02:6b:11:f3:1d:03:ee:ac:82: 17:8b:b2:e4:f9:61:a8:c1:03:e3:b6:50:70:7a:e0:1f: e1:a1:d6:65:17:57:a8:5d:4b:c3:d1:fc:62:64:67:76: 78:3c:22:65:cb:62:8a:77:90:66:d4:08:9e:3b:cc:15: 62:08:3c:54:d0:c3:17:a4:55:75:98:69:be:e9:1c:43: 48:f7:a1:ed:ce:60:bb:f0:73:db:24:9b:87:83:eb:18: fd:3b:b9:07:f3:06:83:a0:38:bc:83:16:a8:59:a6:af: 45:19:4f:4c:2f:4c:ff:31:96:be:1d:2d:91:6f:08:cc: 4a:a8:21:1f:e1:28:27:61:2d:85:67:67:0b:81:92:6f: 48:87:27:e1:b7:b8:1e:18:3f:1c:f9:f9:7f:cf:fe:a5: ab:b1:80:7a:8f:17:9a:ca:9f:1a:43:e0:7b:1c:f8:62: 2c:1f:78:cd:29:bd:65:1b:18:a3:b0:9d:ed:98:73:55: a8:b3:71:d2:78:65:2d:28:61:59:a0:43:57:bd:9c:e8: bd:8c:2d:f4:9a:d2:69:38:5c:9d:87:66:08:8e:ee:82: 27:63:eb:11:a3:fb:de:6c:31:82:f6:42:71:f8:f0:86: 5a:b4:06:91:21:67:a8:20:38:2d:73:1f:44:bd:27:cc Fingerprint (SHA-256): 84:B9:7E:2B:D9:5D:49:C2:78:48:20:D1:F9:87:14:4E:0B:29:39:D1:95:F5:0F:B2:9F:ED:8B:7E:16:A7:01:46 Fingerprint (SHA1): C8:1F:BF:95:23:0A:A7:6A:FE:92:C0:91:B3:D9:8E:FD:A4:90:10:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1462: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1463: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1465: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194547 (0x433ee1f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:46:55 2025 Not After : Thu Nov 28 11:46:55 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:52:0f:99:fe:d9:43:29:d1:e7:38:bc:15:25:64:0e: 30:9f:d3:12:36:b6:c7:8d:0f:c2:dc:e9:d2:06:84:df: cc:e8:86:83:7d:73:7c:ea:99:2c:07:bd:b3:11:fe:e7: 45:7e:aa:e0:d4:74:fa:c4:f0:d2:4e:4c:41:aa:c6:08: 7e:1b:b5:a1:7a:fe:90:dd:18:3a:d5:44:5c:9f:d4:78: 05:c3:5e:83:b1:7e:23:19:b4:91:64:61:6b:2b:6b:61: a9:37:49:20:48:e9:59:e5:48:3c:6f:ec:e1:06:62:cb: 28:0a:0e:5c:91:11:e5:5e:b4:4f:5b:95:d2:d5:12:dc: ed:92:87:fa:ef:a5:04:cf:2c:40:8e:1f:34:2a:45:09: 2e:8e:a7:20:0e:90:30:0f:d0:dd:e0:2d:1d:f5:e1:0e: 25:a1:30:16:e0:cc:f6:19:97:1b:41:19:a4:1d:70:1a: cd:e3:27:c4:1b:86:13:1d:fc:c6:45:11:40:f6:cd:13: bd:03:89:cb:24:a6:78:d6:94:c5:c7:fc:b4:e4:76:71: f2:3d:b2:11:42:5a:b7:4a:37:57:1c:7b:fe:bc:13:b4: c8:17:8b:36:69:af:79:42:74:3a:a3:ea:9a:4d:52:1f: 32:cb:2e:08:81:1d:98:fb:b2:1b:90:e2:b2:95:4e:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:ac:ca:ca:0a:df:2c:02:6b:11:f3:1d:03:ee:ac:82: 17:8b:b2:e4:f9:61:a8:c1:03:e3:b6:50:70:7a:e0:1f: e1:a1:d6:65:17:57:a8:5d:4b:c3:d1:fc:62:64:67:76: 78:3c:22:65:cb:62:8a:77:90:66:d4:08:9e:3b:cc:15: 62:08:3c:54:d0:c3:17:a4:55:75:98:69:be:e9:1c:43: 48:f7:a1:ed:ce:60:bb:f0:73:db:24:9b:87:83:eb:18: fd:3b:b9:07:f3:06:83:a0:38:bc:83:16:a8:59:a6:af: 45:19:4f:4c:2f:4c:ff:31:96:be:1d:2d:91:6f:08:cc: 4a:a8:21:1f:e1:28:27:61:2d:85:67:67:0b:81:92:6f: 48:87:27:e1:b7:b8:1e:18:3f:1c:f9:f9:7f:cf:fe:a5: ab:b1:80:7a:8f:17:9a:ca:9f:1a:43:e0:7b:1c:f8:62: 2c:1f:78:cd:29:bd:65:1b:18:a3:b0:9d:ed:98:73:55: a8:b3:71:d2:78:65:2d:28:61:59:a0:43:57:bd:9c:e8: bd:8c:2d:f4:9a:d2:69:38:5c:9d:87:66:08:8e:ee:82: 27:63:eb:11:a3:fb:de:6c:31:82:f6:42:71:f8:f0:86: 5a:b4:06:91:21:67:a8:20:38:2d:73:1f:44:bd:27:cc Fingerprint (SHA-256): 84:B9:7E:2B:D9:5D:49:C2:78:48:20:D1:F9:87:14:4E:0B:29:39:D1:95:F5:0F:B2:9F:ED:8B:7E:16:A7:01:46 Fingerprint (SHA1): C8:1F:BF:95:23:0A:A7:6A:FE:92:C0:91:B3:D9:8E:FD:A4:90:10:3F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1466: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1467: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1468: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1469: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194554 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1470: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1471: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1472: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1473: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194555 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1474: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1475: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1476: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1477: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194556 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1478: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1479: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1480: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1481: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194557 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1482: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1483: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1484: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1485: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1486: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1487: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194554 (0x433ee1fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:01 2025 Not After : Thu Nov 28 11:47:01 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:17:1d:8a:a7:74:0f:c0:6e:0a:0b:3d:72:01:3b:db: 36:7b:e8:1e:4f:04:10:76:a6:03:ae:2f:3a:53:94:f0: 8c:a2:eb:cd:fb:b1:8f:d1:96:33:af:de:a5:3f:aa:c3: 31:52:d5:e1:0f:ea:9f:6a:ea:72:5a:2e:d4:ee:21:b0: f8:4d:18:c6:a2:a8:11:94:5f:bf:e2:76:a4:81:0d:18: a6:13:26:bf:e2:8f:4b:1a:7e:28:fa:2a:49:e4:c7:dc: 1a:62:f9:be:1f:d7:d6:2f:b8:5f:ee:10:48:35:24:e1: 89:c2:1e:11:77:75:ab:6d:f1:fd:f0:d0:4a:04:76:e6: 4f:7d:68:78:6f:49:86:c4:4e:fb:24:fb:40:1d:18:cb: 71:22:dc:7a:bc:bb:a6:05:5a:17:81:72:f0:b3:a7:28: cd:fc:38:e0:6f:98:8c:6b:c3:da:f5:9e:e3:77:77:70: a5:1d:2d:8a:9f:65:1e:20:0a:67:70:9c:6f:87:37:b3: f7:a8:b5:ba:3c:c0:06:0d:4e:21:bb:f9:4a:f1:31:52: c7:78:49:7c:cb:02:b3:ea:c1:1e:ba:bc:a0:6e:f9:d6: a5:fa:2f:66:89:4a:8d:b4:53:05:a4:0b:a7:cc:b8:b9: 03:80:48:ef:2b:db:c3:73:6b:64:6b:b2:cb:2d:ad:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:43:72:bf:57:b6:fe:fe:9e:13:ac:e1:aa:87:13:fe: 0a:01:80:1c:06:a5:f9:16:ae:c0:39:8a:67:27:eb:11: 95:b9:e4:52:a8:10:59:9b:67:02:61:98:21:d3:3c:65: 45:46:fc:6d:8c:eb:c9:4e:c6:e3:aa:45:61:85:46:44: 62:10:5b:f0:a4:a2:42:8b:bb:13:76:27:8e:2f:ce:24: 01:a8:99:be:f2:1b:a2:02:f0:9e:74:e7:04:2e:33:d5: a8:44:c8:1b:91:8c:99:1a:22:08:e3:95:b7:1f:58:48: c8:ac:73:7c:8d:29:a3:da:a0:7e:79:31:6b:ff:a7:43: cc:0e:69:0c:f9:f6:57:b9:2c:b6:42:9b:b6:95:b7:98: 87:68:7c:7c:fd:54:ef:6b:8d:14:ff:f7:22:1f:fa:74: b6:48:a1:32:e1:b2:ae:65:8d:46:0e:a3:8f:20:a1:72: 09:14:51:f9:9b:24:51:1f:03:85:af:3c:ce:e8:f1:9c: a2:9f:4b:8a:af:7a:63:10:10:8b:ef:d1:af:ab:fc:7e: a3:fe:e3:7f:f1:c4:f7:d3:9f:14:dc:02:c8:2d:24:3f: da:e2:6f:2a:f3:26:9d:6e:3e:e5:72:6b:b7:1b:d1:56: 84:e2:be:64:d8:8c:54:71:2f:81:4f:e6:d1:fa:60:2a Fingerprint (SHA-256): 37:E6:1E:AB:03:A1:22:28:30:83:95:3E:61:7C:25:26:2B:22:11:9F:42:73:53:B3:7E:82:9D:45:F7:22:11:38 Fingerprint (SHA1): 9D:D4:77:A7:E4:18:89:65:2C:1F:86:20:EF:62:C6:AD:F3:C0:B1:F4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1488: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1489: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1490: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194555 (0x433ee1fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:02 2025 Not After : Thu Nov 28 11:47:02 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:56:ec:68:f0:85:d5:46:2b:b2:83:f6:bf:dd:e7:e7: e6:a9:61:65:28:41:d4:b3:ee:78:dd:1a:cd:09:eb:55: 71:e2:5a:01:0c:89:86:6d:86:37:39:73:a3:af:e4:47: 80:94:7f:aa:18:a6:ed:ce:17:04:ef:aa:79:7c:73:5d: 9e:aa:9f:0b:fd:8a:5e:f8:3b:f3:1d:90:fb:a0:3e:12: 3c:c0:1f:60:3e:8d:de:45:6c:11:1b:75:52:69:b0:3e: d1:c1:c8:39:81:13:7b:9d:e7:3e:28:cc:0d:bb:1f:55: 6d:eb:fc:15:ba:5f:e4:51:29:b5:bd:db:f8:9f:41:c0: ca:4c:1c:8c:5b:9e:0b:6a:c4:37:56:22:80:b6:09:ee: 50:ad:ae:d5:79:9d:23:91:6a:04:a4:5e:25:32:6f:92: ab:9a:2f:f1:12:6b:d7:4d:4a:4a:50:f2:35:77:6f:91: 43:17:b9:f7:49:41:c4:d7:45:38:c8:a4:0b:e8:7d:5f: 9d:e6:01:8d:28:cf:7d:de:f0:3d:36:89:96:2b:01:fe: a5:0e:2c:55:4e:d7:dd:41:20:da:6d:b0:9f:18:b4:eb: 3d:57:58:c8:77:f0:c0:82:0c:4c:ce:65:92:6a:72:2b: b6:57:b4:3a:df:a2:28:75:cd:14:7a:78:d3:fb:7b:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:4c:13:1b:fb:d2:26:43:63:42:4d:72:be:e1:e3:74: 95:76:bf:25:6b:c2:bf:11:ae:fc:3e:8e:e7:8f:70:e7: be:a9:23:56:bd:d8:fc:61:56:df:f2:b0:e5:1f:59:ee: 2e:4b:a8:96:15:4c:67:26:d7:77:27:3f:3d:0c:b9:fb: 2d:f6:df:e4:91:26:f9:e9:57:2a:54:0a:e4:fc:bb:a2: 53:62:0b:73:73:09:a3:bf:d5:f6:d1:94:28:84:16:d5: d8:56:58:cb:f0:79:f6:a8:32:46:88:3e:ec:c1:82:aa: 84:ab:2f:ec:87:76:96:9a:62:a1:77:b6:f6:46:f3:da: 49:88:34:87:3c:40:1b:b4:2f:64:bd:08:c6:54:5e:77: 4e:b2:93:d7:49:0a:f0:56:6b:3f:e8:7e:4d:60:03:ca: 80:48:f7:7d:d1:17:7a:c3:6c:5b:4f:d9:31:4a:30:ec: ed:2b:02:a6:23:bd:e1:49:0f:53:83:b6:5d:cd:8c:e3: 2c:b6:c4:d5:11:1c:28:fb:f4:91:c1:ba:f0:fc:87:a8: 1d:03:26:72:d2:bc:1e:88:8a:70:f6:c7:39:b4:11:1c: 6e:77:0a:bd:31:73:8e:76:89:94:31:6f:c2:36:3b:e8: 3a:a8:b9:1d:e3:59:76:a1:9d:ec:77:fc:88:33:56:2f Fingerprint (SHA-256): 1D:05:E6:B3:AA:F7:88:AC:4E:86:E3:7E:14:69:00:8E:24:37:2D:8C:E3:CC:37:95:35:A8:27:F4:15:72:3F:F2 Fingerprint (SHA1): D4:42:4A:E9:75:3B:63:60:F0:20:70:FB:A9:5E:57:BC:E2:3C:14:BF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1491: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1492: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194556 (0x433ee1fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:47:02 2025 Not After : Thu Nov 28 11:47:02 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:54:1d:ff:09:10:74:ac:9d:42:f9:78:fe:05:1f:48: db:71:59:4e:5c:98:18:ec:e9:59:5f:b0:2d:72:9a:29: 22:e7:a0:e3:92:4d:93:87:23:ef:ac:36:61:f9:7a:17: a2:8e:50:0a:6a:9c:c2:4a:dc:4b:1a:81:86:d1:a9:14: a6:54:7d:da:b8:94:7f:ef:4c:83:94:7f:f7:72:26:2b: 6f:f3:27:9c:5b:6f:1a:c4:f0:57:f7:d0:e6:71:86:60: fd:52:54:5e:46:82:d6:01:d6:d8:47:95:d9:f3:8e:30: 2e:7e:60:ff:e8:88:16:71:53:16:bb:db:b3:3f:d0:9c: 24:ae:47:08:f4:75:57:69:0d:8a:b4:f3:65:36:45:7e: 0c:cb:0f:15:5a:ce:14:49:9f:32:91:4d:f7:53:3d:dd: 82:ac:b7:10:4b:7d:2c:f3:e6:47:50:9f:40:0d:16:ca: b4:57:78:e5:12:54:d9:c6:03:05:e0:49:cb:af:23:b5: 2e:47:1c:a8:83:0d:2e:c1:22:e5:d8:96:cd:b2:96:95: 94:c3:aa:22:a0:a2:26:64:e9:ca:c9:4d:e1:eb:14:94: bf:90:36:60:a6:62:38:ca:44:cb:bf:cc:1c:1f:9b:1c: a6:61:0b:74:24:d9:db:c2:76:c8:0e:18:fd:fb:70:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:cd:39:ac:35:d0:e6:d9:f9:ce:54:23:37:3e:ec:a9: 7f:9d:3a:c4:03:ed:5a:54:06:3a:b4:00:fc:41:d4:42: 0e:1c:73:6d:70:2c:1a:4e:c0:99:37:fe:9b:d5:19:20: 86:65:d7:d8:fa:4e:b7:1e:37:60:3d:5a:73:fc:e1:e8: 9f:32:28:49:f9:8c:a6:15:69:39:c6:99:17:78:ca:14: d9:30:d1:ee:97:8b:be:bc:23:de:fc:eb:f3:06:2f:5c: 08:37:48:f4:a5:c0:65:98:ff:70:0d:c0:b8:59:7d:e2: 4a:57:2f:c3:5a:1d:80:5d:0f:78:65:e1:b7:cb:1f:bf: 55:4e:0e:d0:8c:ac:42:eb:af:34:21:71:fc:b0:12:c6: 19:9c:d9:0e:66:68:0f:eb:ea:39:3d:e7:aa:4d:9a:f8: 5b:00:d6:80:f2:67:6a:fd:a2:bb:32:65:17:df:3b:27: 25:e5:bf:20:9e:b4:b9:81:e6:1a:34:89:e1:70:bc:c3: 92:9e:24:2f:d7:50:eb:d5:32:f7:6e:e2:73:0a:32:8e: bd:c8:d4:e8:4b:78:44:f1:71:5c:9c:c3:c5:42:94:79: a9:71:ab:a0:e9:a4:86:5b:46:6d:09:44:f9:38:cb:f9: 4a:ba:36:51:7e:dc:dc:f2:4b:81:89:15:32:6d:e9:ac Fingerprint (SHA-256): D3:01:78:65:4B:0A:13:B7:E4:A1:F0:20:01:A9:6D:35:38:D1:64:31:45:B3:2A:5A:22:CE:AB:39:2B:91:DB:0C Fingerprint (SHA1): 9F:A0:2D:AF:7A:D0:3A:B1:2C:1F:26:6E:DC:65:3D:E8:4B:63:08:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1493: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1494: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194558 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1495: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1496: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1497: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1498: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194559 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1499: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1500: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1501: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1502: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194560 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1503: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1504: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1505: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1506: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128194561 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1507: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1508: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1509: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1510: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128194562 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1511: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1512: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1513: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1514: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1515: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1516: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1517: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194558 (0x433ee1fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:04 2025 Not After : Thu Nov 28 11:47:04 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:20:e8:11:4e:ff:62:8c:54:3d:59:91:bf:be:44:36: d4:e8:58:eb:4b:42:18:0e:a6:d5:8f:b4:7d:e3:c4:a1: 04:89:b3:4f:87:83:0a:16:22:42:6f:32:4c:1e:0f:08: 80:7d:50:97:d8:eb:4a:77:9d:5f:a1:17:22:55:1f:8c: d1:d4:16:b6:00:94:90:a9:57:bf:ec:39:09:95:97:2a: 62:bc:a2:b2:d1:e8:7d:29:fa:05:db:f2:4f:00:62:0d: 28:de:ee:ff:a1:b0:ff:7d:b6:de:08:8a:6a:4d:cb:94: 18:1b:2c:84:02:27:37:93:96:bb:f1:ee:b0:f6:9e:68: 03:3f:e3:80:de:5d:d0:e6:c0:92:96:17:2d:47:0f:0d: 72:fc:5b:e5:39:32:d9:94:f1:f7:d5:64:70:20:1b:15: 08:35:c3:37:09:6b:b4:18:ca:b2:fe:07:92:29:33:59: 35:fd:5c:35:a3:e8:d9:f1:5f:76:ba:9c:fe:d7:18:47: 7e:4e:5f:8a:25:7a:f7:fd:72:47:c3:9d:64:27:fc:fc: 6e:64:7f:f4:50:a4:30:a6:7f:b2:27:97:17:49:85:32: 77:25:78:aa:38:0b:b9:ef:99:56:4f:fa:9c:76:ec:86: 38:44:e2:dc:cb:cb:c0:68:6a:be:32:ff:1b:7d:e2:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:9c:17:ec:c0:12:9a:5e:5d:59:ab:2f:ae:5c:01:8a: 2a:07:34:6a:24:00:d2:45:93:11:b8:89:fc:97:a5:e6: a4:34:dd:9c:a1:55:26:81:38:24:44:5b:8e:5d:6e:16: fb:5c:66:8d:48:a6:cd:8c:e3:fb:f2:1e:cb:c6:ac:08: 2f:c4:e7:8a:98:8b:14:2e:a6:da:9d:39:62:91:80:41: be:3f:79:e6:a5:d3:c8:29:fa:61:ae:f7:9a:d8:01:f6: 8c:08:3b:5a:45:9d:99:2d:ea:5c:40:e0:61:b2:0e:bb: 80:b6:89:4d:a2:06:54:5e:ec:0c:45:7d:bc:85:a9:0b: 5d:08:a3:71:28:5b:3c:02:77:60:13:56:b1:3d:77:8c: 2d:7f:f0:64:02:40:21:be:f0:81:7d:77:a7:f9:bf:f9: 70:1f:b5:e7:b2:26:19:0f:9c:32:1a:df:d7:7d:90:0e: 72:a5:c7:22:d9:23:9d:c8:28:6f:69:d0:df:b1:31:3d: 34:79:b0:67:47:bb:45:32:f8:c3:b8:77:26:65:7a:4a: fb:9d:86:d9:1b:77:05:1c:09:06:cb:5d:9a:0e:80:c5: 35:5a:b8:f7:45:ce:31:48:0e:4a:32:97:67:5c:88:10: 2f:eb:58:96:a1:17:71:d3:cc:e6:37:b3:a8:60:24:45 Fingerprint (SHA-256): ED:0F:19:29:40:FC:6C:5A:AE:8C:9C:55:BA:56:D4:37:D9:F1:D3:49:62:98:0C:52:BE:7A:42:EC:75:81:EC:37 Fingerprint (SHA1): 6B:DC:19:EC:49:75:94:91:3B:F6:1A:8C:48:62:8F:2A:18:DB:73:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1518: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1519: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194559 (0x433ee1ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:05 2025 Not After : Thu Nov 28 11:47:05 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:32:9f:1e:10:c3:3f:3f:89:54:6b:7e:c2:35:51:f7: 6a:f8:cc:8c:cf:2b:35:22:d8:67:b6:03:30:86:d8:e4: 9d:6f:66:36:3e:24:ca:2f:2e:c7:a9:15:53:56:45:53: 79:02:29:b8:fc:29:f0:41:37:fc:b9:d1:63:7d:69:f5: 72:8a:56:3b:ae:c2:6f:02:ff:b2:40:bc:a3:61:38:96: a1:55:aa:35:64:d4:5e:b4:e9:b0:6f:c8:d4:92:71:e4: 07:53:a2:ed:23:e5:96:c3:2c:10:27:5c:5c:f7:2a:7a: b5:11:5c:25:7c:9d:a9:ad:e4:4b:ff:26:0c:d5:c2:c7: 8e:c6:2b:07:75:83:5f:02:a1:42:1e:e5:4c:9b:bb:31: 4b:bb:b2:ea:42:d5:1c:2c:51:9d:03:5c:8a:8c:c6:cc: d6:5a:da:e0:22:f4:f4:29:28:80:ee:cb:00:21:33:50: a3:a9:ff:f6:ca:f3:f2:c7:d9:b5:77:e0:ee:07:c2:2b: 15:f7:c4:97:71:ff:93:d2:a2:e0:c8:09:8f:d4:87:5f: dd:5c:b9:be:12:0d:42:22:39:6d:32:ff:19:ad:43:94: 24:b6:b4:16:52:ad:84:ba:fd:c1:08:87:58:f3:56:78: 27:d7:fa:b6:44:17:c5:39:fe:8a:f5:50:e8:80:73:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:df:2b:96:ed:f1:e8:5b:d9:4a:8f:76:6a:b0:d3:17: 27:fb:24:a6:39:93:56:bd:b4:5e:7c:fe:b6:c7:e4:f1: 82:a2:6a:2f:3b:c4:83:3d:65:8f:13:3b:8f:52:3b:bf: b7:21:35:7f:61:4e:b8:3f:94:66:bb:7f:a4:e7:07:8b: f5:78:25:6f:a2:8b:ab:04:d4:7f:71:32:24:aa:fe:8e: cb:71:7e:a8:9b:a4:dc:34:9c:66:20:46:93:86:a6:a7: e0:d1:43:a0:b9:0f:08:c7:fb:64:80:0f:18:bf:4d:f0: 49:ad:0b:eb:66:74:5d:81:4b:4d:5a:df:9c:ba:3c:df: 83:76:13:e5:ca:f8:c6:32:50:6d:b0:b6:c6:2b:83:7c: 4d:bb:37:a3:7b:32:2c:2e:87:8b:53:be:fc:01:fb:07: cb:8a:88:80:4e:8d:f8:e5:ce:45:1f:5d:2d:f2:b7:0e: 77:2c:43:11:eb:5c:b7:da:b3:64:69:de:e1:ce:2b:ba: e0:95:41:76:56:08:cd:20:03:fe:22:79:fc:bf:04:4a: 63:af:04:3f:4e:6a:9f:dd:72:55:66:e2:8f:0d:ec:da: 14:21:80:93:82:df:cf:fd:ae:e9:a1:21:68:2e:8a:1a: 8a:1e:1b:e3:92:4d:bf:67:f7:31:bf:cd:27:a4:22:3d Fingerprint (SHA-256): 1E:CA:67:F0:AD:2A:25:48:1F:93:C6:89:88:87:27:23:D8:8A:11:31:DF:65:2F:A7:AB:C8:10:3F:0D:66:DF:63 Fingerprint (SHA1): A3:C7:12:3C:EE:5B:E5:85:05:95:70:84:22:ED:C1:A2:AA:5C:54:F1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1520: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1521: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1522: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194560 (0x433ee200) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:47:05 2025 Not After : Thu Nov 28 11:47:05 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:1c:be:11:f2:71:5e:68:c1:35:1f:7b:2c:1c:56:33: c3:1d:1f:72:60:30:b8:98:47:bd:69:6a:06:8f:8f:7f: f9:51:34:18:e9:55:ac:b1:85:bc:9a:f2:2e:77:3d:25: db:13:c4:4a:91:b8:fd:86:b9:84:86:36:7b:26:e2:d7: 74:cc:de:1f:cd:59:2c:e3:99:78:0f:4a:a6:4a:9f:5c: 0d:c4:66:46:09:20:8e:23:4f:5e:25:c3:6d:87:5d:fe: 7b:85:23:1d:95:28:6b:61:e9:0d:d2:eb:c1:f6:51:d2: 1b:40:62:31:47:0f:bb:04:cf:49:32:ae:c1:87:48:ec: 9e:a1:b9:7a:ee:37:c4:01:08:16:9c:0e:68:c8:be:71: b4:27:c3:63:70:a9:93:a2:d0:e0:7c:3a:17:b8:89:2e: 56:50:2e:67:67:54:27:dc:1a:e0:0d:4c:b2:61:56:1d: 3b:c4:4f:4b:29:e4:0c:68:0f:d2:be:c6:17:2f:a0:96: fd:b3:08:32:e8:09:53:83:35:bf:c9:d0:73:23:bc:c6: ec:68:70:7e:1e:d4:7f:bb:c0:f8:41:58:e4:01:b5:60: 2d:7c:5f:98:82:3d:00:d4:7e:a9:40:60:d4:fd:a1:b5: 34:8a:6d:c4:2b:ef:bf:cc:b9:d1:15:71:54:86:83:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:fd:42:62:7b:d9:c8:2c:bc:d3:f3:2c:0a:53:fa:ae: 0d:c9:ea:02:db:31:24:ad:43:a4:0c:2b:47:f7:0a:d5: f5:ed:51:7d:cb:78:07:b7:26:e2:af:5f:2f:62:da:73: 86:08:06:05:71:4a:34:00:29:73:11:94:a2:a7:0f:e9: 2e:b4:53:40:e2:f7:c4:33:ca:05:11:8e:86:70:ad:46: 6f:9e:d4:bc:83:df:d9:8a:76:99:24:f6:8b:62:d4:53: 7a:04:49:3e:72:7b:99:f7:95:15:d8:4e:4b:ed:09:cf: f1:0e:dd:36:fb:03:35:b4:5b:4e:d3:c2:f1:bd:57:73: b7:b2:d5:92:dc:de:68:d3:6c:81:33:41:f8:04:3d:45: 44:61:17:ca:d4:8b:16:a4:46:c9:c5:3f:88:b3:60:fb: 2a:61:a8:94:62:49:9a:50:1d:39:e3:fd:a2:ee:d7:bc: ca:a9:7c:32:ea:af:b1:4f:4f:dc:31:ad:af:36:f8:6b: 8e:a8:d3:0d:47:f7:6d:e7:bd:80:32:5a:83:89:5d:f9: ce:e9:25:b4:2e:85:99:86:ee:81:b4:10:53:95:ee:a2: 43:c1:77:30:7e:a1:e5:de:da:f3:9d:f4:02:b9:83:6a: 94:17:cb:1c:c3:25:46:f5:36:71:f2:ce:5a:e7:72:08 Fingerprint (SHA-256): 4A:EF:D9:D9:E4:EA:16:DF:29:88:CE:CF:61:46:2F:25:10:4F:FD:C6:3E:F0:4A:09:EF:41:D1:39:74:5A:1B:50 Fingerprint (SHA1): C1:1A:43:82:1C:1A:0C:65:A7:C8:2A:A3:66:67:3F:E4:C8:D8:3E:5B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1523: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1524: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194563 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1525: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1526: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1527: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1528: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194564 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1529: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1530: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1531: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1532: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194565 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128194326.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1533: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1534: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1535: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1536: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194566 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1537: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1538: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1539: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194563 (0x433ee203) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:08 2025 Not After : Thu Nov 28 11:47:08 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:04:03:17:35:0f:d7:d1:5f:bd:e5:dc:fa:f7:7b:73: 43:e2:c7:51:59:38:84:3f:b9:c5:83:82:5f:26:70:9d: 42:1e:0b:d0:e8:ce:2e:ac:58:a3:45:45:47:2c:ed:e6: c0:0c:2d:30:9e:80:6e:94:02:3a:b6:b3:9d:87:b2:73: af:56:23:bc:be:7b:25:05:72:97:01:58:d4:d1:82:40: ad:1d:79:3c:43:bf:48:5d:17:4e:28:0e:1b:9e:3b:42: d1:e2:29:d4:70:fb:fc:23:09:03:06:e1:cc:f1:4b:f6: 90:8f:c6:f9:c1:8f:45:56:36:68:46:6f:ef:32:a1:da: 62:98:7a:8e:81:27:88:61:58:37:8a:1f:d8:6c:92:09: 8a:64:49:b8:b3:b7:da:7f:68:16:80:78:56:36:c7:7a: 1a:4b:ea:f5:71:71:da:5b:14:5f:3b:42:5a:ba:60:50: 73:39:32:5c:3e:aa:df:9a:25:8c:3d:64:cb:b5:ab:75: 52:45:75:57:ae:ad:74:85:ee:2c:19:53:6b:a8:c1:b6: bb:2a:29:da:65:e7:a2:e9:13:0c:40:fd:b5:d9:39:37: f9:15:b6:a3:10:3f:d9:6a:b6:b1:ad:41:d1:b2:dc:58: c3:ec:07:7c:75:f5:ae:63:f6:e5:91:86:00:ae:e2:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d6:bb:55:d9:f3:df:d2:91:bd:66:77:ca:ea:6a:3c:8d: 6f:54:9f:92:1b:59:37:22:e7:0c:f1:89:a4:f7:97:2c: 18:c0:bb:4d:10:9f:ad:fe:e1:6a:57:56:e8:02:f7:3a: c9:c3:a8:c4:fe:81:a7:75:c9:da:25:c3:dc:62:5a:e5: 20:c3:4b:a3:33:9a:4e:6b:9c:0a:51:12:dc:a5:a6:72: 81:7a:60:8e:40:97:a3:f6:a7:9e:25:ea:99:7a:83:d5: 78:60:96:11:4d:2c:5f:ce:25:e3:45:37:b7:88:15:09: ba:16:22:99:1a:e4:94:76:49:6c:e4:78:e5:c2:ec:f7: 65:f5:31:84:94:99:b2:31:77:34:f0:da:92:a0:9e:09: ae:6f:74:61:6c:80:b6:c8:f6:8b:54:de:60:46:d1:c9: aa:43:50:ca:91:73:fd:e6:4e:35:60:c3:e5:f8:c5:ac: 6e:bd:67:5c:6d:5b:c9:ec:d6:09:b9:8a:1c:a6:79:18: 3b:6e:e8:c2:9c:19:c0:e3:9b:8e:39:6c:5e:c4:8b:fe: 58:ca:ac:25:dd:5e:9e:ce:f0:75:b5:f2:4c:49:fe:7f: 1d:bc:06:4e:cc:c4:b4:a2:21:b9:a8:cd:b5:ee:5b:86: 25:d6:f3:8d:d2:51:8e:97:aa:b7:89:21:b0:88:0a:b0 Fingerprint (SHA-256): B6:4E:BE:2E:E4:E5:2B:E9:08:AE:72:DA:4F:93:D2:50:39:A8:4C:6E:0A:D9:EE:E3:E1:CC:86:26:3B:39:0E:62 Fingerprint (SHA1): C5:E3:4B:22:37:02:C5:F6:F3:55:5D:F5:A9:24:D9:03:28:FD:A0:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1540: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1541: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194567 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1543: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1544: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194568 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1546: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1547: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1548: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194569 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1549: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1550: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194570 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1551: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1552: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1553: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1554: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1555: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194571 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194327.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1557: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1558: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1559: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194572 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1560: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1561: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1562: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194567 (0x433ee207) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:47:12 2025 Not After : Thu Nov 28 11:47:12 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:ca:8d:d0:c9:ab:34:47:c8:89:1f:6c:1c:1c:34:c6: 8b:30:6e:06:43:1c:f5:97:af:a1:2c:57:61:29:5f:3b: e4:36:b2:83:36:2b:bc:d3:ad:87:fe:59:c2:0a:05:b3: b0:79:0a:52:e6:fb:b5:3a:1e:ee:3f:7b:6b:34:5a:af: 2b:6e:6a:de:b4:12:d3:86:53:3b:9e:ab:99:f1:cf:6c: c3:4d:27:98:cc:e3:6c:b7:f6:45:75:7b:60:94:87:28: 83:7a:f9:b9:8a:80:22:45:92:70:2b:12:d8:57:b8:a6: 7e:68:a3:a6:d5:ea:fa:bd:7b:0b:f7:7a:7b:a8:20:ce: 03:58:d2:b6:32:ea:5b:38:22:bb:d8:ce:d0:41:c9:44: 9d:5e:b3:aa:11:29:a8:44:98:6f:9e:c1:0e:63:98:50: 4c:d7:58:3b:fa:ea:53:80:1c:10:81:62:82:0c:74:25: f6:75:43:90:f6:81:61:be:99:34:02:f0:5c:af:18:05: 9a:13:c0:5b:c5:64:2e:ef:93:89:9c:c1:e1:d9:4e:12: 06:20:2e:25:59:dd:bd:4c:e1:cf:7c:e6:90:2c:19:6f: 1b:c8:98:37:c3:9d:60:52:1a:8b:3a:5b:e1:ca:09:57: 09:05:12:fa:8f:09:71:34:a7:9a:2e:5d:46:16:3d:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:b4:49:57:43:c8:67:5e:e9:dc:52:86:35:54:88:fb: 01:dc:51:dc:c7:27:17:46:cc:ce:f5:40:cf:27:39:9e: 1c:90:f7:50:8a:ed:9c:cd:4b:d8:ec:14:9b:e3:35:f8: 8b:be:e6:ff:2a:6a:58:36:97:06:20:84:c5:09:7b:84: 40:0a:11:5a:df:84:a7:be:17:76:f7:8b:d6:f2:bc:e2: 7b:db:7c:43:dd:b5:db:d7:b6:23:38:d8:bd:33:51:97: 83:3f:e9:20:64:98:f7:36:50:a7:bb:bc:cf:30:52:26: d3:27:f2:b9:58:a4:e1:c0:2b:02:48:b9:42:85:b7:80: b6:5e:6e:ab:84:d2:73:a7:79:d0:b3:f3:b4:50:ba:ef: 2a:1d:9a:15:88:40:4a:71:9b:25:0a:0a:f5:6a:48:65: c3:74:2a:87:07:dd:a8:e2:f4:77:9a:7a:e9:31:6f:de: 48:42:d6:72:2b:69:a3:de:9d:af:95:84:28:f1:57:49: 59:4f:4d:ad:59:6b:27:4a:9d:e1:92:11:7d:31:40:9a: 43:c4:92:d7:e4:d5:49:fe:3b:24:df:e1:f8:fc:0b:7d: ad:3e:dc:41:57:d6:72:b0:46:de:bc:70:8b:9a:e8:d0: bc:a3:0c:f5:54:64:9b:99:ac:2a:1e:e5:c5:74:61:01 Fingerprint (SHA-256): 80:B6:3A:E5:05:29:B1:3E:AE:B5:9B:01:CA:8C:E2:B0:0C:15:42:05:95:08:6D:FD:83:9B:05:CD:4D:16:E5:47 Fingerprint (SHA1): 43:78:7C:3C:C4:28:C8:73:D1:92:96:E5:B0:55:F1:C5:71:E5:ED:90 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1563: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194568 (0x433ee208) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:13 2025 Not After : Thu Nov 28 11:47:13 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:da:36:9b:f1:fd:d5:2f:5e:1d:e1:47:75:82:50:51: f2:24:8b:37:8a:77:16:3f:71:0e:46:5e:1f:84:bc:26: 8e:96:71:e1:c8:8e:5c:de:ad:16:aa:ee:7c:fb:70:04: bd:cd:e9:8d:87:a7:8a:f4:eb:31:a4:3f:71:c3:fb:49: aa:1c:f3:79:43:55:c8:b2:2c:3c:b7:a5:f4:cc:b6:8f: 75:e7:c6:ea:d7:63:a5:0f:49:ef:16:45:7c:bd:41:ee: 71:63:aa:ec:f0:34:d0:16:b0:42:08:b3:dd:74:a9:3a: 2d:e5:65:f6:28:06:b1:9a:20:14:5c:16:42:cd:48:5d: 63:eb:ca:75:f3:ba:e5:6a:ca:cc:a1:e7:45:15:79:c4: be:42:1f:28:1d:6b:06:d2:87:10:5b:01:4d:cd:66:4b: f5:b0:bb:95:01:99:2a:36:b4:7e:0f:62:90:8e:ae:3c: 1d:f5:e7:64:28:3f:03:89:8a:77:00:10:73:eb:fb:62: 6c:99:cc:96:3c:ee:44:3e:11:a8:73:7f:b0:d4:c0:a8: 93:bd:f0:a7:05:51:67:59:17:4c:e2:da:85:36:62:00: 5d:8d:d6:0c:5f:8b:a8:33:28:2a:1d:25:ca:ed:61:54: dd:aa:9c:bb:96:ca:82:10:ec:ce:5c:53:da:95:77:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:42:6e:4e:f1:b0:7d:e4:d8:6b:f4:10:86:bc:ce:9e: 0a:f3:22:d0:6c:17:4d:19:ce:4e:75:a4:7e:69:61:32: 84:7d:04:b4:90:20:3b:8a:51:d1:a2:bb:64:9a:03:11: e7:64:f5:94:ca:2a:e6:4f:d9:78:e4:a4:8d:c7:0b:9f: ca:5a:ae:87:47:ab:61:fb:09:6d:e5:11:c2:bf:76:07: 5a:ee:6c:7e:a3:58:6f:2f:9c:44:fa:84:71:e6:4b:07: a8:35:3a:b3:87:27:b1:e4:41:62:83:82:2f:09:5a:25: 57:3a:1e:be:b1:44:7f:14:6d:1e:bd:e2:32:98:c1:25: ae:31:ae:0a:62:35:52:40:fc:6f:35:26:02:03:66:65: f6:84:be:5d:f0:2b:59:5b:6b:bf:08:38:46:b5:74:d5: 0c:6b:dd:ce:77:a9:9b:21:80:bc:bf:b3:75:8a:8b:8e: cc:06:3c:3c:0a:27:8f:8b:40:77:ed:ab:19:23:99:76: 6e:cc:f8:2a:70:e1:64:93:e7:4f:1d:72:54:9f:70:b9: 14:0b:fb:71:42:46:35:eb:42:00:2e:9b:64:cd:d5:56: 11:d8:d8:b3:f9:56:4f:6b:90:bb:73:69:d1:c0:e1:c5: 1e:54:72:79:b8:02:67:b2:05:4f:4b:c5:3b:54:dc:27 Fingerprint (SHA-256): 75:E4:29:6F:22:7F:CE:C6:82:D8:E0:A7:35:24:43:16:AB:44:B6:C4:9F:18:F7:16:58:70:3F:92:EC:E7:21:CE Fingerprint (SHA1): 96:BD:65:2D:4B:E3:27:AD:5E:9E:89:AB:20:B2:6E:97:5E:96:86:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1564: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194568 (0x433ee208) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:13 2025 Not After : Thu Nov 28 11:47:13 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:da:36:9b:f1:fd:d5:2f:5e:1d:e1:47:75:82:50:51: f2:24:8b:37:8a:77:16:3f:71:0e:46:5e:1f:84:bc:26: 8e:96:71:e1:c8:8e:5c:de:ad:16:aa:ee:7c:fb:70:04: bd:cd:e9:8d:87:a7:8a:f4:eb:31:a4:3f:71:c3:fb:49: aa:1c:f3:79:43:55:c8:b2:2c:3c:b7:a5:f4:cc:b6:8f: 75:e7:c6:ea:d7:63:a5:0f:49:ef:16:45:7c:bd:41:ee: 71:63:aa:ec:f0:34:d0:16:b0:42:08:b3:dd:74:a9:3a: 2d:e5:65:f6:28:06:b1:9a:20:14:5c:16:42:cd:48:5d: 63:eb:ca:75:f3:ba:e5:6a:ca:cc:a1:e7:45:15:79:c4: be:42:1f:28:1d:6b:06:d2:87:10:5b:01:4d:cd:66:4b: f5:b0:bb:95:01:99:2a:36:b4:7e:0f:62:90:8e:ae:3c: 1d:f5:e7:64:28:3f:03:89:8a:77:00:10:73:eb:fb:62: 6c:99:cc:96:3c:ee:44:3e:11:a8:73:7f:b0:d4:c0:a8: 93:bd:f0:a7:05:51:67:59:17:4c:e2:da:85:36:62:00: 5d:8d:d6:0c:5f:8b:a8:33:28:2a:1d:25:ca:ed:61:54: dd:aa:9c:bb:96:ca:82:10:ec:ce:5c:53:da:95:77:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:42:6e:4e:f1:b0:7d:e4:d8:6b:f4:10:86:bc:ce:9e: 0a:f3:22:d0:6c:17:4d:19:ce:4e:75:a4:7e:69:61:32: 84:7d:04:b4:90:20:3b:8a:51:d1:a2:bb:64:9a:03:11: e7:64:f5:94:ca:2a:e6:4f:d9:78:e4:a4:8d:c7:0b:9f: ca:5a:ae:87:47:ab:61:fb:09:6d:e5:11:c2:bf:76:07: 5a:ee:6c:7e:a3:58:6f:2f:9c:44:fa:84:71:e6:4b:07: a8:35:3a:b3:87:27:b1:e4:41:62:83:82:2f:09:5a:25: 57:3a:1e:be:b1:44:7f:14:6d:1e:bd:e2:32:98:c1:25: ae:31:ae:0a:62:35:52:40:fc:6f:35:26:02:03:66:65: f6:84:be:5d:f0:2b:59:5b:6b:bf:08:38:46:b5:74:d5: 0c:6b:dd:ce:77:a9:9b:21:80:bc:bf:b3:75:8a:8b:8e: cc:06:3c:3c:0a:27:8f:8b:40:77:ed:ab:19:23:99:76: 6e:cc:f8:2a:70:e1:64:93:e7:4f:1d:72:54:9f:70:b9: 14:0b:fb:71:42:46:35:eb:42:00:2e:9b:64:cd:d5:56: 11:d8:d8:b3:f9:56:4f:6b:90:bb:73:69:d1:c0:e1:c5: 1e:54:72:79:b8:02:67:b2:05:4f:4b:c5:3b:54:dc:27 Fingerprint (SHA-256): 75:E4:29:6F:22:7F:CE:C6:82:D8:E0:A7:35:24:43:16:AB:44:B6:C4:9F:18:F7:16:58:70:3F:92:EC:E7:21:CE Fingerprint (SHA1): 96:BD:65:2D:4B:E3:27:AD:5E:9E:89:AB:20:B2:6E:97:5E:96:86:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1565: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1566: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194573 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1567: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1568: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1569: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194574 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1570: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1571: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1572: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1573: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194575 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1574: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1575: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194576 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1576: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1577: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1578: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1579: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1580: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194577 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194328.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1581: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1582: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1583: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1584: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194578 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1585: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1586: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1587: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1588: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194579 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128194329.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1589: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1590: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1591: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1592: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194580 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1593: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1595: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194573 (0x433ee20d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:47:17 2025 Not After : Thu Nov 28 11:47:17 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:06:0e:4d:73:1e:dd:6c:75:9c:c0:a0:2a:f3:58:8d: 62:e9:73:1d:9e:59:79:0b:29:ce:77:03:28:5f:9e:df: e6:07:85:0a:cf:62:d3:e2:7c:23:75:da:d4:de:9f:9b: f8:5f:57:35:3b:1c:14:cb:0d:9d:7a:53:15:83:b4:aa: 19:c2:8e:9f:d5:f1:58:e6:f3:fd:b2:5d:5e:a2:86:bf: 89:2c:79:b9:71:a5:f9:43:c1:ed:25:04:8a:99:34:02: 8f:70:03:67:a4:36:58:8b:da:30:61:a4:51:ce:56:1a: 38:6a:3c:c4:32:85:78:ea:f4:3d:40:95:8d:b7:c9:4c: 7a:f4:9f:85:d0:0e:49:ab:ce:e1:4f:19:42:05:30:6c: 94:dc:a4:dc:c1:bc:82:ca:9d:9e:2c:6b:03:6b:fc:e1: bf:20:bc:2a:70:15:ee:cf:f9:21:58:c3:06:b5:2c:c0: ad:c4:df:3d:31:a4:85:42:10:12:37:2f:6e:dc:47:ab: 99:43:ad:f4:b4:45:75:1d:be:b0:89:be:5e:fb:6c:18: 64:26:d2:59:ed:1e:fe:d4:e8:f6:cb:a3:1b:9d:67:22: e9:1b:f9:63:e8:43:01:70:43:07:22:6f:ac:d9:7f:c6: e7:52:b2:90:b0:f1:81:f9:c5:69:a8:5e:84:a6:76:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:e7:c0:39:a6:25:3d:75:a2:c6:b9:a4:26:ce:c5:1b: 52:00:4d:ea:ae:da:86:89:74:02:8a:3e:4b:58:8f:ae: 7e:18:1c:4a:89:e4:89:b5:fd:78:b4:77:69:ad:86:06: dd:68:eb:18:9f:3c:dd:88:8c:de:1c:ac:c1:4c:e0:ac: 1c:0a:d3:58:10:e3:78:b7:c0:bd:6f:07:17:0e:1b:ce: be:85:50:db:3f:12:21:a1:5d:38:ea:c1:be:02:72:72: 0f:8a:6c:ec:74:67:0b:34:10:7c:6c:23:87:49:74:56: 1f:2b:04:95:08:b0:db:38:ed:c5:11:01:28:33:a3:22: ea:6d:5d:73:54:ca:97:a7:13:5b:82:b8:29:c6:34:6b: a1:f8:af:9b:d7:c7:7d:a4:2a:46:86:bb:55:a5:b5:27: 62:a8:e9:41:f4:25:e5:fe:d9:69:4a:49:fe:ca:9a:ef: 9a:30:72:ea:ed:b8:73:12:3a:00:58:3e:ad:75:6d:f4: 21:3e:03:31:a7:5a:49:37:02:e1:b7:ce:27:d9:eb:2d: b4:81:f9:b1:85:30:11:fd:9c:22:5e:83:ea:a6:92:22: 01:b6:44:c5:14:a3:3a:c7:ee:52:bb:9b:64:19:a8:1d: f2:af:ee:c2:d4:52:ba:f7:14:65:1b:03:06:81:0f:26 Fingerprint (SHA-256): 48:CA:4F:58:8F:1B:76:46:4D:FE:24:37:41:C2:46:1F:91:43:69:A7:64:AC:C0:FC:57:1D:38:E7:07:25:BD:0D Fingerprint (SHA1): 2D:64:B2:02:2D:EC:E5:2A:40:1F:7B:A0:1B:20:3F:CF:B7:40:8C:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1596: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194574 (0x433ee20e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:18 2025 Not After : Thu Nov 28 11:47:18 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:20:5d:89:ec:fb:ad:6e:f7:57:cd:a9:02:d7:32:6d: e2:12:bf:71:fd:cc:a3:e7:4e:a4:b5:53:2c:d6:18:7b: d8:30:9e:f3:51:3d:43:55:10:99:d9:cf:c6:0b:29:31: 5c:da:27:f6:c9:ac:1c:45:81:2d:7e:17:a3:0e:a2:93: f4:eb:ae:80:3e:d1:d6:a2:0a:b4:02:48:92:8a:c2:10: ea:de:a0:fe:25:e1:a1:9a:0e:4c:72:cb:99:c9:53:fc: a9:af:0d:59:6c:fb:da:0c:8c:c5:b4:ef:2a:f0:d5:dd: 6f:3f:a8:27:02:a2:19:17:75:42:b2:ea:47:d7:29:2d: cf:2d:2e:e2:8e:6b:0a:0a:8f:03:87:95:44:d8:2e:4b: 15:d4:94:c7:ed:b2:92:20:5f:7d:7b:4a:1d:60:b4:b6: b3:02:ea:b8:30:af:f3:e1:02:be:7c:d4:04:21:c8:c1: ed:23:d6:64:e4:07:5f:04:a0:fe:22:e2:20:49:e4:f7: 19:59:76:d8:8b:3c:96:0e:76:48:0b:76:f8:83:cf:0a: e3:b1:96:89:e9:0b:78:a8:6d:8d:d0:7d:cf:3c:a5:76: 19:ee:a6:51:d9:0d:97:e2:cc:89:36:61:3f:e4:c1:26: e7:95:8b:e1:e3:7b:21:4d:50:b5:a9:38:1e:8a:a0:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:f7:4d:cf:bd:c9:37:5b:7f:0f:e2:1a:ce:a1:00:0a: a9:e9:c7:5a:11:cc:96:21:32:73:59:b8:b8:65:3c:d8: ad:1c:ff:11:14:a8:c4:b0:22:b3:a0:db:c3:64:a0:0b: 28:9d:ac:3a:43:87:87:0d:95:da:11:a1:7b:66:44:d2: 10:3e:b9:51:58:a3:63:9e:d3:ce:77:0f:5e:ca:9a:4c: ce:2c:ef:b8:74:d2:ce:bd:8a:f8:fd:73:28:83:18:8d: 36:ae:e6:85:e6:7c:b8:5c:52:4d:2d:5d:92:a3:de:a5: 38:07:ae:2e:33:96:09:4f:a0:d2:d4:7a:77:74:f7:92: 4d:02:7b:c0:74:22:66:52:87:40:15:42:c4:95:23:d7: 87:e4:ee:7e:65:2f:8f:23:61:3f:f3:11:e4:32:75:cf: 0f:00:8a:6c:73:cb:14:c2:79:af:4f:1a:f2:c2:37:e4: f2:9b:4c:bf:f8:d4:f6:84:0f:1e:9e:48:3c:3d:6e:0e: d9:73:c0:8d:48:bc:be:2a:27:73:70:89:1b:a5:45:09: 0c:46:cf:d4:50:b5:96:d6:7d:fe:f1:a1:c8:77:0a:32: 06:15:b0:94:82:0a:a4:b9:82:12:bc:01:a2:3a:93:5b: ed:41:8b:79:5b:90:ba:d9:0c:d2:28:0f:c7:3c:ad:53 Fingerprint (SHA-256): 32:48:7C:7A:56:31:E2:B6:AC:50:25:C7:EC:EC:72:C7:A4:0D:32:03:5F:E8:C7:C0:55:AE:47:12:03:9F:A1:E7 Fingerprint (SHA1): 86:9E:C1:27:3C:07:11:30:A4:CE:2A:37:20:4A:3B:DB:BD:D8:25:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1597: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194574 (0x433ee20e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:18 2025 Not After : Thu Nov 28 11:47:18 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:20:5d:89:ec:fb:ad:6e:f7:57:cd:a9:02:d7:32:6d: e2:12:bf:71:fd:cc:a3:e7:4e:a4:b5:53:2c:d6:18:7b: d8:30:9e:f3:51:3d:43:55:10:99:d9:cf:c6:0b:29:31: 5c:da:27:f6:c9:ac:1c:45:81:2d:7e:17:a3:0e:a2:93: f4:eb:ae:80:3e:d1:d6:a2:0a:b4:02:48:92:8a:c2:10: ea:de:a0:fe:25:e1:a1:9a:0e:4c:72:cb:99:c9:53:fc: a9:af:0d:59:6c:fb:da:0c:8c:c5:b4:ef:2a:f0:d5:dd: 6f:3f:a8:27:02:a2:19:17:75:42:b2:ea:47:d7:29:2d: cf:2d:2e:e2:8e:6b:0a:0a:8f:03:87:95:44:d8:2e:4b: 15:d4:94:c7:ed:b2:92:20:5f:7d:7b:4a:1d:60:b4:b6: b3:02:ea:b8:30:af:f3:e1:02:be:7c:d4:04:21:c8:c1: ed:23:d6:64:e4:07:5f:04:a0:fe:22:e2:20:49:e4:f7: 19:59:76:d8:8b:3c:96:0e:76:48:0b:76:f8:83:cf:0a: e3:b1:96:89:e9:0b:78:a8:6d:8d:d0:7d:cf:3c:a5:76: 19:ee:a6:51:d9:0d:97:e2:cc:89:36:61:3f:e4:c1:26: e7:95:8b:e1:e3:7b:21:4d:50:b5:a9:38:1e:8a:a0:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:f7:4d:cf:bd:c9:37:5b:7f:0f:e2:1a:ce:a1:00:0a: a9:e9:c7:5a:11:cc:96:21:32:73:59:b8:b8:65:3c:d8: ad:1c:ff:11:14:a8:c4:b0:22:b3:a0:db:c3:64:a0:0b: 28:9d:ac:3a:43:87:87:0d:95:da:11:a1:7b:66:44:d2: 10:3e:b9:51:58:a3:63:9e:d3:ce:77:0f:5e:ca:9a:4c: ce:2c:ef:b8:74:d2:ce:bd:8a:f8:fd:73:28:83:18:8d: 36:ae:e6:85:e6:7c:b8:5c:52:4d:2d:5d:92:a3:de:a5: 38:07:ae:2e:33:96:09:4f:a0:d2:d4:7a:77:74:f7:92: 4d:02:7b:c0:74:22:66:52:87:40:15:42:c4:95:23:d7: 87:e4:ee:7e:65:2f:8f:23:61:3f:f3:11:e4:32:75:cf: 0f:00:8a:6c:73:cb:14:c2:79:af:4f:1a:f2:c2:37:e4: f2:9b:4c:bf:f8:d4:f6:84:0f:1e:9e:48:3c:3d:6e:0e: d9:73:c0:8d:48:bc:be:2a:27:73:70:89:1b:a5:45:09: 0c:46:cf:d4:50:b5:96:d6:7d:fe:f1:a1:c8:77:0a:32: 06:15:b0:94:82:0a:a4:b9:82:12:bc:01:a2:3a:93:5b: ed:41:8b:79:5b:90:ba:d9:0c:d2:28:0f:c7:3c:ad:53 Fingerprint (SHA-256): 32:48:7C:7A:56:31:E2:B6:AC:50:25:C7:EC:EC:72:C7:A4:0D:32:03:5F:E8:C7:C0:55:AE:47:12:03:9F:A1:E7 Fingerprint (SHA1): 86:9E:C1:27:3C:07:11:30:A4:CE:2A:37:20:4A:3B:DB:BD:D8:25:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1598: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1599: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194573 (0x433ee20d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:47:17 2025 Not After : Thu Nov 28 11:47:17 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:06:0e:4d:73:1e:dd:6c:75:9c:c0:a0:2a:f3:58:8d: 62:e9:73:1d:9e:59:79:0b:29:ce:77:03:28:5f:9e:df: e6:07:85:0a:cf:62:d3:e2:7c:23:75:da:d4:de:9f:9b: f8:5f:57:35:3b:1c:14:cb:0d:9d:7a:53:15:83:b4:aa: 19:c2:8e:9f:d5:f1:58:e6:f3:fd:b2:5d:5e:a2:86:bf: 89:2c:79:b9:71:a5:f9:43:c1:ed:25:04:8a:99:34:02: 8f:70:03:67:a4:36:58:8b:da:30:61:a4:51:ce:56:1a: 38:6a:3c:c4:32:85:78:ea:f4:3d:40:95:8d:b7:c9:4c: 7a:f4:9f:85:d0:0e:49:ab:ce:e1:4f:19:42:05:30:6c: 94:dc:a4:dc:c1:bc:82:ca:9d:9e:2c:6b:03:6b:fc:e1: bf:20:bc:2a:70:15:ee:cf:f9:21:58:c3:06:b5:2c:c0: ad:c4:df:3d:31:a4:85:42:10:12:37:2f:6e:dc:47:ab: 99:43:ad:f4:b4:45:75:1d:be:b0:89:be:5e:fb:6c:18: 64:26:d2:59:ed:1e:fe:d4:e8:f6:cb:a3:1b:9d:67:22: e9:1b:f9:63:e8:43:01:70:43:07:22:6f:ac:d9:7f:c6: e7:52:b2:90:b0:f1:81:f9:c5:69:a8:5e:84:a6:76:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:e7:c0:39:a6:25:3d:75:a2:c6:b9:a4:26:ce:c5:1b: 52:00:4d:ea:ae:da:86:89:74:02:8a:3e:4b:58:8f:ae: 7e:18:1c:4a:89:e4:89:b5:fd:78:b4:77:69:ad:86:06: dd:68:eb:18:9f:3c:dd:88:8c:de:1c:ac:c1:4c:e0:ac: 1c:0a:d3:58:10:e3:78:b7:c0:bd:6f:07:17:0e:1b:ce: be:85:50:db:3f:12:21:a1:5d:38:ea:c1:be:02:72:72: 0f:8a:6c:ec:74:67:0b:34:10:7c:6c:23:87:49:74:56: 1f:2b:04:95:08:b0:db:38:ed:c5:11:01:28:33:a3:22: ea:6d:5d:73:54:ca:97:a7:13:5b:82:b8:29:c6:34:6b: a1:f8:af:9b:d7:c7:7d:a4:2a:46:86:bb:55:a5:b5:27: 62:a8:e9:41:f4:25:e5:fe:d9:69:4a:49:fe:ca:9a:ef: 9a:30:72:ea:ed:b8:73:12:3a:00:58:3e:ad:75:6d:f4: 21:3e:03:31:a7:5a:49:37:02:e1:b7:ce:27:d9:eb:2d: b4:81:f9:b1:85:30:11:fd:9c:22:5e:83:ea:a6:92:22: 01:b6:44:c5:14:a3:3a:c7:ee:52:bb:9b:64:19:a8:1d: f2:af:ee:c2:d4:52:ba:f7:14:65:1b:03:06:81:0f:26 Fingerprint (SHA-256): 48:CA:4F:58:8F:1B:76:46:4D:FE:24:37:41:C2:46:1F:91:43:69:A7:64:AC:C0:FC:57:1D:38:E7:07:25:BD:0D Fingerprint (SHA1): 2D:64:B2:02:2D:EC:E5:2A:40:1F:7B:A0:1B:20:3F:CF:B7:40:8C:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1600: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194574 (0x433ee20e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:18 2025 Not After : Thu Nov 28 11:47:18 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:20:5d:89:ec:fb:ad:6e:f7:57:cd:a9:02:d7:32:6d: e2:12:bf:71:fd:cc:a3:e7:4e:a4:b5:53:2c:d6:18:7b: d8:30:9e:f3:51:3d:43:55:10:99:d9:cf:c6:0b:29:31: 5c:da:27:f6:c9:ac:1c:45:81:2d:7e:17:a3:0e:a2:93: f4:eb:ae:80:3e:d1:d6:a2:0a:b4:02:48:92:8a:c2:10: ea:de:a0:fe:25:e1:a1:9a:0e:4c:72:cb:99:c9:53:fc: a9:af:0d:59:6c:fb:da:0c:8c:c5:b4:ef:2a:f0:d5:dd: 6f:3f:a8:27:02:a2:19:17:75:42:b2:ea:47:d7:29:2d: cf:2d:2e:e2:8e:6b:0a:0a:8f:03:87:95:44:d8:2e:4b: 15:d4:94:c7:ed:b2:92:20:5f:7d:7b:4a:1d:60:b4:b6: b3:02:ea:b8:30:af:f3:e1:02:be:7c:d4:04:21:c8:c1: ed:23:d6:64:e4:07:5f:04:a0:fe:22:e2:20:49:e4:f7: 19:59:76:d8:8b:3c:96:0e:76:48:0b:76:f8:83:cf:0a: e3:b1:96:89:e9:0b:78:a8:6d:8d:d0:7d:cf:3c:a5:76: 19:ee:a6:51:d9:0d:97:e2:cc:89:36:61:3f:e4:c1:26: e7:95:8b:e1:e3:7b:21:4d:50:b5:a9:38:1e:8a:a0:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:f7:4d:cf:bd:c9:37:5b:7f:0f:e2:1a:ce:a1:00:0a: a9:e9:c7:5a:11:cc:96:21:32:73:59:b8:b8:65:3c:d8: ad:1c:ff:11:14:a8:c4:b0:22:b3:a0:db:c3:64:a0:0b: 28:9d:ac:3a:43:87:87:0d:95:da:11:a1:7b:66:44:d2: 10:3e:b9:51:58:a3:63:9e:d3:ce:77:0f:5e:ca:9a:4c: ce:2c:ef:b8:74:d2:ce:bd:8a:f8:fd:73:28:83:18:8d: 36:ae:e6:85:e6:7c:b8:5c:52:4d:2d:5d:92:a3:de:a5: 38:07:ae:2e:33:96:09:4f:a0:d2:d4:7a:77:74:f7:92: 4d:02:7b:c0:74:22:66:52:87:40:15:42:c4:95:23:d7: 87:e4:ee:7e:65:2f:8f:23:61:3f:f3:11:e4:32:75:cf: 0f:00:8a:6c:73:cb:14:c2:79:af:4f:1a:f2:c2:37:e4: f2:9b:4c:bf:f8:d4:f6:84:0f:1e:9e:48:3c:3d:6e:0e: d9:73:c0:8d:48:bc:be:2a:27:73:70:89:1b:a5:45:09: 0c:46:cf:d4:50:b5:96:d6:7d:fe:f1:a1:c8:77:0a:32: 06:15:b0:94:82:0a:a4:b9:82:12:bc:01:a2:3a:93:5b: ed:41:8b:79:5b:90:ba:d9:0c:d2:28:0f:c7:3c:ad:53 Fingerprint (SHA-256): 32:48:7C:7A:56:31:E2:B6:AC:50:25:C7:EC:EC:72:C7:A4:0D:32:03:5F:E8:C7:C0:55:AE:47:12:03:9F:A1:E7 Fingerprint (SHA1): 86:9E:C1:27:3C:07:11:30:A4:CE:2A:37:20:4A:3B:DB:BD:D8:25:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1601: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194574 (0x433ee20e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:18 2025 Not After : Thu Nov 28 11:47:18 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:20:5d:89:ec:fb:ad:6e:f7:57:cd:a9:02:d7:32:6d: e2:12:bf:71:fd:cc:a3:e7:4e:a4:b5:53:2c:d6:18:7b: d8:30:9e:f3:51:3d:43:55:10:99:d9:cf:c6:0b:29:31: 5c:da:27:f6:c9:ac:1c:45:81:2d:7e:17:a3:0e:a2:93: f4:eb:ae:80:3e:d1:d6:a2:0a:b4:02:48:92:8a:c2:10: ea:de:a0:fe:25:e1:a1:9a:0e:4c:72:cb:99:c9:53:fc: a9:af:0d:59:6c:fb:da:0c:8c:c5:b4:ef:2a:f0:d5:dd: 6f:3f:a8:27:02:a2:19:17:75:42:b2:ea:47:d7:29:2d: cf:2d:2e:e2:8e:6b:0a:0a:8f:03:87:95:44:d8:2e:4b: 15:d4:94:c7:ed:b2:92:20:5f:7d:7b:4a:1d:60:b4:b6: b3:02:ea:b8:30:af:f3:e1:02:be:7c:d4:04:21:c8:c1: ed:23:d6:64:e4:07:5f:04:a0:fe:22:e2:20:49:e4:f7: 19:59:76:d8:8b:3c:96:0e:76:48:0b:76:f8:83:cf:0a: e3:b1:96:89:e9:0b:78:a8:6d:8d:d0:7d:cf:3c:a5:76: 19:ee:a6:51:d9:0d:97:e2:cc:89:36:61:3f:e4:c1:26: e7:95:8b:e1:e3:7b:21:4d:50:b5:a9:38:1e:8a:a0:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:f7:4d:cf:bd:c9:37:5b:7f:0f:e2:1a:ce:a1:00:0a: a9:e9:c7:5a:11:cc:96:21:32:73:59:b8:b8:65:3c:d8: ad:1c:ff:11:14:a8:c4:b0:22:b3:a0:db:c3:64:a0:0b: 28:9d:ac:3a:43:87:87:0d:95:da:11:a1:7b:66:44:d2: 10:3e:b9:51:58:a3:63:9e:d3:ce:77:0f:5e:ca:9a:4c: ce:2c:ef:b8:74:d2:ce:bd:8a:f8:fd:73:28:83:18:8d: 36:ae:e6:85:e6:7c:b8:5c:52:4d:2d:5d:92:a3:de:a5: 38:07:ae:2e:33:96:09:4f:a0:d2:d4:7a:77:74:f7:92: 4d:02:7b:c0:74:22:66:52:87:40:15:42:c4:95:23:d7: 87:e4:ee:7e:65:2f:8f:23:61:3f:f3:11:e4:32:75:cf: 0f:00:8a:6c:73:cb:14:c2:79:af:4f:1a:f2:c2:37:e4: f2:9b:4c:bf:f8:d4:f6:84:0f:1e:9e:48:3c:3d:6e:0e: d9:73:c0:8d:48:bc:be:2a:27:73:70:89:1b:a5:45:09: 0c:46:cf:d4:50:b5:96:d6:7d:fe:f1:a1:c8:77:0a:32: 06:15:b0:94:82:0a:a4:b9:82:12:bc:01:a2:3a:93:5b: ed:41:8b:79:5b:90:ba:d9:0c:d2:28:0f:c7:3c:ad:53 Fingerprint (SHA-256): 32:48:7C:7A:56:31:E2:B6:AC:50:25:C7:EC:EC:72:C7:A4:0D:32:03:5F:E8:C7:C0:55:AE:47:12:03:9F:A1:E7 Fingerprint (SHA1): 86:9E:C1:27:3C:07:11:30:A4:CE:2A:37:20:4A:3B:DB:BD:D8:25:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1602: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194581 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194582 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128194583 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128194584 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128194585 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128194586 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194587 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1628: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1629: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194588 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1630: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1631: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1632: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1633: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194589 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1634: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1635: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1636: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1637: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194590 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1638: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1639: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194581 (0x433ee215) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:47:22 2025 Not After : Thu Nov 28 11:47:22 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:f4:67:dd:a1:ad:2f:3a:0c:cf:37:17:65:e7:f3:69: 68:c3:ce:92:9f:87:3e:0b:0f:f8:30:4e:83:2f:2e:8d: d9:2e:45:82:2c:99:95:d8:1d:46:83:a8:c6:ed:c9:a5: a4:4a:36:b2:69:66:94:26:df:e6:03:44:5f:3e:c5:7c: 3e:a4:03:b0:f3:d0:18:ae:69:04:cd:1c:3a:22:34:f8: 9f:61:e0:95:2e:11:fd:92:25:49:3e:8c:6d:a3:ae:4f: 09:e7:12:37:cf:c0:b3:a7:34:8f:cb:3e:2e:56:10:eb: 7f:a4:c1:ad:c3:43:1c:26:90:1e:c6:0f:c9:0e:d0:f7: 2a:ef:9c:bd:15:a4:a3:d7:bc:1c:d7:ea:49:21:90:7f: a4:40:d7:bc:8c:bd:49:29:bc:11:d0:90:ef:18:b3:87: 69:32:c1:ff:83:ce:32:b9:c0:9b:5c:8a:aa:fc:63:0b: 3b:d2:62:8e:ca:2d:d0:31:2d:e6:bc:0a:c8:47:d6:b8: 87:d1:f3:70:b8:1a:66:b3:69:f8:22:1c:e0:50:a9:78: c7:73:cd:42:b9:da:68:e4:87:ec:c0:a8:32:8d:e8:5c: 35:a5:ca:1a:4d:54:3e:e9:d4:d3:ab:29:a1:0a:b0:f5: 95:76:74:07:54:8f:64:cf:79:20:1f:7a:a9:ee:30:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:86:75:71:ee:90:2e:20:76:20:b1:dc:47:47:29:84: 25:fe:35:1b:3e:84:48:25:53:39:ff:bd:cf:ea:8b:33: 3b:2f:ea:05:1f:ae:d9:0c:97:50:37:40:e5:dd:a6:8e: a5:6f:bb:0a:95:0c:c4:7e:c2:93:ff:f5:cf:df:46:b3: 32:8a:c9:d1:ab:98:24:e4:72:c0:1c:71:8d:33:4a:47: 08:69:55:af:6d:ce:2d:5f:47:c8:d6:eb:f7:27:50:69: 4d:41:6b:09:32:38:04:5f:3e:71:86:c1:d4:9a:db:09: 0d:7e:ca:23:6d:6f:e5:ea:c4:2f:ec:80:70:65:eb:d9: be:bc:24:a9:aa:5f:23:8a:8b:13:e4:0f:59:af:19:8b: 58:8a:11:e6:6c:fe:df:e9:a1:14:8b:a4:bd:2d:30:5c: 2e:76:ab:3a:ab:be:70:bf:07:60:25:81:a7:10:86:16: 2a:55:a4:64:41:ee:56:eb:e7:2e:1b:71:1d:e7:5a:2c: df:5c:d3:90:14:83:55:56:47:22:7d:91:0e:a5:05:41: cc:fe:14:23:f5:17:7b:6e:92:b7:6b:94:1b:27:b1:60: ee:71:0a:09:d0:83:83:0c:38:ad:9c:3d:f9:90:28:98: 4e:97:0c:cf:69:fa:11:3a:0b:cb:37:4a:dd:fd:5c:b9 Fingerprint (SHA-256): 75:76:73:46:95:2B:6D:DD:28:B3:1B:8A:7E:D9:DB:9A:67:77:46:6F:D4:C0:4E:F4:54:69:8C:4F:19:A7:D6:87 Fingerprint (SHA1): 9D:6A:B0:B0:9D:EE:20:46:EA:99:38:D6:12:66:E6:16:81:A3:54:AA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1641: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1642: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1643: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1644: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1645: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1646: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1647: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1648: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1649: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194582 (0x433ee216) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:47:23 2025 Not After : Thu Nov 28 11:47:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:00:b2:76:8e:d1:fc:71:25:48:e0:7d:24:18:66:e9: 3b:b4:4d:d6:fc:17:ba:32:08:3c:8e:be:e2:a8:ad:d7: 2f:55:eb:30:61:0f:a0:f2:87:94:15:ef:a2:a6:ea:34: 56:ee:f1:b5:44:26:09:39:95:a1:35:51:ac:57:42:04: 47:15:ea:df:fd:13:5b:ee:6b:4b:23:bf:50:32:93:70: a6:8a:4d:24:45:64:72:dc:4e:b1:1e:6b:9a:9b:23:f8: 0f:4f:ee:d8:d9:e7:fb:a0:78:3a:e4:4b:6d:a8:19:07: 03:ea:77:74:da:12:8e:5a:49:e0:76:6a:4e:73:99:d1: 9d:be:38:dc:6d:92:09:2e:64:e8:4b:db:8a:d1:59:97: 94:96:0b:4e:1b:36:21:ac:25:ee:d9:45:f4:e4:55:7a: 73:59:80:43:4f:bd:1b:bf:2f:c2:f6:cb:ae:44:0c:43: dd:ec:9e:9a:83:e9:76:6b:10:8b:ea:bf:80:3a:f8:27: e9:1f:46:69:42:2e:46:50:2b:ef:4a:c2:70:8f:7c:f6: f1:21:7c:c3:4d:51:fa:6f:97:e4:0a:98:c3:a6:f1:48: 80:69:0e:0c:f1:2b:1a:e7:7a:0f:19:ef:5b:77:48:6f: 2b:4b:81:a2:64:c4:b5:3c:3f:22:f5:a3:0a:97:d0:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:aa:d4:c8:8b:fe:65:32:dd:84:94:24:51:7a:a3:51: 35:ea:55:25:20:c2:8f:8d:6b:c0:c1:e4:4a:86:b8:a3: 39:cd:88:80:e4:04:cd:35:98:fd:12:ec:7a:38:57:56: 1f:ae:03:6e:78:dd:e4:1e:89:b4:d7:c9:f9:ef:69:74: 2b:65:a3:da:7e:7b:01:ae:07:1b:04:21:e4:b1:f8:3b: 46:6d:32:3b:56:38:ea:19:c8:3a:84:a9:b2:39:c1:64: 2e:49:98:89:e7:b8:be:5c:eb:21:bb:79:c8:e6:96:87: c9:7e:f0:44:fb:cd:e5:8f:3a:db:39:62:e0:fe:44:0a: 58:54:0d:42:a9:30:cb:01:b0:c3:71:37:63:5c:94:7c: cd:8f:bb:58:3a:61:24:ea:b0:4a:50:5e:5d:56:7b:c7: a2:e3:20:e2:59:41:10:29:45:9a:cc:80:26:94:4c:51: 44:f7:ab:ea:c9:ab:c9:e6:8c:41:00:10:fa:b1:4b:2c: 09:37:74:18:cb:7a:7e:e5:5a:b8:3a:0d:8c:d2:fb:7c: 86:e8:f0:e8:3b:50:74:72:e1:ff:86:25:64:7a:e1:38: 26:f9:d3:fa:57:71:0a:b8:23:1d:92:b9:56:0c:f3:17: 2b:12:14:80:b6:7d:11:9c:c1:6a:94:0f:3b:cd:ba:0a Fingerprint (SHA-256): B2:24:3F:E6:80:E2:00:1A:A4:A6:E9:6E:E0:0F:97:06:7B:B2:1D:28:B1:82:57:61:FC:2B:06:AC:0E:A4:00:6B Fingerprint (SHA1): 30:CC:30:AD:36:7F:B0:11:99:3C:1E:C7:2C:B3:A7:C4:AD:76:F7:DE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1650: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1651: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1652: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1653: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1654: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1655: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1656: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1657: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1658: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1659: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1660: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1661: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1662: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1663: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1664: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1665: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1666: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1667: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1668: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194591 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1669: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1670: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1671: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194592 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1675: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1676: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194593 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1677: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1678: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1679: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1680: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128194594 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1681: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1682: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1683: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194595 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1685: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1687: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128194596 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1689: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1691: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128194597 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1693: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1695: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128194598 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1697: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1699: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128194599 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1701: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1703: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194591 (0x433ee21f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:30 2025 Not After : Thu Nov 28 11:47:30 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 84:d8:b3:4a:10:43:77:8b:2c:b4:c8:8c:68:d3:74:a0: bc:2b:ec:e7:61:92:0b:2a:69:22:95:07:9f:01:cf:38: 2b:95:cd:21:cc:de:af:4c:23:56:52:7f:f1:6d:f4:0e: 29:73:ba:4f:c4:b8:b7:05:15:10:ca:92:ee:d7:18:b7: 3b:61:36:e7:7a:73:14:0e:7d:31:66:0f:4f:6b:dd:98: ef:0c:e9:22:cd:79:1f:34:dd:59:dd:11:ef:9a:b5:6a: fd:8d:e5:57:0b:42:dd:38:95:11:33:8f:b5:22:71:07: 32:70:3c:3b:3f:88:23:97:ce:57:9c:fe:97:ab:aa:33: 61:51:ff:04:1f:98:e8:d5:a2:c2:93:cc:6c:93:31:9c: cd:03:e8:fa:95:ca:a7:c8:6c:8d:c5:6e:c4:fe:09:a2: 70:92:5c:c9:da:ab:a3:77:ab:23:03:17:3a:d0:93:c4: 02:9a:3e:ff:4c:b7:f0:98:43:f7:e6:cd:5e:02:f0:28: c5:5a:c3:97:40:a2:b1:c6:8e:45:5f:d3:2d:92:9f:20: c3:7e:7e:ca:d9:e2:fb:21:d3:6b:de:c2:c3:f1:26:4b: 70:70:71:4c:8e:06:78:3e:0b:89:8a:21:23:54:6f:57: 3d:d4:66:92:8f:5e:41:62:91:d6:9b:81:30:48:c2:94 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:35:6a:32:49:11:2d:fe:09:1c:ea:71:0e: 42:15:f3:db:17:16:96:ed:45:d8:b9:85:6a:a0:1f:53: 02:1c:0d:57:89:06:4a:8f:4c:c3:ad:2a:d0:d7:5a:77: 9c:a8:6b:32:ed:06:49:af:97:c0:b6:0a:56:cf Fingerprint (SHA-256): 12:5B:1C:FB:EA:E4:D1:38:28:F3:42:77:AF:F5:9C:1A:EB:1E:E5:C3:AD:12:99:1E:E4:A2:4A:9D:40:2F:84:04 Fingerprint (SHA1): A0:F8:FE:D7:3B:2B:B6:E9:EE:EB:A5:0D:8E:44:10:87:BA:75:0D:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1704: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194591 (0x433ee21f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:30 2025 Not After : Thu Nov 28 11:47:30 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 84:d8:b3:4a:10:43:77:8b:2c:b4:c8:8c:68:d3:74:a0: bc:2b:ec:e7:61:92:0b:2a:69:22:95:07:9f:01:cf:38: 2b:95:cd:21:cc:de:af:4c:23:56:52:7f:f1:6d:f4:0e: 29:73:ba:4f:c4:b8:b7:05:15:10:ca:92:ee:d7:18:b7: 3b:61:36:e7:7a:73:14:0e:7d:31:66:0f:4f:6b:dd:98: ef:0c:e9:22:cd:79:1f:34:dd:59:dd:11:ef:9a:b5:6a: fd:8d:e5:57:0b:42:dd:38:95:11:33:8f:b5:22:71:07: 32:70:3c:3b:3f:88:23:97:ce:57:9c:fe:97:ab:aa:33: 61:51:ff:04:1f:98:e8:d5:a2:c2:93:cc:6c:93:31:9c: cd:03:e8:fa:95:ca:a7:c8:6c:8d:c5:6e:c4:fe:09:a2: 70:92:5c:c9:da:ab:a3:77:ab:23:03:17:3a:d0:93:c4: 02:9a:3e:ff:4c:b7:f0:98:43:f7:e6:cd:5e:02:f0:28: c5:5a:c3:97:40:a2:b1:c6:8e:45:5f:d3:2d:92:9f:20: c3:7e:7e:ca:d9:e2:fb:21:d3:6b:de:c2:c3:f1:26:4b: 70:70:71:4c:8e:06:78:3e:0b:89:8a:21:23:54:6f:57: 3d:d4:66:92:8f:5e:41:62:91:d6:9b:81:30:48:c2:94 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:35:6a:32:49:11:2d:fe:09:1c:ea:71:0e: 42:15:f3:db:17:16:96:ed:45:d8:b9:85:6a:a0:1f:53: 02:1c:0d:57:89:06:4a:8f:4c:c3:ad:2a:d0:d7:5a:77: 9c:a8:6b:32:ed:06:49:af:97:c0:b6:0a:56:cf Fingerprint (SHA-256): 12:5B:1C:FB:EA:E4:D1:38:28:F3:42:77:AF:F5:9C:1A:EB:1E:E5:C3:AD:12:99:1E:E4:A2:4A:9D:40:2F:84:04 Fingerprint (SHA1): A0:F8:FE:D7:3B:2B:B6:E9:EE:EB:A5:0D:8E:44:10:87:BA:75:0D:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1705: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194591 (0x433ee21f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:30 2025 Not After : Thu Nov 28 11:47:30 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 84:d8:b3:4a:10:43:77:8b:2c:b4:c8:8c:68:d3:74:a0: bc:2b:ec:e7:61:92:0b:2a:69:22:95:07:9f:01:cf:38: 2b:95:cd:21:cc:de:af:4c:23:56:52:7f:f1:6d:f4:0e: 29:73:ba:4f:c4:b8:b7:05:15:10:ca:92:ee:d7:18:b7: 3b:61:36:e7:7a:73:14:0e:7d:31:66:0f:4f:6b:dd:98: ef:0c:e9:22:cd:79:1f:34:dd:59:dd:11:ef:9a:b5:6a: fd:8d:e5:57:0b:42:dd:38:95:11:33:8f:b5:22:71:07: 32:70:3c:3b:3f:88:23:97:ce:57:9c:fe:97:ab:aa:33: 61:51:ff:04:1f:98:e8:d5:a2:c2:93:cc:6c:93:31:9c: cd:03:e8:fa:95:ca:a7:c8:6c:8d:c5:6e:c4:fe:09:a2: 70:92:5c:c9:da:ab:a3:77:ab:23:03:17:3a:d0:93:c4: 02:9a:3e:ff:4c:b7:f0:98:43:f7:e6:cd:5e:02:f0:28: c5:5a:c3:97:40:a2:b1:c6:8e:45:5f:d3:2d:92:9f:20: c3:7e:7e:ca:d9:e2:fb:21:d3:6b:de:c2:c3:f1:26:4b: 70:70:71:4c:8e:06:78:3e:0b:89:8a:21:23:54:6f:57: 3d:d4:66:92:8f:5e:41:62:91:d6:9b:81:30:48:c2:94 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:35:6a:32:49:11:2d:fe:09:1c:ea:71:0e: 42:15:f3:db:17:16:96:ed:45:d8:b9:85:6a:a0:1f:53: 02:1c:0d:57:89:06:4a:8f:4c:c3:ad:2a:d0:d7:5a:77: 9c:a8:6b:32:ed:06:49:af:97:c0:b6:0a:56:cf Fingerprint (SHA-256): 12:5B:1C:FB:EA:E4:D1:38:28:F3:42:77:AF:F5:9C:1A:EB:1E:E5:C3:AD:12:99:1E:E4:A2:4A:9D:40:2F:84:04 Fingerprint (SHA1): A0:F8:FE:D7:3B:2B:B6:E9:EE:EB:A5:0D:8E:44:10:87:BA:75:0D:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1706: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194591 (0x433ee21f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:30 2025 Not After : Thu Nov 28 11:47:30 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 84:d8:b3:4a:10:43:77:8b:2c:b4:c8:8c:68:d3:74:a0: bc:2b:ec:e7:61:92:0b:2a:69:22:95:07:9f:01:cf:38: 2b:95:cd:21:cc:de:af:4c:23:56:52:7f:f1:6d:f4:0e: 29:73:ba:4f:c4:b8:b7:05:15:10:ca:92:ee:d7:18:b7: 3b:61:36:e7:7a:73:14:0e:7d:31:66:0f:4f:6b:dd:98: ef:0c:e9:22:cd:79:1f:34:dd:59:dd:11:ef:9a:b5:6a: fd:8d:e5:57:0b:42:dd:38:95:11:33:8f:b5:22:71:07: 32:70:3c:3b:3f:88:23:97:ce:57:9c:fe:97:ab:aa:33: 61:51:ff:04:1f:98:e8:d5:a2:c2:93:cc:6c:93:31:9c: cd:03:e8:fa:95:ca:a7:c8:6c:8d:c5:6e:c4:fe:09:a2: 70:92:5c:c9:da:ab:a3:77:ab:23:03:17:3a:d0:93:c4: 02:9a:3e:ff:4c:b7:f0:98:43:f7:e6:cd:5e:02:f0:28: c5:5a:c3:97:40:a2:b1:c6:8e:45:5f:d3:2d:92:9f:20: c3:7e:7e:ca:d9:e2:fb:21:d3:6b:de:c2:c3:f1:26:4b: 70:70:71:4c:8e:06:78:3e:0b:89:8a:21:23:54:6f:57: 3d:d4:66:92:8f:5e:41:62:91:d6:9b:81:30:48:c2:94 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:35:6a:32:49:11:2d:fe:09:1c:ea:71:0e: 42:15:f3:db:17:16:96:ed:45:d8:b9:85:6a:a0:1f:53: 02:1c:0d:57:89:06:4a:8f:4c:c3:ad:2a:d0:d7:5a:77: 9c:a8:6b:32:ed:06:49:af:97:c0:b6:0a:56:cf Fingerprint (SHA-256): 12:5B:1C:FB:EA:E4:D1:38:28:F3:42:77:AF:F5:9C:1A:EB:1E:E5:C3:AD:12:99:1E:E4:A2:4A:9D:40:2F:84:04 Fingerprint (SHA1): A0:F8:FE:D7:3B:2B:B6:E9:EE:EB:A5:0D:8E:44:10:87:BA:75:0D:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1707: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1708: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1709: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1710: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1711: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1712: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1713: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1715: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1716: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1717: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1719: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1720: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1721: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1722: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1723: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1724: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1725: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1726: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1727: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1728: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1729: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1730: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1731: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1732: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1733: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1734: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128114742Z nextupdate=20261128114742Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:47:42 2025 Next Update: Sat Nov 28 11:47:42 2026 CRL Extensions: chains.sh: #1735: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114742Z nextupdate=20261128114742Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:47:42 2025 Next Update: Sat Nov 28 11:47:42 2026 CRL Extensions: chains.sh: #1736: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114742Z nextupdate=20261128114742Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:47:42 2025 Next Update: Sat Nov 28 11:47:42 2026 CRL Extensions: chains.sh: #1737: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128114742Z nextupdate=20261128114742Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:47:42 2025 Next Update: Sat Nov 28 11:47:42 2026 CRL Extensions: chains.sh: #1738: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114743Z addcert 14 20251128114743Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:47:43 2025 Next Update: Sat Nov 28 11:47:42 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:47:43 2025 CRL Extensions: chains.sh: #1739: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114744Z addcert 15 20251128114744Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:47:44 2025 Next Update: Sat Nov 28 11:47:42 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:47:44 2025 CRL Extensions: chains.sh: #1740: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1741: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1742: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1743: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1744: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1745: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1746: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1747: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1748: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1749: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:37 2025 Not After : Thu Nov 28 11:47:37 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:9e:e4:dc:96:3e:bf:d3:cd:66:fe:9e:12:f6:0e:6a: 51:97:2d:b7:5b:55:4e:dc:86:ce:a9:f4:7a:df:47:d2: 2c:0f:4f:0d:9c:f1:e1:25:c9:ca:27:26:8d:c7:da:37: 5c:dc:6d:31:88:f7:d8:32:05:3e:f2:f4:40:9f:b5:43: da:21:5a:8c:01:c9:7c:26:63:35:99:b4:d7:39:9c:6d: 93:62:d0:dc:05:64:92:c0:1e:66:2f:7b:03:08:12:ff: a8:37:86:04:e1:00:cf:1e:00:0a:e8:e6:2a:81:d6:2c: 17:e1:9b:d9:15:53:ba:b7:ea:1e:d8:c1:4e:fb:a5:a2: dd:5a:d4:d4:ed:a9:02:99:73:99:7b:a1:c6:32:6b:58: f1:ae:fc:6e:01:a9:1b:5f:29:e3:f3:8d:e6:f5:f3:a8: 4e:b0:9c:54:ce:12:d6:b2:05:14:37:ab:1e:a5:43:46: da:80:ec:57:9a:5e:07:fb:c8:88:00:80:c6:74:a6:0d: 99:ec:52:ee:73:fe:d5:a0:f0:1e:74:e5:cb:0f:1f:ca: 09:c9:48:57:90:26:8b:b8:a2:f3:5b:f4:8c:a4:15:ed: d0:be:e4:0d:00:37:d3:92:8e:9b:d4:09:6f:6f:6d:fe: 5b:8d:0c:1a:bf:30:8a:cc:6a:fb:ed:22:39:a8:15:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:96:5e:61:e8:89:d7:2f:bc:2d:46:d1:02:34:30:fc: 25:4a:bf:90:84:69:f7:ad:2e:e6:92:de:0e:b3:1c:01: 3e:21:fe:fd:29:a3:a3:a5:4c:f1:cb:77:53:46:3d:62: 9d:eb:37:ee:d3:d1:4f:00:2d:64:3f:1d:f9:68:60:c1: 5d:1a:f7:9b:9d:89:00:8d:9f:08:40:8c:31:8c:36:78: 6a:0c:d1:c1:5f:9c:8b:76:44:1d:ed:ff:c2:18:9e:75: 3a:d7:ee:9f:45:69:07:0d:6c:cf:f0:45:13:78:65:d6: c8:d1:e6:62:ee:9f:e4:01:37:5b:54:77:e7:c0:4d:e3: 92:14:b3:c5:c7:47:30:ab:1f:78:f1:8d:90:ed:3f:da: 99:ae:d1:9f:1a:5e:2d:70:9c:55:d7:b9:77:d7:88:f2: 93:fd:ac:d7:59:17:43:5e:dd:30:87:18:4d:dc:61:1e: eb:28:f0:40:1b:2f:bd:20:2d:05:15:0b:42:b2:ed:6b: 47:a5:5f:27:4d:49:8b:cb:60:4b:ea:da:04:1c:e9:b4: 60:f1:bf:0e:16:24:cc:45:ce:91:31:4e:6a:f6:4a:43: ae:29:cb:c6:78:0b:69:a6:9f:d5:01:47:30:c6:ce:dd: 8f:0a:91:e7:a9:bc:36:48:b4:a5:0a:cb:a0:4a:e1:e0 Fingerprint (SHA-256): 8D:80:88:7A:FF:BD:B9:CC:86:B8:F9:B0:6C:AC:9A:FE:56:38:02:0E:04:00:14:3D:42:A9:DE:AA:CC:AD:2E:9B Fingerprint (SHA1): E7:A5:2C:BE:89:8F:ED:84:69:9A:21:50:12:67:3A:46:BC:2E:D2:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1750: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1751: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:37 2025 Not After : Thu Nov 28 11:47:37 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:9e:e4:dc:96:3e:bf:d3:cd:66:fe:9e:12:f6:0e:6a: 51:97:2d:b7:5b:55:4e:dc:86:ce:a9:f4:7a:df:47:d2: 2c:0f:4f:0d:9c:f1:e1:25:c9:ca:27:26:8d:c7:da:37: 5c:dc:6d:31:88:f7:d8:32:05:3e:f2:f4:40:9f:b5:43: da:21:5a:8c:01:c9:7c:26:63:35:99:b4:d7:39:9c:6d: 93:62:d0:dc:05:64:92:c0:1e:66:2f:7b:03:08:12:ff: a8:37:86:04:e1:00:cf:1e:00:0a:e8:e6:2a:81:d6:2c: 17:e1:9b:d9:15:53:ba:b7:ea:1e:d8:c1:4e:fb:a5:a2: dd:5a:d4:d4:ed:a9:02:99:73:99:7b:a1:c6:32:6b:58: f1:ae:fc:6e:01:a9:1b:5f:29:e3:f3:8d:e6:f5:f3:a8: 4e:b0:9c:54:ce:12:d6:b2:05:14:37:ab:1e:a5:43:46: da:80:ec:57:9a:5e:07:fb:c8:88:00:80:c6:74:a6:0d: 99:ec:52:ee:73:fe:d5:a0:f0:1e:74:e5:cb:0f:1f:ca: 09:c9:48:57:90:26:8b:b8:a2:f3:5b:f4:8c:a4:15:ed: d0:be:e4:0d:00:37:d3:92:8e:9b:d4:09:6f:6f:6d:fe: 5b:8d:0c:1a:bf:30:8a:cc:6a:fb:ed:22:39:a8:15:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:96:5e:61:e8:89:d7:2f:bc:2d:46:d1:02:34:30:fc: 25:4a:bf:90:84:69:f7:ad:2e:e6:92:de:0e:b3:1c:01: 3e:21:fe:fd:29:a3:a3:a5:4c:f1:cb:77:53:46:3d:62: 9d:eb:37:ee:d3:d1:4f:00:2d:64:3f:1d:f9:68:60:c1: 5d:1a:f7:9b:9d:89:00:8d:9f:08:40:8c:31:8c:36:78: 6a:0c:d1:c1:5f:9c:8b:76:44:1d:ed:ff:c2:18:9e:75: 3a:d7:ee:9f:45:69:07:0d:6c:cf:f0:45:13:78:65:d6: c8:d1:e6:62:ee:9f:e4:01:37:5b:54:77:e7:c0:4d:e3: 92:14:b3:c5:c7:47:30:ab:1f:78:f1:8d:90:ed:3f:da: 99:ae:d1:9f:1a:5e:2d:70:9c:55:d7:b9:77:d7:88:f2: 93:fd:ac:d7:59:17:43:5e:dd:30:87:18:4d:dc:61:1e: eb:28:f0:40:1b:2f:bd:20:2d:05:15:0b:42:b2:ed:6b: 47:a5:5f:27:4d:49:8b:cb:60:4b:ea:da:04:1c:e9:b4: 60:f1:bf:0e:16:24:cc:45:ce:91:31:4e:6a:f6:4a:43: ae:29:cb:c6:78:0b:69:a6:9f:d5:01:47:30:c6:ce:dd: 8f:0a:91:e7:a9:bc:36:48:b4:a5:0a:cb:a0:4a:e1:e0 Fingerprint (SHA-256): 8D:80:88:7A:FF:BD:B9:CC:86:B8:F9:B0:6C:AC:9A:FE:56:38:02:0E:04:00:14:3D:42:A9:DE:AA:CC:AD:2E:9B Fingerprint (SHA1): E7:A5:2C:BE:89:8F:ED:84:69:9A:21:50:12:67:3A:46:BC:2E:D2:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1752: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1753: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #1754: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1755: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1756: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #1757: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #1758: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114746Z nextupdate=20261128114746Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:47:46 2025 Next Update: Sat Nov 28 11:47:46 2026 CRL Extensions: chains.sh: #1759: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114747Z addcert 3 20251128114747Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:47:47 2025 Next Update: Sat Nov 28 11:47:46 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:47:47 2025 CRL Extensions: chains.sh: #1760: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114748Z addcert 4 20251128114748Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:47:48 2025 Next Update: Sat Nov 28 11:47:46 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:47:48 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:47:47 2025 CRL Extensions: chains.sh: #1761: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1762: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1763: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1764: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1765: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #1766: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1768: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #1769: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1770: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1771: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1772: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #1773: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1774: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:19 2025 Not After : Thu Nov 28 11:43:19 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d6:f1:0b:25:22:d3:c2:d4:cf:0c:fb:e3:e2:c5:49: d8:b0:f4:46:9b:88:03:6c:64:b1:ea:9b:93:b0:09:04: f1:10:d4:65:75:de:86:ee:4b:e7:2d:85:22:cd:2e:1c: 93:2e:f3:de:f8:d2:8f:ca:3f:1c:2a:ef:d8:85:0d:71: 2b:91:c9:81:80:02:16:42:72:69:23:a7:f7:7d:6d:76: ef:b8:1a:d9:e2:4b:74:7d:95:ef:a1:97:4f:83:47:7f: 7d:9d:87:ec:58:74:10:ed:3e:ea:06:1e:fc:dc:97:d4: dc:35:65:4d:db:01:df:ba:10:7e:36:82:85:be:1e:f5: ee:b3:35:be:5e:f1:2f:1e:a0:05:32:ef:57:42:26:4f: 26:01:14:84:ac:c9:28:80:89:34:57:65:31:4b:15:02: b0:ef:89:e8:e9:52:ee:db:58:21:45:39:fa:d7:9d:8a: 0d:40:69:54:8d:b3:b4:2c:f5:de:93:1b:c4:9b:38:4d: 67:84:1a:f6:08:66:1a:05:ef:0f:04:cb:b2:db:67:9f: 67:4f:c3:15:61:a3:d3:f6:c6:12:83:b1:41:f7:41:ce: 68:fd:32:10:72:1b:f5:95:7e:be:41:cc:b6:95:a9:9b: 1d:c6:82:2e:d5:e0:1b:18:af:95:1f:2b:b3:14:bd:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:8c:b0:32:75:bd:a8:10:ca:5c:cc:23:6a:22:f6:38: 4a:a3:8e:41:36:5a:9f:98:fd:d9:f4:66:30:90:71:71: 11:44:58:ec:56:7d:56:5f:d3:a1:26:b1:a4:56:54:68: 62:a0:61:6d:c5:37:bc:03:82:95:c0:ad:d1:4b:b4:10: 9b:10:87:91:ce:45:c8:25:a1:af:84:bc:21:47:98:8a: 42:11:36:30:f2:01:7e:72:ee:3c:ea:dd:4b:8c:56:b9: 28:25:1f:1d:01:5f:4d:66:6d:ef:c8:b1:88:1d:ab:d7: 5e:df:ef:04:0e:85:ee:fa:7d:45:75:ef:74:da:3f:27: f8:9b:63:e7:e2:72:cd:5a:cd:4c:52:77:45:60:78:99: b2:8b:2a:96:e9:79:0b:7d:d7:2b:1a:84:64:e3:93:6e: 26:fa:82:5e:dc:97:92:3d:3d:bb:ea:d3:72:6e:98:08: 15:2f:1b:24:38:a8:0c:6a:60:e3:e8:07:79:6c:ac:7c: 96:57:b3:ce:5d:d7:4e:5e:63:ff:78:0d:3b:1d:82:b1: 21:ef:63:9d:87:cc:05:6d:af:dc:55:fb:14:e1:4d:03: 36:30:7d:cb:4e:ff:e3:0e:82:19:62:13:67:0d:59:71: af:6c:36:53:95:1f:99:48:07:a3:f8:11:02:9d:5f:0c Fingerprint (SHA-256): 57:EA:58:A2:4D:27:1D:9D:E7:D4:FE:10:EA:06:CC:2B:CC:E8:84:A0:17:40:0A:20:4F:F1:4D:FA:66:7E:87:FE Fingerprint (SHA1): 39:4C:AF:9B:41:9E:A2:BC:8C:F9:B1:11:D9:2E:35:E0:3D:A8:5C:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #1775: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #1776: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1777: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1778: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #1779: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1780: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #1781: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1782: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194600 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1783: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1784: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1785: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1786: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128194601 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1787: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1788: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1789: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194359.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1790: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194330.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1791: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1792: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1793: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194359.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1794: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128194602 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1795: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1796: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1797: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194359.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1798: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194331.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1799: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1800: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1801: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1802: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128194603 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1803: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1804: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1805: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194359.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1806: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194332.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1807: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1808: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1809: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194359.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1810: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194333.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1811: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1812: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128114756Z nextupdate=20261128114756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:47:56 2025 Next Update: Sat Nov 28 11:47:56 2026 CRL Extensions: chains.sh: #1813: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114756Z nextupdate=20261128114756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:47:56 2025 Next Update: Sat Nov 28 11:47:56 2026 CRL Extensions: chains.sh: #1814: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114756Z nextupdate=20261128114756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:47:56 2025 Next Update: Sat Nov 28 11:47:56 2026 CRL Extensions: chains.sh: #1815: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128114756Z nextupdate=20261128114756Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:47:56 2025 Next Update: Sat Nov 28 11:47:56 2026 CRL Extensions: chains.sh: #1816: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114757Z addcert 20 20251128114757Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:47:57 2025 Next Update: Sat Nov 28 11:47:56 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:47:57 2025 CRL Extensions: chains.sh: #1817: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114758Z addcert 40 20251128114758Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:47:58 2025 Next Update: Sat Nov 28 11:47:56 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:47:57 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:47:58 2025 CRL Extensions: chains.sh: #1818: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1819: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1820: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1821: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194600 (0x433ee228) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:51 2025 Not After : Thu Nov 28 11:47:51 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:eb:98:8c:f1:ae:22:fa:69:d3:d8:81:ef:7e:f7:72: c2:22:f8:aa:a2:85:e7:39:84:31:de:c1:f7:6f:bb:c0: 85:08:43:dc:8c:d3:3a:8f:9c:ef:0b:3a:47:4f:92:35: 2e:04:c0:93:98:d5:a2:ca:2f:52:cb:45:f7:f7:80:3d: 00:0e:ff:0b:39:80:bc:d1:10:a1:2b:59:35:b1:6b:20: 24:c5:61:34:75:68:cc:b8:78:ba:c2:b5:08:e6:a2:82: 15:2a:96:78:d3:b8:74:1f:d0:8b:03:79:f2:b8:91:d0: 2b:0a:b3:4a:54:4c:96:b5:90:01:d7:ac:ba:a3:2b:14: a3:7b:e5:33:b6:4c:31:b0:17:f0:cc:31:42:53:6d:55: d4:59:87:f3:4b:b0:1f:ab:c7:b8:d7:8e:6e:71:7c:07: 1b:3e:b4:e6:d5:b1:9e:71:38:20:51:09:6c:dd:fb:1a: b1:09:08:22:45:74:9e:e1:bb:26:56:48:d0:b5:38:0d: f7:3f:fa:b5:7f:04:47:a6:ff:4d:0e:5e:d2:84:fd:54: 31:7c:9f:8d:4f:34:0e:b4:93:72:ce:26:9c:1a:47:3e: e8:ba:2d:ce:95:b8:ac:56:34:a1:d2:33:5a:44:25:73: b1:c1:22:ff:f9:9b:e5:22:7e:3d:5e:a6:36:d4:ea:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:4f:09:14:9e:eb:91:92:21:fb:0a:c7:e0:e5:63:d1: 5f:60:d5:9c:97:d7:d0:76:73:94:05:68:a2:4f:d9:63: 33:b0:c7:2d:a8:e4:ed:05:70:d1:7e:51:af:5c:b8:87: 24:8e:71:a6:ff:de:a4:7b:1b:77:54:cf:a2:69:89:20: 33:4c:f0:65:a4:74:31:2a:52:89:77:8f:1b:7b:dc:5e: b0:96:6f:37:76:41:9f:82:83:d0:11:91:7f:4e:74:d6: 15:74:8c:c4:db:9b:6f:45:29:8a:5e:22:f6:7f:bf:ff: 53:38:ea:a9:75:be:20:c8:5d:e6:24:ee:5a:66:57:b3: 28:de:ff:d8:5c:0b:b1:bd:61:26:54:c1:17:29:b2:48: 8c:93:3d:17:f4:a3:57:4d:16:6d:a8:0b:62:d7:76:27: a0:7c:ec:f2:1b:35:63:66:d7:de:8f:75:95:54:7a:47: 8d:af:41:4e:08:88:6c:89:70:bc:fb:aa:c6:a7:cc:34: 37:f4:3b:09:34:07:0d:a1:8c:cc:28:d4:fe:e0:0e:50: 3a:16:da:83:42:fc:4f:4f:d2:03:b9:bc:c1:b9:c0:8b: d8:45:92:21:90:71:e3:26:65:f2:01:67:b3:0a:bd:64: 24:b6:49:61:4e:6f:fd:35:5c:2c:43:15:e4:f1:37:90 Fingerprint (SHA-256): 62:F3:5A:28:44:B6:00:D2:83:E8:5C:3B:0D:71:F5:5D:3C:32:90:35:17:C1:3A:7C:88:0F:11:94:06:DE:38:DE Fingerprint (SHA1): 5F:86:C0:88:6E:67:B5:2B:2C:CC:B9:F0:18:D9:41:F9:8D:E7:A6:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1822: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1823: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194600 (0x433ee228) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:47:51 2025 Not After : Thu Nov 28 11:47:51 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:eb:98:8c:f1:ae:22:fa:69:d3:d8:81:ef:7e:f7:72: c2:22:f8:aa:a2:85:e7:39:84:31:de:c1:f7:6f:bb:c0: 85:08:43:dc:8c:d3:3a:8f:9c:ef:0b:3a:47:4f:92:35: 2e:04:c0:93:98:d5:a2:ca:2f:52:cb:45:f7:f7:80:3d: 00:0e:ff:0b:39:80:bc:d1:10:a1:2b:59:35:b1:6b:20: 24:c5:61:34:75:68:cc:b8:78:ba:c2:b5:08:e6:a2:82: 15:2a:96:78:d3:b8:74:1f:d0:8b:03:79:f2:b8:91:d0: 2b:0a:b3:4a:54:4c:96:b5:90:01:d7:ac:ba:a3:2b:14: a3:7b:e5:33:b6:4c:31:b0:17:f0:cc:31:42:53:6d:55: d4:59:87:f3:4b:b0:1f:ab:c7:b8:d7:8e:6e:71:7c:07: 1b:3e:b4:e6:d5:b1:9e:71:38:20:51:09:6c:dd:fb:1a: b1:09:08:22:45:74:9e:e1:bb:26:56:48:d0:b5:38:0d: f7:3f:fa:b5:7f:04:47:a6:ff:4d:0e:5e:d2:84:fd:54: 31:7c:9f:8d:4f:34:0e:b4:93:72:ce:26:9c:1a:47:3e: e8:ba:2d:ce:95:b8:ac:56:34:a1:d2:33:5a:44:25:73: b1:c1:22:ff:f9:9b:e5:22:7e:3d:5e:a6:36:d4:ea:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:4f:09:14:9e:eb:91:92:21:fb:0a:c7:e0:e5:63:d1: 5f:60:d5:9c:97:d7:d0:76:73:94:05:68:a2:4f:d9:63: 33:b0:c7:2d:a8:e4:ed:05:70:d1:7e:51:af:5c:b8:87: 24:8e:71:a6:ff:de:a4:7b:1b:77:54:cf:a2:69:89:20: 33:4c:f0:65:a4:74:31:2a:52:89:77:8f:1b:7b:dc:5e: b0:96:6f:37:76:41:9f:82:83:d0:11:91:7f:4e:74:d6: 15:74:8c:c4:db:9b:6f:45:29:8a:5e:22:f6:7f:bf:ff: 53:38:ea:a9:75:be:20:c8:5d:e6:24:ee:5a:66:57:b3: 28:de:ff:d8:5c:0b:b1:bd:61:26:54:c1:17:29:b2:48: 8c:93:3d:17:f4:a3:57:4d:16:6d:a8:0b:62:d7:76:27: a0:7c:ec:f2:1b:35:63:66:d7:de:8f:75:95:54:7a:47: 8d:af:41:4e:08:88:6c:89:70:bc:fb:aa:c6:a7:cc:34: 37:f4:3b:09:34:07:0d:a1:8c:cc:28:d4:fe:e0:0e:50: 3a:16:da:83:42:fc:4f:4f:d2:03:b9:bc:c1:b9:c0:8b: d8:45:92:21:90:71:e3:26:65:f2:01:67:b3:0a:bd:64: 24:b6:49:61:4e:6f:fd:35:5c:2c:43:15:e4:f1:37:90 Fingerprint (SHA-256): 62:F3:5A:28:44:B6:00:D2:83:E8:5C:3B:0D:71:F5:5D:3C:32:90:35:17:C1:3A:7C:88:0F:11:94:06:DE:38:DE Fingerprint (SHA1): 5F:86:C0:88:6E:67:B5:2B:2C:CC:B9:F0:18:D9:41:F9:8D:E7:A6:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1824: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1825: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1826: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194604 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1827: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1828: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1829: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1830: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194605 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1831: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1832: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1833: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1834: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194606 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1835: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1836: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1837: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1838: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128194607 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1839: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1840: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1841: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194608 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1842: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1843: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1844: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1845: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128194609 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1846: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1847: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1848: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1849: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128194610 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1850: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1851: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1852: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1853: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1854: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194604 (0x433ee22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:47:59 2025 Not After : Thu Nov 28 11:47:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:cb:7b:be:fb:fc:aa:d3:76:70:9e:4d:31:2b:e5:fa: b6:93:13:94:ec:9e:be:af:4e:df:27:5d:b4:ff:b9:84: d3:5f:9d:62:6d:d2:5b:2b:7a:91:15:67:01:21:79:b1: 9e:54:02:24:b5:d6:f5:65:7b:1a:0a:3e:6b:17:f1:91: c5:6d:b2:ab:3d:18:31:f8:f1:11:d5:f4:0d:d3:6c:c5: 9d:7a:b6:39:13:0b:ee:b6:65:3d:0f:3a:87:65:4e:da: 1b:80:80:82:13:da:38:4c:a9:85:64:a6:98:5d:79:66: e0:1a:41:3a:70:99:83:d2:80:9f:fa:25:df:fd:67:e0: 53:ba:93:be:7b:df:09:98:97:fc:17:0e:8d:79:35:b7: df:c3:f4:0a:a3:59:67:fe:21:48:fa:e3:10:c2:9a:eb: c5:61:22:a7:d1:8b:46:19:5e:9a:85:d6:ea:b7:ad:e9: 6f:13:12:71:ae:d7:52:34:fc:de:c3:34:9e:6b:04:5d: 4f:0c:4d:b6:ce:f1:b4:37:bb:35:ed:3b:94:d7:c5:61: b9:7e:39:cf:47:49:bc:0c:94:67:6c:c1:28:f7:bd:ae: e6:56:16:5d:5e:7d:ee:e2:0e:ac:30:1c:28:26:b6:82: 28:50:47:81:53:99:d9:1d:3d:a1:c7:1a:45:7f:81:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:dc:1e:36:8f:97:a9:b1:77:d2:6a:ae:b7:ad:b2: 0f:bd:d2:d6:05:87:3b:59:12:14:10:b4:2a:23:b1:39: 54:1a:c3:ea:0c:dc:4b:d7:b3:88:67:45:92:f9:e7:ee: 50:22:2f:a7:34:bf:26:76:95:ab:e0:c0:41:bc:c1:63: 06:fe:3a:af:fe:e4:c4:75:8b:04:c2:ff:e0:2e:ef:b9: 9e:e6:9f:e0:b1:90:99:c1:36:2b:01:71:45:d2:7c:9b: 92:48:9a:c9:c9:a9:7d:bb:f5:21:94:58:5e:fe:30:bb: 43:96:2c:70:fe:52:a3:39:d7:be:92:d9:d3:6f:31:20: 78:c2:9d:fa:10:1a:cc:c9:ce:6e:d5:46:7e:b0:92:cb: 5b:2b:f2:aa:f5:c6:dd:30:b6:18:c8:f7:5b:1d:77:b4: 1e:6f:ad:60:3a:cd:cb:d6:e4:de:ab:24:2c:d5:a1:ad: 7d:f1:cc:65:91:45:1d:e0:e6:1f:dc:60:5c:7b:f3:1c: 9d:1d:5d:be:a1:9c:0c:bd:ee:2e:19:f4:84:c0:26:1d: 65:1e:f1:b7:4e:f0:34:9d:fd:50:84:02:e5:30:7d:11: c2:6a:b8:f6:7c:b4:f0:a3:67:d3:0e:be:c1:bf:1e:fb: c6:e8:f3:db:78:a9:d9:0a:be:a9:29:0c:7c:98:d3:a1 Fingerprint (SHA-256): F6:60:26:A8:B9:1A:9D:79:F7:C5:80:71:CE:74:79:30:CA:E5:6A:A3:F1:8D:90:14:07:8D:ED:70:8F:AB:09:C6 Fingerprint (SHA1): 5B:FF:5A:0C:A7:0E:28:06:4E:DE:27:6F:6E:3E:9B:F6:FC:D8:0E:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1855: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194606 (0x433ee22e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:00 2025 Not After : Thu Nov 28 11:48:00 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:a2:19:af:4f:f0:df:17:8c:92:b2:75:42:7b:40:f8: 7e:86:57:36:96:ae:bb:73:0d:a1:29:fa:dd:a7:ed:50: 94:70:0d:3c:02:48:e5:86:99:ff:12:6e:7d:70:67:42: cf:7d:cf:51:ea:d8:10:d1:ed:e5:06:54:c1:9c:6c:28: 32:9a:c2:9f:e4:95:d5:18:f5:07:30:e5:eb:90:1f:83: b2:10:ed:f6:e8:d5:aa:07:55:30:cd:4c:62:5f:68:f5: 9d:6f:d4:c0:99:8f:61:87:0f:9a:1c:ad:dd:8b:2e:5e: 53:b2:14:ec:a3:01:e3:bc:6e:97:42:fd:d4:bc:f8:29: 9d:9a:14:8d:db:8c:30:9e:99:ed:01:7e:e7:dd:e1:f4: fa:11:3e:a5:20:95:35:79:3d:76:83:30:62:ee:90:25: b5:c5:34:f2:c4:ff:b4:59:41:d8:4a:05:ec:a8:a3:3c: 1e:bd:19:07:df:08:aa:eb:f3:f0:90:7c:17:31:da:2c: fa:a1:1a:95:9d:20:7b:a2:f8:5e:28:c9:d0:5f:e5:38: 8d:dd:07:76:6a:52:83:ea:32:07:39:1d:67:0f:fb:1f: 94:0c:91:9a:c8:46:ef:ea:51:38:47:07:84:5d:a8:72: 04:06:5a:32:36:8b:06:98:b9:ea:45:b9:1f:d9:7e:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:89:27:b3:25:52:1f:dc:e6:1d:af:fd:7b:ad:db:22: a6:ed:61:01:c7:76:7c:ea:5d:1f:0f:6e:60:15:fc:68: 26:8f:96:95:9c:1d:76:1d:75:48:61:de:bc:e2:1b:4c: c7:44:81:46:ed:18:e5:61:5d:39:ca:40:3f:80:54:86: 8f:ed:9d:b6:5b:87:15:1e:5c:f2:8f:08:62:bd:d6:33: 4a:bb:48:24:4c:c1:65:0c:e9:bd:ad:64:8e:dd:36:fb: 6c:00:ec:a9:d6:63:7f:46:16:d3:61:c5:6e:67:ae:12: cb:84:86:04:a3:af:1e:d0:b6:4a:44:ce:15:fa:27:a5: 8d:b9:6e:ee:4e:52:80:1d:5e:ae:f1:dc:a7:51:0d:a4: 70:bb:10:21:ba:fe:0c:31:79:5a:99:4b:19:06:bd:b6: 11:97:a3:a9:df:38:bf:69:2c:6e:c9:4c:fe:71:b4:70: 37:b9:c0:3d:d8:4a:48:02:c8:71:38:cf:41:f5:05:1a: 90:e4:c7:2e:31:25:17:0f:7d:09:9b:b7:f5:63:e1:fd: 19:7a:f8:e5:b1:d1:57:91:54:61:27:53:b4:a5:f9:16: d1:12:91:8f:83:5c:71:80:80:ff:7e:60:2c:3b:1a:fa: 4d:16:de:66:c9:09:0c:2b:c8:61:55:90:7a:e1:cc:64 Fingerprint (SHA-256): 02:1A:61:C8:75:EC:2A:9C:B3:08:53:E6:15:98:D6:8F:C3:79:32:4E:36:37:AC:99:0C:2C:F4:D8:87:7C:EC:41 Fingerprint (SHA1): 78:9D:22:36:AA:27:D8:97:60:64:D2:0D:54:4E:C8:ED:A6:97:A4:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1856: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194604 (0x433ee22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:47:59 2025 Not After : Thu Nov 28 11:47:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:cb:7b:be:fb:fc:aa:d3:76:70:9e:4d:31:2b:e5:fa: b6:93:13:94:ec:9e:be:af:4e:df:27:5d:b4:ff:b9:84: d3:5f:9d:62:6d:d2:5b:2b:7a:91:15:67:01:21:79:b1: 9e:54:02:24:b5:d6:f5:65:7b:1a:0a:3e:6b:17:f1:91: c5:6d:b2:ab:3d:18:31:f8:f1:11:d5:f4:0d:d3:6c:c5: 9d:7a:b6:39:13:0b:ee:b6:65:3d:0f:3a:87:65:4e:da: 1b:80:80:82:13:da:38:4c:a9:85:64:a6:98:5d:79:66: e0:1a:41:3a:70:99:83:d2:80:9f:fa:25:df:fd:67:e0: 53:ba:93:be:7b:df:09:98:97:fc:17:0e:8d:79:35:b7: df:c3:f4:0a:a3:59:67:fe:21:48:fa:e3:10:c2:9a:eb: c5:61:22:a7:d1:8b:46:19:5e:9a:85:d6:ea:b7:ad:e9: 6f:13:12:71:ae:d7:52:34:fc:de:c3:34:9e:6b:04:5d: 4f:0c:4d:b6:ce:f1:b4:37:bb:35:ed:3b:94:d7:c5:61: b9:7e:39:cf:47:49:bc:0c:94:67:6c:c1:28:f7:bd:ae: e6:56:16:5d:5e:7d:ee:e2:0e:ac:30:1c:28:26:b6:82: 28:50:47:81:53:99:d9:1d:3d:a1:c7:1a:45:7f:81:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:dc:1e:36:8f:97:a9:b1:77:d2:6a:ae:b7:ad:b2: 0f:bd:d2:d6:05:87:3b:59:12:14:10:b4:2a:23:b1:39: 54:1a:c3:ea:0c:dc:4b:d7:b3:88:67:45:92:f9:e7:ee: 50:22:2f:a7:34:bf:26:76:95:ab:e0:c0:41:bc:c1:63: 06:fe:3a:af:fe:e4:c4:75:8b:04:c2:ff:e0:2e:ef:b9: 9e:e6:9f:e0:b1:90:99:c1:36:2b:01:71:45:d2:7c:9b: 92:48:9a:c9:c9:a9:7d:bb:f5:21:94:58:5e:fe:30:bb: 43:96:2c:70:fe:52:a3:39:d7:be:92:d9:d3:6f:31:20: 78:c2:9d:fa:10:1a:cc:c9:ce:6e:d5:46:7e:b0:92:cb: 5b:2b:f2:aa:f5:c6:dd:30:b6:18:c8:f7:5b:1d:77:b4: 1e:6f:ad:60:3a:cd:cb:d6:e4:de:ab:24:2c:d5:a1:ad: 7d:f1:cc:65:91:45:1d:e0:e6:1f:dc:60:5c:7b:f3:1c: 9d:1d:5d:be:a1:9c:0c:bd:ee:2e:19:f4:84:c0:26:1d: 65:1e:f1:b7:4e:f0:34:9d:fd:50:84:02:e5:30:7d:11: c2:6a:b8:f6:7c:b4:f0:a3:67:d3:0e:be:c1:bf:1e:fb: c6:e8:f3:db:78:a9:d9:0a:be:a9:29:0c:7c:98:d3:a1 Fingerprint (SHA-256): F6:60:26:A8:B9:1A:9D:79:F7:C5:80:71:CE:74:79:30:CA:E5:6A:A3:F1:8D:90:14:07:8D:ED:70:8F:AB:09:C6 Fingerprint (SHA1): 5B:FF:5A:0C:A7:0E:28:06:4E:DE:27:6F:6E:3E:9B:F6:FC:D8:0E:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1857: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1858: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194604 (0x433ee22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:47:59 2025 Not After : Thu Nov 28 11:47:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:cb:7b:be:fb:fc:aa:d3:76:70:9e:4d:31:2b:e5:fa: b6:93:13:94:ec:9e:be:af:4e:df:27:5d:b4:ff:b9:84: d3:5f:9d:62:6d:d2:5b:2b:7a:91:15:67:01:21:79:b1: 9e:54:02:24:b5:d6:f5:65:7b:1a:0a:3e:6b:17:f1:91: c5:6d:b2:ab:3d:18:31:f8:f1:11:d5:f4:0d:d3:6c:c5: 9d:7a:b6:39:13:0b:ee:b6:65:3d:0f:3a:87:65:4e:da: 1b:80:80:82:13:da:38:4c:a9:85:64:a6:98:5d:79:66: e0:1a:41:3a:70:99:83:d2:80:9f:fa:25:df:fd:67:e0: 53:ba:93:be:7b:df:09:98:97:fc:17:0e:8d:79:35:b7: df:c3:f4:0a:a3:59:67:fe:21:48:fa:e3:10:c2:9a:eb: c5:61:22:a7:d1:8b:46:19:5e:9a:85:d6:ea:b7:ad:e9: 6f:13:12:71:ae:d7:52:34:fc:de:c3:34:9e:6b:04:5d: 4f:0c:4d:b6:ce:f1:b4:37:bb:35:ed:3b:94:d7:c5:61: b9:7e:39:cf:47:49:bc:0c:94:67:6c:c1:28:f7:bd:ae: e6:56:16:5d:5e:7d:ee:e2:0e:ac:30:1c:28:26:b6:82: 28:50:47:81:53:99:d9:1d:3d:a1:c7:1a:45:7f:81:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:dc:1e:36:8f:97:a9:b1:77:d2:6a:ae:b7:ad:b2: 0f:bd:d2:d6:05:87:3b:59:12:14:10:b4:2a:23:b1:39: 54:1a:c3:ea:0c:dc:4b:d7:b3:88:67:45:92:f9:e7:ee: 50:22:2f:a7:34:bf:26:76:95:ab:e0:c0:41:bc:c1:63: 06:fe:3a:af:fe:e4:c4:75:8b:04:c2:ff:e0:2e:ef:b9: 9e:e6:9f:e0:b1:90:99:c1:36:2b:01:71:45:d2:7c:9b: 92:48:9a:c9:c9:a9:7d:bb:f5:21:94:58:5e:fe:30:bb: 43:96:2c:70:fe:52:a3:39:d7:be:92:d9:d3:6f:31:20: 78:c2:9d:fa:10:1a:cc:c9:ce:6e:d5:46:7e:b0:92:cb: 5b:2b:f2:aa:f5:c6:dd:30:b6:18:c8:f7:5b:1d:77:b4: 1e:6f:ad:60:3a:cd:cb:d6:e4:de:ab:24:2c:d5:a1:ad: 7d:f1:cc:65:91:45:1d:e0:e6:1f:dc:60:5c:7b:f3:1c: 9d:1d:5d:be:a1:9c:0c:bd:ee:2e:19:f4:84:c0:26:1d: 65:1e:f1:b7:4e:f0:34:9d:fd:50:84:02:e5:30:7d:11: c2:6a:b8:f6:7c:b4:f0:a3:67:d3:0e:be:c1:bf:1e:fb: c6:e8:f3:db:78:a9:d9:0a:be:a9:29:0c:7c:98:d3:a1 Fingerprint (SHA-256): F6:60:26:A8:B9:1A:9D:79:F7:C5:80:71:CE:74:79:30:CA:E5:6A:A3:F1:8D:90:14:07:8D:ED:70:8F:AB:09:C6 Fingerprint (SHA1): 5B:FF:5A:0C:A7:0E:28:06:4E:DE:27:6F:6E:3E:9B:F6:FC:D8:0E:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1859: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194606 (0x433ee22e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:00 2025 Not After : Thu Nov 28 11:48:00 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:a2:19:af:4f:f0:df:17:8c:92:b2:75:42:7b:40:f8: 7e:86:57:36:96:ae:bb:73:0d:a1:29:fa:dd:a7:ed:50: 94:70:0d:3c:02:48:e5:86:99:ff:12:6e:7d:70:67:42: cf:7d:cf:51:ea:d8:10:d1:ed:e5:06:54:c1:9c:6c:28: 32:9a:c2:9f:e4:95:d5:18:f5:07:30:e5:eb:90:1f:83: b2:10:ed:f6:e8:d5:aa:07:55:30:cd:4c:62:5f:68:f5: 9d:6f:d4:c0:99:8f:61:87:0f:9a:1c:ad:dd:8b:2e:5e: 53:b2:14:ec:a3:01:e3:bc:6e:97:42:fd:d4:bc:f8:29: 9d:9a:14:8d:db:8c:30:9e:99:ed:01:7e:e7:dd:e1:f4: fa:11:3e:a5:20:95:35:79:3d:76:83:30:62:ee:90:25: b5:c5:34:f2:c4:ff:b4:59:41:d8:4a:05:ec:a8:a3:3c: 1e:bd:19:07:df:08:aa:eb:f3:f0:90:7c:17:31:da:2c: fa:a1:1a:95:9d:20:7b:a2:f8:5e:28:c9:d0:5f:e5:38: 8d:dd:07:76:6a:52:83:ea:32:07:39:1d:67:0f:fb:1f: 94:0c:91:9a:c8:46:ef:ea:51:38:47:07:84:5d:a8:72: 04:06:5a:32:36:8b:06:98:b9:ea:45:b9:1f:d9:7e:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:89:27:b3:25:52:1f:dc:e6:1d:af:fd:7b:ad:db:22: a6:ed:61:01:c7:76:7c:ea:5d:1f:0f:6e:60:15:fc:68: 26:8f:96:95:9c:1d:76:1d:75:48:61:de:bc:e2:1b:4c: c7:44:81:46:ed:18:e5:61:5d:39:ca:40:3f:80:54:86: 8f:ed:9d:b6:5b:87:15:1e:5c:f2:8f:08:62:bd:d6:33: 4a:bb:48:24:4c:c1:65:0c:e9:bd:ad:64:8e:dd:36:fb: 6c:00:ec:a9:d6:63:7f:46:16:d3:61:c5:6e:67:ae:12: cb:84:86:04:a3:af:1e:d0:b6:4a:44:ce:15:fa:27:a5: 8d:b9:6e:ee:4e:52:80:1d:5e:ae:f1:dc:a7:51:0d:a4: 70:bb:10:21:ba:fe:0c:31:79:5a:99:4b:19:06:bd:b6: 11:97:a3:a9:df:38:bf:69:2c:6e:c9:4c:fe:71:b4:70: 37:b9:c0:3d:d8:4a:48:02:c8:71:38:cf:41:f5:05:1a: 90:e4:c7:2e:31:25:17:0f:7d:09:9b:b7:f5:63:e1:fd: 19:7a:f8:e5:b1:d1:57:91:54:61:27:53:b4:a5:f9:16: d1:12:91:8f:83:5c:71:80:80:ff:7e:60:2c:3b:1a:fa: 4d:16:de:66:c9:09:0c:2b:c8:61:55:90:7a:e1:cc:64 Fingerprint (SHA-256): 02:1A:61:C8:75:EC:2A:9C:B3:08:53:E6:15:98:D6:8F:C3:79:32:4E:36:37:AC:99:0C:2C:F4:D8:87:7C:EC:41 Fingerprint (SHA1): 78:9D:22:36:AA:27:D8:97:60:64:D2:0D:54:4E:C8:ED:A6:97:A4:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1860: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1861: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1862: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1863: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194604 (0x433ee22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:47:59 2025 Not After : Thu Nov 28 11:47:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:cb:7b:be:fb:fc:aa:d3:76:70:9e:4d:31:2b:e5:fa: b6:93:13:94:ec:9e:be:af:4e:df:27:5d:b4:ff:b9:84: d3:5f:9d:62:6d:d2:5b:2b:7a:91:15:67:01:21:79:b1: 9e:54:02:24:b5:d6:f5:65:7b:1a:0a:3e:6b:17:f1:91: c5:6d:b2:ab:3d:18:31:f8:f1:11:d5:f4:0d:d3:6c:c5: 9d:7a:b6:39:13:0b:ee:b6:65:3d:0f:3a:87:65:4e:da: 1b:80:80:82:13:da:38:4c:a9:85:64:a6:98:5d:79:66: e0:1a:41:3a:70:99:83:d2:80:9f:fa:25:df:fd:67:e0: 53:ba:93:be:7b:df:09:98:97:fc:17:0e:8d:79:35:b7: df:c3:f4:0a:a3:59:67:fe:21:48:fa:e3:10:c2:9a:eb: c5:61:22:a7:d1:8b:46:19:5e:9a:85:d6:ea:b7:ad:e9: 6f:13:12:71:ae:d7:52:34:fc:de:c3:34:9e:6b:04:5d: 4f:0c:4d:b6:ce:f1:b4:37:bb:35:ed:3b:94:d7:c5:61: b9:7e:39:cf:47:49:bc:0c:94:67:6c:c1:28:f7:bd:ae: e6:56:16:5d:5e:7d:ee:e2:0e:ac:30:1c:28:26:b6:82: 28:50:47:81:53:99:d9:1d:3d:a1:c7:1a:45:7f:81:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:dc:1e:36:8f:97:a9:b1:77:d2:6a:ae:b7:ad:b2: 0f:bd:d2:d6:05:87:3b:59:12:14:10:b4:2a:23:b1:39: 54:1a:c3:ea:0c:dc:4b:d7:b3:88:67:45:92:f9:e7:ee: 50:22:2f:a7:34:bf:26:76:95:ab:e0:c0:41:bc:c1:63: 06:fe:3a:af:fe:e4:c4:75:8b:04:c2:ff:e0:2e:ef:b9: 9e:e6:9f:e0:b1:90:99:c1:36:2b:01:71:45:d2:7c:9b: 92:48:9a:c9:c9:a9:7d:bb:f5:21:94:58:5e:fe:30:bb: 43:96:2c:70:fe:52:a3:39:d7:be:92:d9:d3:6f:31:20: 78:c2:9d:fa:10:1a:cc:c9:ce:6e:d5:46:7e:b0:92:cb: 5b:2b:f2:aa:f5:c6:dd:30:b6:18:c8:f7:5b:1d:77:b4: 1e:6f:ad:60:3a:cd:cb:d6:e4:de:ab:24:2c:d5:a1:ad: 7d:f1:cc:65:91:45:1d:e0:e6:1f:dc:60:5c:7b:f3:1c: 9d:1d:5d:be:a1:9c:0c:bd:ee:2e:19:f4:84:c0:26:1d: 65:1e:f1:b7:4e:f0:34:9d:fd:50:84:02:e5:30:7d:11: c2:6a:b8:f6:7c:b4:f0:a3:67:d3:0e:be:c1:bf:1e:fb: c6:e8:f3:db:78:a9:d9:0a:be:a9:29:0c:7c:98:d3:a1 Fingerprint (SHA-256): F6:60:26:A8:B9:1A:9D:79:F7:C5:80:71:CE:74:79:30:CA:E5:6A:A3:F1:8D:90:14:07:8D:ED:70:8F:AB:09:C6 Fingerprint (SHA1): 5B:FF:5A:0C:A7:0E:28:06:4E:DE:27:6F:6E:3E:9B:F6:FC:D8:0E:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1864: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194608 (0x433ee230) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:48:01 2025 Not After : Thu Nov 28 11:48:01 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4f:f3:13:3b:3f:9d:32:08:9f:8e:8f:b2:a8:e4:a7: f8:0d:47:0e:b5:8b:d1:3c:72:a7:d1:ab:82:63:c6:f5: dd:1a:73:c4:e8:08:cd:ba:c1:1e:cc:60:49:08:ef:fc: 1d:63:da:7c:7d:80:f3:dc:9e:00:22:82:1f:69:01:e5: 15:08:0a:a0:f6:39:07:0e:4c:2b:a3:1f:f1:1e:44:d6: 83:95:6c:78:68:9d:1b:86:ed:5d:18:e1:86:24:48:14: 1b:a7:60:a3:62:cf:56:72:d0:36:3f:cb:e1:66:6c:82: 9b:9d:c3:d4:d6:d2:e3:e1:14:63:7b:a3:0b:01:13:c0: c4:7b:3b:d4:05:59:c7:9f:3b:6d:c3:d6:13:9f:c6:23: c6:3b:f6:75:5f:5c:c8:b3:bb:84:50:df:96:40:48:63: 17:d9:94:e7:13:ed:5a:6f:f5:53:06:4b:6b:44:42:2c: 5b:31:5b:55:13:9c:73:df:7b:6b:cd:6a:95:6e:ec:40: 24:66:a4:dd:2e:89:0a:9d:72:9c:53:9d:f7:c5:7b:95: bc:8e:73:1b:66:75:de:5a:d4:02:67:98:1d:53:50:9a: 4f:97:3b:2d:e9:b3:a1:74:56:d9:26:3f:2d:88:aa:8e: 56:1e:76:a2:9e:7d:b7:39:d3:96:dd:64:74:c5:38:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:b0:12:44:f6:ea:cd:d2:15:da:19:d4:67:fb:51:9c: 09:f4:62:ba:92:22:dc:04:ba:9a:98:d6:d2:5d:a2:82: 66:a1:55:7c:32:6c:ab:4e:05:9b:5d:53:88:9b:91:ee: 28:a8:fd:81:70:02:12:53:6f:10:cb:6e:e7:75:9f:3e: 34:46:44:8d:cd:ce:7e:01:a4:a6:fd:2e:06:bf:7f:98: 15:84:fd:fc:ca:e9:ba:22:dd:32:e8:2b:6b:35:77:82: 68:ba:ef:af:d7:75:92:35:ef:b6:b0:2d:7a:7b:d1:df: 4b:34:e3:0b:50:72:ff:9d:26:0c:37:91:cd:22:03:e5: be:ec:43:87:0b:13:7c:21:5c:d4:1a:68:8e:b4:7e:a2: d6:ef:48:18:80:7d:c5:ca:6e:5a:14:20:27:67:4d:d1: 81:70:62:dd:69:9a:40:1d:09:53:a6:30:b0:ec:62:57: 24:53:ca:3d:6c:f1:19:a8:a8:e1:81:f2:a4:1b:67:b0: fc:5f:68:20:d7:51:42:39:f1:1e:d1:53:86:68:9e:6b: ab:e6:fa:35:fc:1a:54:f2:18:d6:c9:1a:b2:cb:5f:bc: 02:79:6b:b0:bd:05:90:bf:bb:84:84:c0:03:a3:84:d2: 12:55:b3:5d:b5:6d:98:1d:15:78:df:bb:10:f2:f0:9c Fingerprint (SHA-256): 2D:D0:6D:6B:18:01:41:E9:8B:A6:0E:09:C5:0E:78:E8:25:F9:75:A2:93:0C:CE:D3:BE:4E:94:52:BD:6B:34:E4 Fingerprint (SHA1): E2:FE:36:0F:E9:4B:24:F0:A0:C7:61:18:CD:D3:54:E3:E9:05:71:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1865: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194604 (0x433ee22c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:47:59 2025 Not After : Thu Nov 28 11:47:59 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:cb:7b:be:fb:fc:aa:d3:76:70:9e:4d:31:2b:e5:fa: b6:93:13:94:ec:9e:be:af:4e:df:27:5d:b4:ff:b9:84: d3:5f:9d:62:6d:d2:5b:2b:7a:91:15:67:01:21:79:b1: 9e:54:02:24:b5:d6:f5:65:7b:1a:0a:3e:6b:17:f1:91: c5:6d:b2:ab:3d:18:31:f8:f1:11:d5:f4:0d:d3:6c:c5: 9d:7a:b6:39:13:0b:ee:b6:65:3d:0f:3a:87:65:4e:da: 1b:80:80:82:13:da:38:4c:a9:85:64:a6:98:5d:79:66: e0:1a:41:3a:70:99:83:d2:80:9f:fa:25:df:fd:67:e0: 53:ba:93:be:7b:df:09:98:97:fc:17:0e:8d:79:35:b7: df:c3:f4:0a:a3:59:67:fe:21:48:fa:e3:10:c2:9a:eb: c5:61:22:a7:d1:8b:46:19:5e:9a:85:d6:ea:b7:ad:e9: 6f:13:12:71:ae:d7:52:34:fc:de:c3:34:9e:6b:04:5d: 4f:0c:4d:b6:ce:f1:b4:37:bb:35:ed:3b:94:d7:c5:61: b9:7e:39:cf:47:49:bc:0c:94:67:6c:c1:28:f7:bd:ae: e6:56:16:5d:5e:7d:ee:e2:0e:ac:30:1c:28:26:b6:82: 28:50:47:81:53:99:d9:1d:3d:a1:c7:1a:45:7f:81:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:7a:dc:1e:36:8f:97:a9:b1:77:d2:6a:ae:b7:ad:b2: 0f:bd:d2:d6:05:87:3b:59:12:14:10:b4:2a:23:b1:39: 54:1a:c3:ea:0c:dc:4b:d7:b3:88:67:45:92:f9:e7:ee: 50:22:2f:a7:34:bf:26:76:95:ab:e0:c0:41:bc:c1:63: 06:fe:3a:af:fe:e4:c4:75:8b:04:c2:ff:e0:2e:ef:b9: 9e:e6:9f:e0:b1:90:99:c1:36:2b:01:71:45:d2:7c:9b: 92:48:9a:c9:c9:a9:7d:bb:f5:21:94:58:5e:fe:30:bb: 43:96:2c:70:fe:52:a3:39:d7:be:92:d9:d3:6f:31:20: 78:c2:9d:fa:10:1a:cc:c9:ce:6e:d5:46:7e:b0:92:cb: 5b:2b:f2:aa:f5:c6:dd:30:b6:18:c8:f7:5b:1d:77:b4: 1e:6f:ad:60:3a:cd:cb:d6:e4:de:ab:24:2c:d5:a1:ad: 7d:f1:cc:65:91:45:1d:e0:e6:1f:dc:60:5c:7b:f3:1c: 9d:1d:5d:be:a1:9c:0c:bd:ee:2e:19:f4:84:c0:26:1d: 65:1e:f1:b7:4e:f0:34:9d:fd:50:84:02:e5:30:7d:11: c2:6a:b8:f6:7c:b4:f0:a3:67:d3:0e:be:c1:bf:1e:fb: c6:e8:f3:db:78:a9:d9:0a:be:a9:29:0c:7c:98:d3:a1 Fingerprint (SHA-256): F6:60:26:A8:B9:1A:9D:79:F7:C5:80:71:CE:74:79:30:CA:E5:6A:A3:F1:8D:90:14:07:8D:ED:70:8F:AB:09:C6 Fingerprint (SHA1): 5B:FF:5A:0C:A7:0E:28:06:4E:DE:27:6F:6E:3E:9B:F6:FC:D8:0E:F5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1866: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1867: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1868: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1869: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1870: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1871: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194609 (0x433ee231) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:48:02 2025 Not After : Thu Nov 28 11:48:02 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:7b:71:d6:9e:77:ce:59:3c:82:4c:af:ba:13:42:46: fd:eb:65:7c:c9:d2:4b:50:d2:c4:dc:45:40:0e:1a:92: f1:f1:35:28:df:c5:75:50:69:ed:5c:68:cf:c9:02:d5: 66:ec:15:54:5f:c8:35:4d:74:c4:8f:c7:13:4d:a4:10: 17:f7:34:77:68:76:84:0d:89:85:f3:fc:b8:87:f4:32: f0:b4:31:af:35:c7:07:0b:2e:6c:f3:31:0d:c2:58:04: dd:47:ee:40:1b:aa:fa:86:99:b4:d8:a5:f9:99:35:a8: 74:e0:50:af:9a:3c:2d:52:5b:38:10:ed:1c:81:77:78: 14:fc:10:10:c3:f1:84:6a:79:e2:8b:ee:b7:fe:a0:b5: 68:f3:04:cf:88:3f:79:08:f0:64:81:92:9c:ba:29:e9: 7f:52:63:dc:87:80:ef:eb:7b:63:87:05:0d:fc:67:5a: cf:06:7d:69:a6:5c:0e:17:31:49:78:60:02:28:da:55: ee:a3:43:0a:6f:18:2c:e3:59:ec:e7:ae:49:3c:d7:44: f0:93:9c:b0:de:13:d9:42:66:5f:b7:51:f1:28:9a:ab: 51:e9:21:9a:bf:f7:2d:65:bd:a3:30:ef:64:78:ba:7f: 7e:a9:aa:7c:b0:09:b7:6e:4f:ec:6e:f2:58:af:81:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:a9:36:94:54:ea:0e:b3:48:bd:ad:0a:9c:0a:87:89: 9a:48:29:1b:8e:f9:ac:07:1a:6e:47:85:0e:bd:c8:24: 11:b3:3f:54:39:db:02:4d:73:2f:8d:e6:91:53:a0:d5: ad:cf:12:03:02:10:eb:a4:f6:b1:f9:1f:a8:8b:49:ee: ec:25:1b:56:8d:3f:96:0a:f6:1f:a1:60:b6:bd:84:23: 29:c9:e3:fe:b7:bc:fd:76:b1:e0:cc:e4:bb:95:a0:9f: 0c:88:99:67:4b:83:2b:04:8e:9a:29:14:3c:8c:9f:a2: 7c:a0:e8:db:11:cb:c0:50:fc:35:09:a0:08:88:ae:c4: 6a:df:26:56:4a:95:19:9c:94:61:02:04:e2:8f:0c:0b: 36:a2:c6:6e:ce:e7:b8:29:30:c3:f1:2a:79:33:8e:09: 13:9a:56:0c:45:73:30:43:b2:9c:c5:31:fe:f7:b3:eb: 42:da:9d:52:04:24:44:66:0c:42:d8:fc:07:fb:94:35: 7e:7b:59:57:9a:13:c3:2e:e7:57:ea:6e:57:be:72:28: ec:50:da:bb:69:c8:e8:05:d0:71:74:10:81:09:37:d0: c3:f5:e0:32:03:35:0c:5d:76:49:df:07:f4:fb:a5:d0: 11:8f:47:aa:0c:66:fc:3f:c3:b9:db:a2:12:22:82:5c Fingerprint (SHA-256): CE:63:75:21:A7:40:55:C0:A7:F0:7E:49:EC:3B:57:7A:5B:88:C9:F4:91:E1:25:9A:3E:98:9F:AE:43:87:C2:2D Fingerprint (SHA1): 58:9C:0D:91:54:B6:FB:21:97:C9:5D:29:A1:C0:80:A4:84:94:08:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1872: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1873: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1874: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1875: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1876: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1877: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1878: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1879: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1880: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1881: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1882: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1883: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1884: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1885: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1886: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1887: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1888: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #1889: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1890: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1891: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1892: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1893: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1894: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1895: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1896: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1897: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2321533 at Fri Nov 28 19:48:06 CST 2025 kill -USR1 2321533 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2321533 killed at Fri Nov 28 19:48:06 CST 2025 httpserv starting at Fri Nov 28 19:48:06 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:48:06 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2334131 >/dev/null 2>/dev/null httpserv with PID 2334131 found at Fri Nov 28 19:48:06 CST 2025 httpserv with PID 2334131 started at Fri Nov 28 19:48:06 CST 2025 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1898: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1899: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194611 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1900: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1901: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1902: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194612 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1903: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1904: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1905: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1906: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194613 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1907: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1908: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194614 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1909: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1910: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1911: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1912: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1913: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128194615 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1914: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1915: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1916: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1917: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1918: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194612 (0x433ee234) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:07:3b:99:69:99:14:4d:4b:31:8f:86:3a:da:4d:fe: 11:76:cf:bd:fe:2e:c3:60:08:ed:dc:17:f5:c3:57:0e: 40:ae:b2:3d:8a:55:f8:d8:ad:5f:e2:ed:9f:da:ce:93: 4b:6f:cf:64:a8:65:3d:53:31:95:fe:a0:1b:1e:b0:ff: 88:f2:bd:d3:98:ed:62:dd:3e:cc:0d:0d:07:af:ac:07: 6e:54:02:c8:b1:bb:9d:87:82:31:9a:79:4f:ee:a8:f3: 95:2b:f5:c6:08:32:68:42:40:e7:97:7e:1f:03:2d:34: 19:98:1d:9b:fa:77:f6:63:f2:cf:67:e0:ee:d9:19:69: 58:c7:dd:77:8e:51:99:fc:57:0e:a9:ad:8f:1a:a6:ba: ac:1c:da:d8:5b:24:af:c6:93:33:e0:6a:d9:7c:af:3b: 8f:c4:9d:03:02:9f:d1:e1:df:47:05:fc:d5:a2:ce:85: 97:26:ac:33:3f:31:72:9f:4d:3b:1b:e4:58:2a:b6:1f: ac:96:8c:1d:49:b1:c2:d2:e7:55:d0:95:d5:11:de:c5: 46:81:16:bc:a0:42:46:0c:14:79:e6:92:3f:ce:bc:00: 9f:25:d3:ab:b7:4c:34:3b:f7:32:d8:83:c5:b8:e8:7a: 8f:26:da:0d:42:ee:fe:6a:35:b8:81:92:c2:56:d3:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:a0:7b:a2:3a:ee:14:49:be:6f:81:fd:ec:ea:82:f7: 30:87:ac:2f:a4:1c:54:57:b5:1d:4c:20:6f:01:3b:3d: 24:d4:71:b5:58:ca:70:06:86:7e:01:d3:49:10:85:8b: 75:b6:e7:c3:b7:d7:20:66:2e:4c:d8:64:45:0d:3e:72: 89:81:b5:48:54:be:92:9d:5f:a8:75:9a:78:c1:9b:b2: 65:c2:b0:64:7f:9d:de:b6:03:89:a3:74:42:0a:78:cb: 58:f9:2f:3e:0c:d7:ba:46:ff:1a:4c:05:46:b0:f9:91: 35:bd:5f:04:a2:c3:56:e3:b7:68:80:64:b1:9c:09:3c: 2b:64:e5:52:9f:8c:a0:4b:3f:80:3f:ee:60:f3:14:e4: 6c:f6:56:d8:3c:6f:cf:0b:d6:01:75:68:d7:bc:cf:c6: 01:39:71:ee:af:42:5f:3a:f3:d0:dd:f6:72:9c:72:d2: 1e:33:9f:73:26:15:d1:42:44:7b:fb:2d:ed:89:3b:77: c8:b1:30:97:b2:22:9b:78:ef:7f:f5:1d:23:f1:21:a0: ad:48:7e:7f:ee:c1:a2:2d:90:a4:c6:44:e5:1f:c7:39: d3:36:b8:9a:e7:1b:8d:03:1a:54:8e:20:f0:d4:08:06: 1d:f9:bc:16:08:05:89:7d:49:57:69:24:5e:04:cb:25 Fingerprint (SHA-256): 1F:85:F9:D1:2F:9C:8B:2B:D0:97:14:A1:34:42:87:81:87:A7:E6:4C:A4:3D:0F:2C:26:15:2C:D1:49:C1:5F:5E Fingerprint (SHA1): 3C:9B:AD:33:0C:A3:2A:9A:99:23:F9:F7:35:6B:E7:73:4F:29:29:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1919: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194611 (0x433ee233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e4:c4:3f:54:fb:7e:d6:d9:cd:ef:c9:76:bf:c5:45: 04:9c:9a:15:0b:67:9d:d2:7e:b0:38:8d:0a:92:53:b4: 80:e7:b8:ee:de:c6:1a:57:6e:bf:c8:ee:52:0e:6d:ee: 72:00:41:78:72:8c:6f:13:36:e1:19:32:65:66:94:ea: b4:e5:a3:f0:a0:57:e3:12:14:47:6a:97:5a:d2:0f:b9: 77:3f:fa:4b:b6:bf:b5:71:f9:75:61:66:20:66:7e:91: 63:e6:0c:01:0b:52:05:81:32:b9:95:bf:a9:b7:9a:66: 11:80:c8:b2:09:a6:c4:13:c7:47:66:e4:f6:ca:33:e8: 4c:e8:5c:bf:f2:0f:53:66:af:95:2c:5a:1f:09:e3:80: 19:59:58:52:6e:aa:63:3f:a7:35:3d:50:7d:4b:1b:de: c9:e8:00:fa:37:6b:e0:1f:5c:60:00:4a:50:5e:50:e2: 62:24:0d:6f:9e:1e:89:7b:69:7b:b8:0b:ae:e6:08:a8: f3:68:45:0e:3d:c5:61:9d:53:ca:64:81:5a:23:96:fc: 7c:31:cf:fb:40:d3:71:2d:3d:8d:18:07:6a:86:1f:c6: 77:70:54:a1:e0:33:bc:f1:53:7a:01:25:09:3d:0d:9a: 34:0d:52:b2:d5:3d:62:48:48:0f:1b:ad:1d:5e:78:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:29:ec:0a:42:fd:73:ff:d1:7b:30:86:01:50:d9:c1: 7e:21:2d:17:c3:5b:c8:ea:94:a2:0c:7c:f3:5d:d4:59: 9e:65:26:6e:47:88:16:15:5d:00:a1:ee:58:e4:06:ec: 8f:45:f8:8c:45:a7:30:45:50:16:e8:dc:c5:39:f9:7b: d8:36:35:ba:5f:4a:99:5f:7d:cb:93:24:d8:63:bf:57: 65:1f:61:c7:18:c5:5f:2f:d0:66:c9:64:96:00:8b:b9: ff:21:ee:f2:62:39:00:85:2e:22:56:4e:5d:f7:d1:a8: 69:e4:63:af:60:89:c8:55:ae:97:ae:30:39:75:ce:10: 58:db:b5:c7:05:95:11:83:41:08:11:06:1d:14:ff:15: 8e:ef:57:df:66:81:f4:b1:ee:6b:8e:b9:f3:15:28:d2: 9b:3f:65:16:fc:12:e4:04:7a:9f:82:e9:17:ca:f2:55: 30:70:7e:00:97:f5:5f:e2:82:b2:d4:35:a1:59:f5:bd: 62:8a:19:86:c3:f5:2b:a8:01:be:40:fe:1e:0f:98:0d: 1a:26:c1:1e:2f:38:a8:5e:f3:57:56:37:93:40:16:b3: de:90:7c:3e:a0:ec:ab:b5:54:0c:56:19:74:e8:e9:ad: 48:6f:a3:9e:0f:38:ef:11:a0:37:21:c6:df:f2:d8:b5 Fingerprint (SHA-256): DC:54:D0:A5:AE:58:45:9B:FE:7D:A5:F4:63:8D:7D:87:19:B0:08:E9:F8:E8:42:62:46:6F:6C:0E:9D:0E:31:F9 Fingerprint (SHA1): B9:25:3C:82:61:2F:EE:C0:07:71:09:12:77:CC:9F:EC:59:F2:49:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1920: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1921: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1922: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1923: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194611 (0x433ee233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e4:c4:3f:54:fb:7e:d6:d9:cd:ef:c9:76:bf:c5:45: 04:9c:9a:15:0b:67:9d:d2:7e:b0:38:8d:0a:92:53:b4: 80:e7:b8:ee:de:c6:1a:57:6e:bf:c8:ee:52:0e:6d:ee: 72:00:41:78:72:8c:6f:13:36:e1:19:32:65:66:94:ea: b4:e5:a3:f0:a0:57:e3:12:14:47:6a:97:5a:d2:0f:b9: 77:3f:fa:4b:b6:bf:b5:71:f9:75:61:66:20:66:7e:91: 63:e6:0c:01:0b:52:05:81:32:b9:95:bf:a9:b7:9a:66: 11:80:c8:b2:09:a6:c4:13:c7:47:66:e4:f6:ca:33:e8: 4c:e8:5c:bf:f2:0f:53:66:af:95:2c:5a:1f:09:e3:80: 19:59:58:52:6e:aa:63:3f:a7:35:3d:50:7d:4b:1b:de: c9:e8:00:fa:37:6b:e0:1f:5c:60:00:4a:50:5e:50:e2: 62:24:0d:6f:9e:1e:89:7b:69:7b:b8:0b:ae:e6:08:a8: f3:68:45:0e:3d:c5:61:9d:53:ca:64:81:5a:23:96:fc: 7c:31:cf:fb:40:d3:71:2d:3d:8d:18:07:6a:86:1f:c6: 77:70:54:a1:e0:33:bc:f1:53:7a:01:25:09:3d:0d:9a: 34:0d:52:b2:d5:3d:62:48:48:0f:1b:ad:1d:5e:78:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:29:ec:0a:42:fd:73:ff:d1:7b:30:86:01:50:d9:c1: 7e:21:2d:17:c3:5b:c8:ea:94:a2:0c:7c:f3:5d:d4:59: 9e:65:26:6e:47:88:16:15:5d:00:a1:ee:58:e4:06:ec: 8f:45:f8:8c:45:a7:30:45:50:16:e8:dc:c5:39:f9:7b: d8:36:35:ba:5f:4a:99:5f:7d:cb:93:24:d8:63:bf:57: 65:1f:61:c7:18:c5:5f:2f:d0:66:c9:64:96:00:8b:b9: ff:21:ee:f2:62:39:00:85:2e:22:56:4e:5d:f7:d1:a8: 69:e4:63:af:60:89:c8:55:ae:97:ae:30:39:75:ce:10: 58:db:b5:c7:05:95:11:83:41:08:11:06:1d:14:ff:15: 8e:ef:57:df:66:81:f4:b1:ee:6b:8e:b9:f3:15:28:d2: 9b:3f:65:16:fc:12:e4:04:7a:9f:82:e9:17:ca:f2:55: 30:70:7e:00:97:f5:5f:e2:82:b2:d4:35:a1:59:f5:bd: 62:8a:19:86:c3:f5:2b:a8:01:be:40:fe:1e:0f:98:0d: 1a:26:c1:1e:2f:38:a8:5e:f3:57:56:37:93:40:16:b3: de:90:7c:3e:a0:ec:ab:b5:54:0c:56:19:74:e8:e9:ad: 48:6f:a3:9e:0f:38:ef:11:a0:37:21:c6:df:f2:d8:b5 Fingerprint (SHA-256): DC:54:D0:A5:AE:58:45:9B:FE:7D:A5:F4:63:8D:7D:87:19:B0:08:E9:F8:E8:42:62:46:6F:6C:0E:9D:0E:31:F9 Fingerprint (SHA1): B9:25:3C:82:61:2F:EE:C0:07:71:09:12:77:CC:9F:EC:59:F2:49:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1924: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194612 (0x433ee234) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:07:3b:99:69:99:14:4d:4b:31:8f:86:3a:da:4d:fe: 11:76:cf:bd:fe:2e:c3:60:08:ed:dc:17:f5:c3:57:0e: 40:ae:b2:3d:8a:55:f8:d8:ad:5f:e2:ed:9f:da:ce:93: 4b:6f:cf:64:a8:65:3d:53:31:95:fe:a0:1b:1e:b0:ff: 88:f2:bd:d3:98:ed:62:dd:3e:cc:0d:0d:07:af:ac:07: 6e:54:02:c8:b1:bb:9d:87:82:31:9a:79:4f:ee:a8:f3: 95:2b:f5:c6:08:32:68:42:40:e7:97:7e:1f:03:2d:34: 19:98:1d:9b:fa:77:f6:63:f2:cf:67:e0:ee:d9:19:69: 58:c7:dd:77:8e:51:99:fc:57:0e:a9:ad:8f:1a:a6:ba: ac:1c:da:d8:5b:24:af:c6:93:33:e0:6a:d9:7c:af:3b: 8f:c4:9d:03:02:9f:d1:e1:df:47:05:fc:d5:a2:ce:85: 97:26:ac:33:3f:31:72:9f:4d:3b:1b:e4:58:2a:b6:1f: ac:96:8c:1d:49:b1:c2:d2:e7:55:d0:95:d5:11:de:c5: 46:81:16:bc:a0:42:46:0c:14:79:e6:92:3f:ce:bc:00: 9f:25:d3:ab:b7:4c:34:3b:f7:32:d8:83:c5:b8:e8:7a: 8f:26:da:0d:42:ee:fe:6a:35:b8:81:92:c2:56:d3:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:a0:7b:a2:3a:ee:14:49:be:6f:81:fd:ec:ea:82:f7: 30:87:ac:2f:a4:1c:54:57:b5:1d:4c:20:6f:01:3b:3d: 24:d4:71:b5:58:ca:70:06:86:7e:01:d3:49:10:85:8b: 75:b6:e7:c3:b7:d7:20:66:2e:4c:d8:64:45:0d:3e:72: 89:81:b5:48:54:be:92:9d:5f:a8:75:9a:78:c1:9b:b2: 65:c2:b0:64:7f:9d:de:b6:03:89:a3:74:42:0a:78:cb: 58:f9:2f:3e:0c:d7:ba:46:ff:1a:4c:05:46:b0:f9:91: 35:bd:5f:04:a2:c3:56:e3:b7:68:80:64:b1:9c:09:3c: 2b:64:e5:52:9f:8c:a0:4b:3f:80:3f:ee:60:f3:14:e4: 6c:f6:56:d8:3c:6f:cf:0b:d6:01:75:68:d7:bc:cf:c6: 01:39:71:ee:af:42:5f:3a:f3:d0:dd:f6:72:9c:72:d2: 1e:33:9f:73:26:15:d1:42:44:7b:fb:2d:ed:89:3b:77: c8:b1:30:97:b2:22:9b:78:ef:7f:f5:1d:23:f1:21:a0: ad:48:7e:7f:ee:c1:a2:2d:90:a4:c6:44:e5:1f:c7:39: d3:36:b8:9a:e7:1b:8d:03:1a:54:8e:20:f0:d4:08:06: 1d:f9:bc:16:08:05:89:7d:49:57:69:24:5e:04:cb:25 Fingerprint (SHA-256): 1F:85:F9:D1:2F:9C:8B:2B:D0:97:14:A1:34:42:87:81:87:A7:E6:4C:A4:3D:0F:2C:26:15:2C:D1:49:C1:5F:5E Fingerprint (SHA1): 3C:9B:AD:33:0C:A3:2A:9A:99:23:F9:F7:35:6B:E7:73:4F:29:29:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1925: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1926: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1927: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1928: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1929: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1930: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194612 (0x433ee234) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:07:3b:99:69:99:14:4d:4b:31:8f:86:3a:da:4d:fe: 11:76:cf:bd:fe:2e:c3:60:08:ed:dc:17:f5:c3:57:0e: 40:ae:b2:3d:8a:55:f8:d8:ad:5f:e2:ed:9f:da:ce:93: 4b:6f:cf:64:a8:65:3d:53:31:95:fe:a0:1b:1e:b0:ff: 88:f2:bd:d3:98:ed:62:dd:3e:cc:0d:0d:07:af:ac:07: 6e:54:02:c8:b1:bb:9d:87:82:31:9a:79:4f:ee:a8:f3: 95:2b:f5:c6:08:32:68:42:40:e7:97:7e:1f:03:2d:34: 19:98:1d:9b:fa:77:f6:63:f2:cf:67:e0:ee:d9:19:69: 58:c7:dd:77:8e:51:99:fc:57:0e:a9:ad:8f:1a:a6:ba: ac:1c:da:d8:5b:24:af:c6:93:33:e0:6a:d9:7c:af:3b: 8f:c4:9d:03:02:9f:d1:e1:df:47:05:fc:d5:a2:ce:85: 97:26:ac:33:3f:31:72:9f:4d:3b:1b:e4:58:2a:b6:1f: ac:96:8c:1d:49:b1:c2:d2:e7:55:d0:95:d5:11:de:c5: 46:81:16:bc:a0:42:46:0c:14:79:e6:92:3f:ce:bc:00: 9f:25:d3:ab:b7:4c:34:3b:f7:32:d8:83:c5:b8:e8:7a: 8f:26:da:0d:42:ee:fe:6a:35:b8:81:92:c2:56:d3:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:a0:7b:a2:3a:ee:14:49:be:6f:81:fd:ec:ea:82:f7: 30:87:ac:2f:a4:1c:54:57:b5:1d:4c:20:6f:01:3b:3d: 24:d4:71:b5:58:ca:70:06:86:7e:01:d3:49:10:85:8b: 75:b6:e7:c3:b7:d7:20:66:2e:4c:d8:64:45:0d:3e:72: 89:81:b5:48:54:be:92:9d:5f:a8:75:9a:78:c1:9b:b2: 65:c2:b0:64:7f:9d:de:b6:03:89:a3:74:42:0a:78:cb: 58:f9:2f:3e:0c:d7:ba:46:ff:1a:4c:05:46:b0:f9:91: 35:bd:5f:04:a2:c3:56:e3:b7:68:80:64:b1:9c:09:3c: 2b:64:e5:52:9f:8c:a0:4b:3f:80:3f:ee:60:f3:14:e4: 6c:f6:56:d8:3c:6f:cf:0b:d6:01:75:68:d7:bc:cf:c6: 01:39:71:ee:af:42:5f:3a:f3:d0:dd:f6:72:9c:72:d2: 1e:33:9f:73:26:15:d1:42:44:7b:fb:2d:ed:89:3b:77: c8:b1:30:97:b2:22:9b:78:ef:7f:f5:1d:23:f1:21:a0: ad:48:7e:7f:ee:c1:a2:2d:90:a4:c6:44:e5:1f:c7:39: d3:36:b8:9a:e7:1b:8d:03:1a:54:8e:20:f0:d4:08:06: 1d:f9:bc:16:08:05:89:7d:49:57:69:24:5e:04:cb:25 Fingerprint (SHA-256): 1F:85:F9:D1:2F:9C:8B:2B:D0:97:14:A1:34:42:87:81:87:A7:E6:4C:A4:3D:0F:2C:26:15:2C:D1:49:C1:5F:5E Fingerprint (SHA1): 3C:9B:AD:33:0C:A3:2A:9A:99:23:F9:F7:35:6B:E7:73:4F:29:29:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1931: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194612 (0x433ee234) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:07:3b:99:69:99:14:4d:4b:31:8f:86:3a:da:4d:fe: 11:76:cf:bd:fe:2e:c3:60:08:ed:dc:17:f5:c3:57:0e: 40:ae:b2:3d:8a:55:f8:d8:ad:5f:e2:ed:9f:da:ce:93: 4b:6f:cf:64:a8:65:3d:53:31:95:fe:a0:1b:1e:b0:ff: 88:f2:bd:d3:98:ed:62:dd:3e:cc:0d:0d:07:af:ac:07: 6e:54:02:c8:b1:bb:9d:87:82:31:9a:79:4f:ee:a8:f3: 95:2b:f5:c6:08:32:68:42:40:e7:97:7e:1f:03:2d:34: 19:98:1d:9b:fa:77:f6:63:f2:cf:67:e0:ee:d9:19:69: 58:c7:dd:77:8e:51:99:fc:57:0e:a9:ad:8f:1a:a6:ba: ac:1c:da:d8:5b:24:af:c6:93:33:e0:6a:d9:7c:af:3b: 8f:c4:9d:03:02:9f:d1:e1:df:47:05:fc:d5:a2:ce:85: 97:26:ac:33:3f:31:72:9f:4d:3b:1b:e4:58:2a:b6:1f: ac:96:8c:1d:49:b1:c2:d2:e7:55:d0:95:d5:11:de:c5: 46:81:16:bc:a0:42:46:0c:14:79:e6:92:3f:ce:bc:00: 9f:25:d3:ab:b7:4c:34:3b:f7:32:d8:83:c5:b8:e8:7a: 8f:26:da:0d:42:ee:fe:6a:35:b8:81:92:c2:56:d3:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:a0:7b:a2:3a:ee:14:49:be:6f:81:fd:ec:ea:82:f7: 30:87:ac:2f:a4:1c:54:57:b5:1d:4c:20:6f:01:3b:3d: 24:d4:71:b5:58:ca:70:06:86:7e:01:d3:49:10:85:8b: 75:b6:e7:c3:b7:d7:20:66:2e:4c:d8:64:45:0d:3e:72: 89:81:b5:48:54:be:92:9d:5f:a8:75:9a:78:c1:9b:b2: 65:c2:b0:64:7f:9d:de:b6:03:89:a3:74:42:0a:78:cb: 58:f9:2f:3e:0c:d7:ba:46:ff:1a:4c:05:46:b0:f9:91: 35:bd:5f:04:a2:c3:56:e3:b7:68:80:64:b1:9c:09:3c: 2b:64:e5:52:9f:8c:a0:4b:3f:80:3f:ee:60:f3:14:e4: 6c:f6:56:d8:3c:6f:cf:0b:d6:01:75:68:d7:bc:cf:c6: 01:39:71:ee:af:42:5f:3a:f3:d0:dd:f6:72:9c:72:d2: 1e:33:9f:73:26:15:d1:42:44:7b:fb:2d:ed:89:3b:77: c8:b1:30:97:b2:22:9b:78:ef:7f:f5:1d:23:f1:21:a0: ad:48:7e:7f:ee:c1:a2:2d:90:a4:c6:44:e5:1f:c7:39: d3:36:b8:9a:e7:1b:8d:03:1a:54:8e:20:f0:d4:08:06: 1d:f9:bc:16:08:05:89:7d:49:57:69:24:5e:04:cb:25 Fingerprint (SHA-256): 1F:85:F9:D1:2F:9C:8B:2B:D0:97:14:A1:34:42:87:81:87:A7:E6:4C:A4:3D:0F:2C:26:15:2C:D1:49:C1:5F:5E Fingerprint (SHA1): 3C:9B:AD:33:0C:A3:2A:9A:99:23:F9:F7:35:6B:E7:73:4F:29:29:6F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1932: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1933: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1934: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1935: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1936: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1937: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194611 (0x433ee233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e4:c4:3f:54:fb:7e:d6:d9:cd:ef:c9:76:bf:c5:45: 04:9c:9a:15:0b:67:9d:d2:7e:b0:38:8d:0a:92:53:b4: 80:e7:b8:ee:de:c6:1a:57:6e:bf:c8:ee:52:0e:6d:ee: 72:00:41:78:72:8c:6f:13:36:e1:19:32:65:66:94:ea: b4:e5:a3:f0:a0:57:e3:12:14:47:6a:97:5a:d2:0f:b9: 77:3f:fa:4b:b6:bf:b5:71:f9:75:61:66:20:66:7e:91: 63:e6:0c:01:0b:52:05:81:32:b9:95:bf:a9:b7:9a:66: 11:80:c8:b2:09:a6:c4:13:c7:47:66:e4:f6:ca:33:e8: 4c:e8:5c:bf:f2:0f:53:66:af:95:2c:5a:1f:09:e3:80: 19:59:58:52:6e:aa:63:3f:a7:35:3d:50:7d:4b:1b:de: c9:e8:00:fa:37:6b:e0:1f:5c:60:00:4a:50:5e:50:e2: 62:24:0d:6f:9e:1e:89:7b:69:7b:b8:0b:ae:e6:08:a8: f3:68:45:0e:3d:c5:61:9d:53:ca:64:81:5a:23:96:fc: 7c:31:cf:fb:40:d3:71:2d:3d:8d:18:07:6a:86:1f:c6: 77:70:54:a1:e0:33:bc:f1:53:7a:01:25:09:3d:0d:9a: 34:0d:52:b2:d5:3d:62:48:48:0f:1b:ad:1d:5e:78:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:29:ec:0a:42:fd:73:ff:d1:7b:30:86:01:50:d9:c1: 7e:21:2d:17:c3:5b:c8:ea:94:a2:0c:7c:f3:5d:d4:59: 9e:65:26:6e:47:88:16:15:5d:00:a1:ee:58:e4:06:ec: 8f:45:f8:8c:45:a7:30:45:50:16:e8:dc:c5:39:f9:7b: d8:36:35:ba:5f:4a:99:5f:7d:cb:93:24:d8:63:bf:57: 65:1f:61:c7:18:c5:5f:2f:d0:66:c9:64:96:00:8b:b9: ff:21:ee:f2:62:39:00:85:2e:22:56:4e:5d:f7:d1:a8: 69:e4:63:af:60:89:c8:55:ae:97:ae:30:39:75:ce:10: 58:db:b5:c7:05:95:11:83:41:08:11:06:1d:14:ff:15: 8e:ef:57:df:66:81:f4:b1:ee:6b:8e:b9:f3:15:28:d2: 9b:3f:65:16:fc:12:e4:04:7a:9f:82:e9:17:ca:f2:55: 30:70:7e:00:97:f5:5f:e2:82:b2:d4:35:a1:59:f5:bd: 62:8a:19:86:c3:f5:2b:a8:01:be:40:fe:1e:0f:98:0d: 1a:26:c1:1e:2f:38:a8:5e:f3:57:56:37:93:40:16:b3: de:90:7c:3e:a0:ec:ab:b5:54:0c:56:19:74:e8:e9:ad: 48:6f:a3:9e:0f:38:ef:11:a0:37:21:c6:df:f2:d8:b5 Fingerprint (SHA-256): DC:54:D0:A5:AE:58:45:9B:FE:7D:A5:F4:63:8D:7D:87:19:B0:08:E9:F8:E8:42:62:46:6F:6C:0E:9D:0E:31:F9 Fingerprint (SHA1): B9:25:3C:82:61:2F:EE:C0:07:71:09:12:77:CC:9F:EC:59:F2:49:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1938: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194611 (0x433ee233) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:48:07 2025 Not After : Thu Nov 28 11:48:07 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e4:c4:3f:54:fb:7e:d6:d9:cd:ef:c9:76:bf:c5:45: 04:9c:9a:15:0b:67:9d:d2:7e:b0:38:8d:0a:92:53:b4: 80:e7:b8:ee:de:c6:1a:57:6e:bf:c8:ee:52:0e:6d:ee: 72:00:41:78:72:8c:6f:13:36:e1:19:32:65:66:94:ea: b4:e5:a3:f0:a0:57:e3:12:14:47:6a:97:5a:d2:0f:b9: 77:3f:fa:4b:b6:bf:b5:71:f9:75:61:66:20:66:7e:91: 63:e6:0c:01:0b:52:05:81:32:b9:95:bf:a9:b7:9a:66: 11:80:c8:b2:09:a6:c4:13:c7:47:66:e4:f6:ca:33:e8: 4c:e8:5c:bf:f2:0f:53:66:af:95:2c:5a:1f:09:e3:80: 19:59:58:52:6e:aa:63:3f:a7:35:3d:50:7d:4b:1b:de: c9:e8:00:fa:37:6b:e0:1f:5c:60:00:4a:50:5e:50:e2: 62:24:0d:6f:9e:1e:89:7b:69:7b:b8:0b:ae:e6:08:a8: f3:68:45:0e:3d:c5:61:9d:53:ca:64:81:5a:23:96:fc: 7c:31:cf:fb:40:d3:71:2d:3d:8d:18:07:6a:86:1f:c6: 77:70:54:a1:e0:33:bc:f1:53:7a:01:25:09:3d:0d:9a: 34:0d:52:b2:d5:3d:62:48:48:0f:1b:ad:1d:5e:78:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:29:ec:0a:42:fd:73:ff:d1:7b:30:86:01:50:d9:c1: 7e:21:2d:17:c3:5b:c8:ea:94:a2:0c:7c:f3:5d:d4:59: 9e:65:26:6e:47:88:16:15:5d:00:a1:ee:58:e4:06:ec: 8f:45:f8:8c:45:a7:30:45:50:16:e8:dc:c5:39:f9:7b: d8:36:35:ba:5f:4a:99:5f:7d:cb:93:24:d8:63:bf:57: 65:1f:61:c7:18:c5:5f:2f:d0:66:c9:64:96:00:8b:b9: ff:21:ee:f2:62:39:00:85:2e:22:56:4e:5d:f7:d1:a8: 69:e4:63:af:60:89:c8:55:ae:97:ae:30:39:75:ce:10: 58:db:b5:c7:05:95:11:83:41:08:11:06:1d:14:ff:15: 8e:ef:57:df:66:81:f4:b1:ee:6b:8e:b9:f3:15:28:d2: 9b:3f:65:16:fc:12:e4:04:7a:9f:82:e9:17:ca:f2:55: 30:70:7e:00:97:f5:5f:e2:82:b2:d4:35:a1:59:f5:bd: 62:8a:19:86:c3:f5:2b:a8:01:be:40:fe:1e:0f:98:0d: 1a:26:c1:1e:2f:38:a8:5e:f3:57:56:37:93:40:16:b3: de:90:7c:3e:a0:ec:ab:b5:54:0c:56:19:74:e8:e9:ad: 48:6f:a3:9e:0f:38:ef:11:a0:37:21:c6:df:f2:d8:b5 Fingerprint (SHA-256): DC:54:D0:A5:AE:58:45:9B:FE:7D:A5:F4:63:8D:7D:87:19:B0:08:E9:F8:E8:42:62:46:6F:6C:0E:9D:0E:31:F9 Fingerprint (SHA1): B9:25:3C:82:61:2F:EE:C0:07:71:09:12:77:CC:9F:EC:59:F2:49:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1939: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1940: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194616 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1941: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1942: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1943: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194617 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1944: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1945: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1946: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194618 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1947: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1948: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1949: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194619 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1950: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1951: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1952: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194620 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1953: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1954: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1955: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194621 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1956: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1957: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1958: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194622 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1959: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1960: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1961: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194623 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1962: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1963: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1964: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194624 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1965: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1966: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1967: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1968: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128194625 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1969: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1970: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128194626 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1971: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1972: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128194627 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1973: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1974: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1975: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1976: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1977: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128194628 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1978: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1979: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128194629 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1980: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1981: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128194630 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1982: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1983: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1984: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1985: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1986: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128194631 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1987: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1988: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128194632 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1989: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1990: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128194633 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1991: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1992: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1993: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1994: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1995: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128194634 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1996: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1997: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128194635 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1998: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1999: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128194636 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2000: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2001: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2002: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2003: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2004: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128194637 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2005: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2006: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2007: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2008: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194638 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2009: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2010: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194616 (0x433ee238) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:48:11 2025 Not After : Thu Nov 28 11:48:11 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:92:88:47:b2:62:af:9f:39:02:40:49:29:d9:af:37: f2:ea:36:0e:11:32:28:10:a1:44:d5:ac:e1:d2:76:84: 56:b5:33:c6:37:14:f3:77:aa:83:24:93:0e:e8:6a:50: 87:f9:7e:e2:47:a8:27:87:3c:24:3c:21:86:4c:83:06: c8:8f:8f:12:46:42:52:5d:02:44:d5:c6:c7:de:97:8a: e3:a2:16:d9:af:3c:dd:b3:91:89:f4:7d:81:32:c9:9f: 7d:51:19:f5:88:e1:8b:7e:ac:d7:00:65:4f:ad:5c:6a: 2e:d7:21:99:bc:08:a6:22:7c:3d:b7:bc:e0:a9:ec:67: 03:e5:7b:80:ed:e6:91:40:4e:32:87:6e:00:b4:1d:22: 25:37:a3:82:1b:e0:70:61:02:07:1d:68:44:a7:b8:dc: ce:a3:14:9b:2d:81:b1:62:8f:0e:ea:e0:e3:58:3e:27: 1a:1b:af:d4:eb:7f:33:5b:3b:a9:8d:fd:18:02:35:bb: 21:4c:a1:20:34:52:47:7e:00:e0:13:e2:e9:6c:e5:01: 14:ad:41:25:b6:e1:81:d9:95:84:51:d7:d4:c7:9a:da: ec:df:1e:0d:ef:e7:26:fb:79:f6:e4:63:9a:37:71:71: 89:cf:c1:51:6e:b5:7e:fa:11:52:91:36:0b:4b:d2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:52:9b:19:bd:7c:81:a1:9d:86:cd:dd:96:15:14:da: 60:8b:61:db:92:d9:99:9f:8c:bf:fb:a7:46:6e:85:e7: e1:a2:ad:f2:b1:ba:b0:7a:d5:56:e6:86:29:a4:24:71: 90:01:87:03:d7:39:8e:52:9c:ee:62:76:ba:76:b0:f7: df:69:fc:76:57:31:a7:61:03:e2:0b:36:e9:af:3e:0c: be:72:f9:15:13:a9:ad:11:42:94:26:25:97:a6:72:c8: 16:e3:2a:dd:46:c5:53:10:63:0d:e5:c1:1f:65:54:48: 1e:fd:bf:69:3c:32:d5:ca:06:81:f4:76:9e:bc:4b:65: 30:dd:5a:47:f3:4b:50:e3:99:3f:fb:71:09:be:57:96: 5d:fd:6e:35:7a:99:4a:96:d7:89:cc:9e:25:c2:41:97: 15:90:3e:e7:56:a5:b2:ce:e8:37:fe:ce:8e:bf:f6:2c: 7c:4e:94:81:70:d4:20:f5:57:b6:40:dd:74:41:31:05: 47:6d:7a:a7:86:e9:e6:88:74:ee:aa:50:f2:13:3a:c4: 87:2b:79:89:14:e3:b9:dd:a3:f8:49:3e:aa:d7:ec:14: 6e:b2:9d:3d:8d:45:ab:4e:98:7c:06:61:15:fb:60:73: a2:b2:0b:2b:67:0d:bc:23:df:db:9c:e8:d9:de:d2:7f Fingerprint (SHA-256): BC:D3:D7:53:DB:49:B2:BA:05:FB:E0:17:61:27:CB:14:5E:A4:6A:48:0A:77:01:04:10:9C:01:99:11:8F:B2:B3 Fingerprint (SHA1): 36:57:ED:1A:5D:07:BC:B0:B3:5F:C7:4C:A1:AA:E7:99:F8:33:DC:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2011: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194617 (0x433ee239) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:48:12 2025 Not After : Thu Nov 28 11:48:12 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:ba:97:bb:36:2a:d6:32:98:4e:32:67:d4:7d:25:ed: bc:3c:ee:f4:51:b2:40:6f:09:84:20:3d:79:61:90:0e: 37:84:3c:01:58:8a:7f:5c:2c:57:3c:45:6f:e8:74:1b: a7:ef:23:fe:e0:36:24:71:41:4d:af:c6:86:36:e2:b5: fd:dd:d8:ad:96:04:85:d7:27:f6:b8:3e:81:fe:5d:f3: 29:f4:91:70:a2:f7:12:4a:a0:b5:23:9a:1b:f9:55:c3: 8d:ca:2b:49:cd:5c:f4:ed:a1:ec:c2:1b:77:eb:bb:bc: 0d:57:71:ce:fe:cd:0c:6d:cf:e0:50:54:de:c7:48:14: 36:5c:61:8f:e9:51:0a:67:42:f6:55:30:04:c5:4b:15: cd:21:bd:60:09:17:e2:ed:60:42:73:bb:b8:2e:d8:73: b5:1b:90:f6:73:84:99:7d:5f:e0:b2:04:52:89:00:06: b6:24:13:aa:b7:24:6d:2c:5f:84:a7:ba:9a:44:99:70: 5a:0e:ed:bb:a2:10:e0:4e:fe:f8:42:c0:50:06:89:c2: 57:46:7d:f2:52:94:a7:a5:10:ee:73:24:14:79:d4:91: f8:fd:99:0c:4e:1a:42:2f:e0:89:f4:35:23:4d:3e:62: c1:3c:23:fd:a9:ed:eb:ac:44:ca:34:74:41:a9:81:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:b7:27:71:51:9d:1c:0d:ae:d6:d1:1b:3e:28:94:34: f3:06:33:de:68:98:e4:f6:92:05:e0:5e:c6:15:88:44: 70:46:33:51:de:ed:8f:31:df:c7:3a:01:4b:70:1e:5f: 0a:4b:49:1d:e9:72:39:01:64:62:a5:cd:a2:8e:4c:85: ee:b4:86:64:86:f3:45:0e:bb:6a:0c:71:b5:7e:b6:c6: 54:d9:df:55:ed:b6:86:3e:99:00:2f:e6:cc:bf:cc:d2: 98:bb:ea:c1:43:9b:cd:3e:b2:30:d7:9b:76:d9:fc:26: cd:52:0d:77:da:44:50:41:4d:64:81:8f:71:f4:d8:fc: d1:16:49:37:e4:a6:5d:68:b7:08:12:1d:6b:71:dd:71: 02:9b:e6:b3:86:4a:ff:e4:74:c4:89:9a:06:96:82:d9: fb:3e:f2:24:d2:54:06:ad:06:eb:86:38:bd:2a:7d:ca: 7d:00:29:f3:1d:f9:f1:ee:75:cd:dc:b5:ef:53:cb:98: 11:92:4d:a2:30:8e:46:69:df:0a:b5:35:70:bf:4b:bf: 39:96:50:c2:52:05:a7:51:63:72:b3:ba:ca:b1:ca:7b: 1b:41:01:87:3a:6f:41:8e:00:a7:df:70:e8:e6:76:06: 98:8b:18:32:6c:65:4c:f6:e5:50:d4:6c:1d:41:44:b7 Fingerprint (SHA-256): 65:DA:99:CC:A4:ED:62:74:8D:98:D6:A5:F3:B4:E1:67:8D:4E:9E:95:63:B9:9C:B2:86:78:4B:99:29:85:2E:0E Fingerprint (SHA1): AE:AA:5D:41:6B:99:CE:C1:FB:44:BD:E9:DD:69:69:0E:03:B5:72:B9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2012: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194618 (0x433ee23a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:48:12 2025 Not After : Thu Nov 28 11:48:12 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:87:bd:57:cb:8f:c4:ae:13:5d:49:f5:85:2a:9c:46: 5e:36:c8:ea:b1:bf:e4:d2:c2:76:d9:fc:47:65:ba:9f: 73:e5:48:45:6c:34:5b:e7:a7:b3:ca:26:7b:a2:d1:cd: 55:c7:53:60:d2:0c:2d:8f:23:a3:da:85:53:28:43:a8: 83:05:f0:f5:d3:4c:ca:94:80:1e:04:37:d7:6e:cf:76: b3:79:a5:4a:4a:4d:06:48:28:90:dd:52:8f:a7:5d:d1: 69:c6:2a:17:c1:24:bb:97:4d:2f:43:a9:5d:60:02:55: c0:fd:db:be:7a:22:4e:d3:a1:07:68:11:5b:a6:7d:2d: 1e:b4:49:0f:f3:ad:ae:c8:cb:9a:49:d6:cf:1b:77:6c: d8:30:49:40:d7:f7:5d:64:f8:1c:55:c2:96:22:58:dc: 68:bc:85:a5:7b:39:bd:f0:aa:88:30:56:c6:43:7b:7e: b4:d7:a6:53:0a:a0:97:f1:66:97:b7:b5:6d:a8:74:24: 99:39:60:e8:69:b0:f7:85:d7:36:e1:10:84:14:be:e5: 27:c8:9f:f2:f5:66:32:ff:3b:1f:f0:ee:ca:8c:36:7c: a4:16:28:63:47:12:6c:fd:38:b9:86:6e:56:08:f2:b1: cc:66:08:2c:4a:2e:59:c1:aa:4d:d4:b0:c5:fb:76:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:b9:c0:73:bc:2a:05:06:5a:5a:32:39:00:af:2c:e1: 61:f5:4c:2e:4d:6d:73:86:4a:df:15:da:a7:b3:92:f4: 92:30:13:4b:c8:80:64:e3:8b:ae:40:ab:8e:ae:66:21: d3:54:90:a5:9f:a1:e6:ff:a7:1f:ae:5a:4e:14:3a:9e: 04:1c:5b:c1:28:41:23:70:5d:b6:ba:5b:0f:1c:c0:7c: 9b:5b:d6:49:61:c5:f5:b7:c2:19:1d:3d:f3:94:72:fc: fc:0b:6e:c6:3d:e6:be:d9:9f:c6:42:39:d8:d8:9a:47: 83:ae:de:c2:52:ff:04:5a:8a:b7:a4:26:8f:b8:76:01: 32:25:7b:2e:3a:f9:de:e7:76:1e:39:cd:58:dd:8d:bb: 5f:f9:0b:12:72:37:40:13:3d:f5:5f:31:ad:96:6d:af: f2:5e:dd:20:9b:01:0e:c5:f8:da:d0:68:32:37:6f:06: 2d:55:32:54:e4:72:67:73:18:d3:b4:b9:10:3c:81:3d: 4d:0c:41:f1:d7:6a:70:be:9e:51:50:db:46:aa:a2:d8: 75:af:d8:4b:40:b9:c7:88:52:dc:3a:97:fa:15:de:93: 11:33:e1:82:49:23:b9:70:46:03:93:ac:a6:2a:0c:f5: 43:cb:59:db:b5:7a:3f:41:7b:6b:3c:3a:3e:15:c0:16 Fingerprint (SHA-256): B1:5B:C0:09:A2:5B:9C:F9:06:33:33:FA:16:FE:8F:EB:7B:00:F2:62:97:A9:C7:13:A5:06:E7:3F:36:06:49:A2 Fingerprint (SHA1): F4:AD:83:56:DF:32:31:09:D6:73:4F:3F:AC:74:29:23:35:F7:E2:E6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2013: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194619 (0x433ee23b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:48:13 2025 Not After : Thu Nov 28 11:48:13 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:30:b1:95:80:9e:6b:b6:90:4a:03:c1:1f:e6:06:75: dd:79:83:4d:f4:13:28:87:83:e5:5f:11:66:be:5e:df: 9c:63:e5:11:3f:04:1e:a9:3b:b1:54:da:fe:a5:c2:41: eb:9f:f3:db:ec:e7:eb:05:fd:2d:46:d4:b7:9a:4e:b0: 2e:d5:ed:4e:ab:51:45:cf:be:7e:9f:14:5f:95:29:62: 71:0f:9b:38:3c:5f:48:8a:fc:59:3a:a9:9c:f8:55:0c: 5a:04:18:5a:6d:b1:7c:4c:50:2c:d0:1f:1b:54:ee:b9: 10:45:15:4f:fd:0d:92:7a:0d:8d:b5:0d:b1:3a:6b:14: 27:bf:2a:c4:36:9d:d0:f0:51:45:c7:2f:b0:c9:e2:9d: 71:6d:53:e7:cd:5a:bd:98:3e:c7:31:ed:24:29:0a:a0: a5:79:5a:5d:da:66:fd:5c:b1:19:72:af:62:0a:89:b7: 37:4e:13:a7:1d:3e:ec:5a:fe:f5:7f:0d:07:81:48:f9: 8a:95:ca:d7:c5:5c:2a:8a:47:bf:dd:90:d2:7d:54:d2: e2:ff:4f:da:47:17:a9:08:d7:9b:1f:ed:d3:33:8e:89: 29:5d:9a:55:84:57:c8:7b:90:d0:55:ce:46:73:f8:85: 48:1b:08:29:ee:4b:14:cd:7f:27:8c:00:54:fd:a4:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:a3:92:fe:87:27:46:f8:b0:3d:22:17:8f:be:35:93: 11:a5:f4:b7:1e:70:9e:04:b1:96:fa:40:62:19:6b:6e: ed:cf:8f:1a:60:8f:22:82:c4:d1:85:f1:19:0e:c0:23: 21:e3:12:60:8d:f8:02:0c:30:d3:02:39:77:a4:c4:b3: e7:9b:68:a6:bf:62:71:ae:55:25:25:8b:cb:32:23:8e: 5d:05:bf:1f:7e:2a:41:d4:ab:f7:ca:20:ef:e5:c5:c1: 42:85:04:97:ce:cc:9c:c1:84:7e:50:64:3e:82:f9:37: 97:eb:05:2e:2c:16:25:5c:a4:09:ae:0f:c8:08:bc:55: 81:0b:d0:54:ba:a3:6e:ac:f7:5d:09:37:70:c1:2e:5e: f7:83:b8:82:84:e4:60:38:ae:03:c5:ac:54:76:f0:a0: 1e:cd:0e:75:43:f6:dc:06:08:23:28:a0:57:96:ff:2c: ed:2f:1a:ba:19:a2:1e:66:36:c7:87:fd:9d:a2:19:a3: 97:05:d1:80:3f:5d:94:a3:27:27:b5:9a:b5:42:b8:a8: f4:fa:df:34:16:b7:8d:d9:f2:ec:b6:a9:f6:e4:1f:12: 55:fa:65:42:7a:b9:f7:d9:aa:6d:9b:9b:b6:ee:91:46: c1:c0:a8:b4:a3:dc:be:9b:2c:69:ce:08:14:3b:26:ce Fingerprint (SHA-256): 87:B1:32:1F:83:91:54:36:D6:78:F9:B8:37:3C:88:70:DB:45:9C:30:E4:63:DE:EA:62:E2:EA:02:24:46:4A:23 Fingerprint (SHA1): AD:37:DE:5F:87:59:4B:E6:49:AB:72:D0:89:6E:EB:E0:7D:81:44:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2014: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194620 (0x433ee23c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:48:14 2025 Not After : Thu Nov 28 11:48:14 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:5c:b1:8e:8e:d7:08:55:f9:44:0a:8e:8e:a0:fd:71: 26:6b:e5:04:70:69:0f:2e:e0:37:32:09:11:25:7e:45: 6f:75:98:ab:f3:45:37:0d:3b:b7:a5:0f:ba:d3:ce:64: 88:39:90:1e:50:34:ba:40:2e:f6:be:99:1b:ea:3e:c8: ea:41:19:eb:44:6b:f3:9d:c0:0a:e3:53:16:95:93:76: b9:47:a4:e9:92:04:aa:ff:e8:66:0f:db:71:d5:b8:21: a8:93:87:96:64:cc:ff:31:c7:71:50:59:2a:7f:4b:fd: e8:7d:46:2b:bd:05:70:15:cc:97:65:9f:ff:b8:90:eb: 4d:71:14:a3:5f:e7:6b:c9:af:60:18:4d:08:e8:b4:3f: 6e:4c:80:ab:bc:25:60:f9:c4:6a:ae:be:d7:21:97:a6: e0:e6:46:48:5c:d7:a1:de:d7:a9:39:b6:0c:5b:7e:6b: de:82:83:48:3d:4d:81:0a:36:ba:99:33:13:03:3e:3a: ae:06:e7:22:7b:96:04:d8:2b:0d:96:b3:54:6c:66:68: 1f:01:7b:c1:b9:9c:42:d8:f9:4d:8a:02:41:32:a0:38: 2d:6b:83:66:cf:31:59:75:7a:be:94:e3:19:6a:93:65: 50:71:98:12:34:22:ec:16:37:9e:6d:39:0e:d2:05:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:8f:e3:14:19:be:51:6f:51:7a:0e:51:ac:49:8e:7b: 08:2d:3e:fb:40:e2:7d:ca:10:91:66:a7:90:93:76:18: 38:bd:c9:cb:b6:94:8d:82:10:77:06:04:2c:f4:a1:b9: 00:ed:a7:67:88:53:30:81:45:09:89:5a:a2:16:88:36: 08:59:1c:81:c8:89:ee:f8:ad:28:2e:af:30:33:90:9a: 06:44:96:81:5d:a8:46:b3:54:f1:1b:61:36:54:14:41: d9:49:9a:6e:a5:13:f7:49:af:af:e4:f8:1b:06:c3:78: 31:9e:8e:1e:b2:30:87:e2:f6:a1:f6:3c:e7:a3:07:88: c7:ec:dd:b4:81:88:9c:d3:88:37:c2:bc:b3:ff:20:d1: 19:20:e1:94:70:1f:8b:8b:ba:2a:98:82:0c:e3:94:a9: c2:12:7d:32:4b:a7:b1:a7:da:53:b6:cb:96:0d:c0:a1: 4c:73:44:de:81:0e:1e:82:71:11:3f:ab:cf:58:f7:df: 71:40:72:31:6c:0d:bc:0a:6b:d4:3c:b1:f2:24:7c:89: fa:b6:1d:94:d7:6e:e6:03:62:c4:ea:24:fc:67:c3:fb: c1:63:cf:30:ad:4f:91:20:98:b4:26:92:c2:02:fe:84: 0b:8e:80:a1:db:69:28:d4:55:37:56:65:8c:e2:f8:df Fingerprint (SHA-256): 9E:1D:3E:C4:A9:27:2B:4F:0A:85:C8:3A:90:F0:85:E9:14:67:D3:47:D6:08:46:9C:E8:AA:9F:58:5F:40:08:C4 Fingerprint (SHA1): 9A:89:82:78:45:C8:53:C0:CA:4E:19:6F:4A:77:88:56:9D:16:11:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2015: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194621 (0x433ee23d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:48:14 2025 Not After : Thu Nov 28 11:48:14 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:d4:b7:a9:bd:a7:37:16:d2:6c:74:22:fb:d6:95:4a: 26:41:ff:5c:dc:51:b5:23:cc:f4:1d:69:0d:84:2a:04: 31:ba:16:16:d4:95:01:6e:74:ee:39:cd:f0:00:e8:59: c6:0e:63:af:2c:62:0b:73:86:9e:99:c8:f6:76:17:6b: b2:9e:08:fe:38:f8:de:fd:87:c1:ba:87:9a:55:de:d5: 71:5b:36:34:87:09:c2:b3:76:18:d5:15:e5:61:3b:59: d0:54:6e:cb:99:e9:2e:bb:65:88:be:0c:d5:78:69:e9: 82:44:93:cf:ac:c6:59:5a:d2:cc:80:46:b9:ec:31:88: 98:38:af:d7:ef:79:22:78:ec:52:35:90:30:85:61:44: 0a:dc:60:15:59:2a:9b:d7:08:1b:d9:3b:a0:84:03:ab: 44:65:bc:32:7c:3e:46:01:1a:1f:b0:06:5e:e1:4d:08: a0:18:7b:76:50:97:d3:c2:6e:a6:4e:f4:dc:17:7c:fb: 24:23:14:69:42:d2:91:0b:04:6c:70:9b:ac:c0:ff:89: bd:50:76:eb:31:45:88:5a:7e:3c:0c:d6:d5:ee:d7:db: 11:d0:b3:de:2d:b3:16:00:c2:08:2b:dd:02:82:be:90: f7:47:81:5f:bb:28:77:ad:cf:e0:fc:9a:97:d9:db:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:da:48:1d:ae:4f:1f:98:a8:38:2f:df:a9:67:2d:1f: 57:e1:e8:1b:c8:cd:a1:fa:3f:86:25:a2:4d:a0:fd:bc: b6:34:e1:fc:f9:f8:95:e4:8e:b6:cc:93:fc:c1:d0:f2: 9b:94:cc:c6:94:de:35:b1:f5:f4:7d:97:f6:85:4e:f5: cc:85:6a:24:eb:54:46:7b:37:90:d5:38:8e:75:59:d4: 7e:da:9a:67:d6:8c:b9:dc:07:e9:a6:65:bb:dc:2b:ae: 8c:a1:0f:e2:9b:e8:ea:a6:e0:55:37:0e:4c:48:d4:36: 91:a5:2f:de:0d:ae:14:ea:c0:a2:9f:27:4c:9e:4e:8d: 46:9c:29:9b:11:dc:a7:03:36:8d:7f:b9:67:bd:f4:0f: 51:60:53:7a:c1:f1:96:e2:ec:ae:b7:ca:b1:12:8a:7f: ec:c0:5e:fa:98:54:66:cd:00:ec:7e:b1:e6:dd:6b:db: 64:e2:02:c4:c3:b5:0f:a2:c8:81:4f:d8:32:e3:17:af: e2:ce:81:8f:ec:f5:3b:ca:fc:ac:54:21:ec:7e:ce:72: 22:32:5e:eb:31:dc:16:45:89:bc:4f:d2:1d:66:10:dd: fc:cc:b8:3c:f8:5d:24:f7:4e:fd:d3:1c:4d:2f:ee:e2: 1f:f7:70:2d:ab:5e:3d:86:6e:b7:f7:f1:61:51:8b:cf Fingerprint (SHA-256): B2:0D:00:57:27:43:D1:73:DA:CB:33:33:F3:93:4C:53:84:14:9B:2D:6B:CA:D9:9C:5E:90:10:95:C1:12:D9:06 Fingerprint (SHA1): 93:D0:8A:76:C4:23:30:E3:D0:2B:86:3D:36:F6:15:C8:2E:A4:61:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2016: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194622 (0x433ee23e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:48:15 2025 Not After : Thu Nov 28 11:48:15 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:1e:35:5d:d3:d7:f6:99:bc:12:ad:80:c2:e0:07:fa: 6d:97:23:ef:28:42:4d:df:31:82:cc:5b:77:0f:c1:69: ab:0c:12:a7:a4:8e:9a:8d:c3:c7:d1:6f:74:b6:b5:1f: 59:b5:17:cf:99:a1:2e:91:c5:a4:aa:2d:bf:b0:04:2a: 89:83:ea:15:6f:33:59:66:e3:17:7c:b2:cb:45:be:de: b5:e0:07:e2:fe:54:54:1c:b1:b9:96:69:ad:7a:3b:8e: ef:d1:e5:15:12:fa:63:9c:84:c6:b4:3d:84:c5:73:a1: 41:cd:9c:59:e6:5b:f0:15:61:32:c7:bf:33:bb:5c:50: a8:e2:77:bb:3f:7b:4a:fe:21:ae:5a:15:8a:05:35:f6: eb:a2:03:56:f1:ee:2d:c6:9b:30:96:6c:52:54:d0:27: 62:37:3b:b9:b5:ea:de:5d:da:22:f0:71:82:87:03:b8: 2f:1c:bf:65:df:25:7a:69:65:3e:e2:1f:1a:ac:d7:e2: 49:cb:9b:35:fd:c6:72:92:15:e8:b5:2c:b6:9f:a7:58: 88:35:a6:51:5c:c9:34:b3:e1:d0:1d:ea:cf:a1:59:9d: 4f:08:79:d9:74:d5:41:39:74:85:04:1d:00:cc:b8:fb: 3b:27:22:7d:f3:55:0c:4b:0a:bb:72:b2:55:a5:0c:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:0a:e4:ce:c8:f1:88:70:90:26:85:01:75:97:70:c7: dc:53:13:00:95:02:d1:17:95:13:9e:f5:91:d1:d1:37: e1:9d:71:37:16:23:20:1c:a0:94:8f:e2:4e:1f:d7:89: 91:96:fd:ca:54:61:4a:fe:75:b5:92:1b:c1:28:78:c4: 90:3c:bc:d9:a8:f3:a9:05:f5:e6:28:02:97:e6:bd:c2: 8c:c5:a0:13:bf:67:66:55:36:59:24:35:5d:88:b5:81: 95:6a:fb:9e:a2:55:10:47:4a:dc:f6:0c:b8:ce:11:32: cb:22:0a:ea:fe:19:a6:cf:e8:ee:c9:1b:3f:17:48:29: 34:db:37:b4:c9:bc:d2:b5:38:66:ba:f6:03:92:ae:53: 3e:6f:6d:14:ad:3c:68:29:93:36:04:90:df:18:b8:b3: 52:51:be:76:8f:ec:b0:fe:40:fc:0c:d3:1a:6c:ef:26: 4d:7b:5f:23:24:f9:36:18:c9:b7:d5:0f:39:76:d8:d0: c4:06:28:95:05:f5:50:b1:e2:35:1e:50:36:bc:66:eb: 5a:83:b6:cf:f1:e8:e3:35:dc:f2:e2:03:18:c5:37:de: 0a:01:da:ac:6d:57:18:74:70:3b:38:84:31:07:e1:4d: 0b:75:9c:e4:64:93:37:e0:9d:4c:14:6e:93:b1:a2:48 Fingerprint (SHA-256): 33:B8:D1:27:D3:C9:3D:1F:C1:AB:26:AA:D6:FA:0A:84:F1:D3:D2:A2:CC:4E:25:7D:DE:58:84:DB:B5:D1:53:C7 Fingerprint (SHA1): 03:CA:D8:18:62:E2:F3:9E:6A:21:C3:6C:92:C4:C8:AC:75:54:53:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2017: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194623 (0x433ee23f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:48:15 2025 Not After : Thu Nov 28 11:48:15 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:59:e0:7d:e3:45:ea:a1:42:67:c4:2d:ef:eb:d4:b9: c0:a4:cf:74:1a:18:9b:75:ce:7b:62:7c:df:00:c2:f6: 24:59:e8:83:50:90:ba:f4:2b:5c:e2:d1:e3:b7:ad:cc: 61:64:cf:f9:d2:cb:a8:ab:a5:a5:99:e0:61:1d:e6:ac: e7:2f:52:6e:07:da:c6:b1:74:e9:f2:aa:1a:d5:a7:75: 1f:24:fc:28:9b:48:03:cc:3c:af:6b:c2:30:21:b7:6d: 70:21:28:90:0c:8e:95:73:c6:0f:f8:c8:a4:25:1a:be: cd:0a:9a:d4:fb:d3:6f:16:f1:f9:f6:e2:eb:f0:a3:95: c9:74:dc:8b:c5:28:04:1e:5b:93:db:15:97:a3:72:47: 92:7e:fd:84:65:15:2e:f2:37:a7:93:a9:3c:f0:7d:52: 3d:90:2c:5c:0c:a9:0c:01:d5:30:b2:ed:30:da:f3:03: 0a:7d:0c:6d:46:49:8c:b9:3a:06:f7:b8:5b:54:52:bd: 0b:52:f4:64:e5:bd:da:f3:d2:87:b0:1b:3c:7c:5f:0a: 37:5a:55:23:7f:1a:f8:8f:ff:3b:fd:d5:d7:ed:81:f9: cb:50:ae:12:30:b3:f3:cc:00:c1:06:e3:ec:2f:6f:f3: 74:f3:fd:f4:84:0c:f2:db:6d:a9:df:4a:85:f4:3e:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:26:16:58:2b:ba:56:4b:e0:8f:54:f1:6c:9d:b0:0a: 80:dc:cc:d4:fe:a8:50:a9:d5:f0:15:d7:c1:08:69:88: 8c:4a:5c:56:5c:d4:c5:fd:7d:26:03:15:8e:c2:d7:77: e0:28:c1:3e:25:82:6c:24:4d:6a:b4:46:d9:c8:35:e9: cd:02:38:87:a1:b4:b8:35:18:0a:63:e9:ba:0e:ed:7b: 12:dc:c7:54:80:14:9f:52:d8:76:db:2f:b1:f3:72:1a: 6a:90:a5:e2:4a:ea:19:e6:30:27:37:64:88:da:8a:0f: 8e:3b:9e:1f:6f:75:ee:a7:da:43:ba:cb:39:08:f9:43: cd:18:d5:b7:c7:2e:1d:11:8d:f7:6f:ae:19:c1:50:a4: eb:a6:ec:9f:a7:da:bb:cb:56:52:d5:3a:47:0c:54:60: ed:38:fc:76:05:71:9b:c1:37:57:53:8c:6d:67:fa:a1: bf:28:0e:43:0d:14:f6:76:7a:94:ab:c1:18:0b:d9:2b: 01:b2:16:b7:8c:66:b8:bd:29:ac:16:1c:38:16:bc:e1: 67:4e:f8:37:20:6d:1c:74:4d:88:0c:0d:47:9c:5c:ef: 0d:f0:1a:19:57:27:d0:b9:e9:14:7d:fd:8c:19:9a:eb: 59:e1:2a:f4:8c:f5:8d:4e:6a:7e:70:3a:29:20:fa:f8 Fingerprint (SHA-256): 40:6F:1F:7B:9A:44:77:57:A7:E1:20:E1:59:E1:E4:43:EB:CB:E0:5A:92:7D:54:05:19:4B:E1:A8:0B:F8:C7:01 Fingerprint (SHA1): 28:87:79:11:88:9A:A0:52:F9:C6:D1:0E:ED:E5:04:42:54:DC:62:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2018: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194624 (0x433ee240) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:48:16 2025 Not After : Thu Nov 28 11:48:16 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:bd:41:d4:17:44:48:34:b6:87:4f:8d:65:4c:51:e3: e5:f1:f9:bc:95:b5:52:07:e1:10:73:a1:55:70:a5:90: bf:0f:e0:33:a3:02:ad:7e:15:06:a4:e4:a3:70:2e:9b: 7f:9a:65:5b:36:d5:10:b2:87:a1:c1:0e:02:ff:56:84: 16:12:29:2b:1b:a9:a1:21:6f:4d:ed:d1:ae:0a:02:38: 22:25:89:4e:3b:54:b5:f8:36:e4:8c:21:89:68:cb:e1: 19:ac:22:f4:04:0f:43:43:c9:b9:59:b2:45:c9:5a:e1: b5:8d:a6:13:ce:2b:49:d2:0b:eb:09:34:07:ed:0b:24: e3:cf:92:c2:1a:4c:53:26:56:7a:7c:63:62:3a:f6:76: b4:69:46:0f:da:b6:33:d0:80:5d:a7:d9:e9:61:1c:16: 6e:de:03:17:85:e1:bf:3a:a5:e7:a3:dd:c4:31:04:6d: 8b:08:8a:ef:1a:4d:7f:f1:f0:13:90:5e:93:c2:8b:40: 22:b5:2b:9d:b9:d8:fb:47:a2:46:0c:27:14:fa:43:0e: f6:2b:8d:db:2b:e3:6a:6e:f6:0e:ae:36:4b:83:47:72: df:f8:d6:ca:d3:e4:c6:c2:af:e7:0d:2a:cf:0d:40:1e: 47:7e:06:43:8e:56:3a:13:55:7e:d0:44:04:67:8c:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:1f:89:8c:e8:4f:d5:3a:30:27:f4:f1:cf:c3:c5:93: 52:98:d3:3c:4b:ee:e0:b7:df:b9:2d:d5:aa:d1:0e:fd: 36:de:4e:d2:7a:ea:92:65:2a:08:9b:bf:6f:e2:a7:4b: 95:dc:87:33:b4:d3:d9:2e:57:90:7f:76:ac:0c:71:dc: b2:1f:19:ff:a4:60:fa:ae:15:64:ef:bb:1c:77:57:9e: cc:f8:41:ea:2e:9d:46:4e:a4:ca:89:6f:05:ec:5e:2d: 85:d2:27:89:b0:00:86:19:b5:c9:41:a0:c9:3d:56:e4: 84:4a:6d:46:08:1c:dd:ab:01:00:dc:dd:40:35:df:2d: bb:0a:ee:da:f2:4e:fc:67:41:48:db:c9:60:b3:77:06: 99:e4:24:3b:0e:76:7c:77:a1:46:a2:ba:8f:a4:4f:19: 7a:3f:1f:87:62:2f:fe:c2:36:ad:21:0f:e9:16:24:76: 3f:43:e7:ac:8e:9a:2d:32:f4:7e:e3:ca:cb:77:92:a2: d0:ff:1f:fe:94:65:93:d9:bc:92:09:aa:88:8a:f4:48: 89:bd:67:69:ba:a6:7c:cc:ea:ef:df:4a:5b:a9:09:b5: 22:cc:06:1e:70:d9:c7:a8:cc:1f:dc:b5:11:87:58:1a: 1b:86:27:4d:6d:d7:e6:69:19:68:9f:93:07:e1:24:31 Fingerprint (SHA-256): BD:E6:AD:BE:33:A1:55:32:06:45:D4:98:4A:27:52:BF:0B:AC:7D:5C:4C:D2:69:EC:63:C5:66:17:06:0A:62:52 Fingerprint (SHA1): B5:B8:B5:CC:92:37:81:1C:4D:A4:2E:C7:B2:67:27:8E:1D:9B:2A:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2019: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2020: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194639 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2021: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2022: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2023: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2024: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194640 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2025: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2026: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2027: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2028: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194641 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2029: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2030: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2031: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2032: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194642 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2033: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2034: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2035: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194639 (0x433ee24f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:24 2025 Not After : Thu Nov 28 11:48:24 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:a4:a5:d0:dd:e4:9c:14:74:51:50:91:9c:38:33:4d: 02:d5:99:45:90:d3:e7:a0:f1:25:14:36:c1:be:97:0c: 08:ae:b6:23:d1:64:f5:9f:3e:01:dc:19:4e:ee:33:8e: bf:45:61:18:88:f0:f2:2e:5a:31:b1:04:bf:5f:bd:32: bc:4c:42:5c:36:2d:e0:c3:d7:1e:da:b0:19:81:67:6e: 45:a4:17:7d:0b:71:3e:c2:1b:ed:7c:87:35:06:fc:74: 0b:6d:b2:28:7b:a7:97:0c:b4:20:c8:cc:58:3c:00:f9: 86:b8:a2:94:cd:c8:3c:df:6f:0e:b9:45:ca:38:3f:61: 0e:2c:70:d0:6a:f4:14:52:35:d0:e2:27:8b:77:73:66: f7:7b:c4:1c:23:f8:72:55:e3:13:e9:45:85:bb:77:72: 93:43:f3:2e:23:d6:d2:8c:22:7a:45:f8:a5:74:96:9c: 24:5d:63:50:8b:7d:cb:2d:6d:42:ff:ee:75:d9:25:73: 1f:aa:7a:a6:cf:0e:0a:bd:0c:2b:29:73:5c:ed:a0:e6: ea:fc:0f:9f:8f:07:8d:7d:d3:ee:18:4a:f2:8d:52:1e: 4e:ef:d0:b3:58:3d:23:8d:78:5f:7d:69:c5:7d:19:9f: 5d:65:5f:bd:20:90:08:a6:6d:61:14:08:0e:23:dc:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:fe:e7:1c:be:ba:b6:3a:b6:01:12:e0:bf:61:38:0b: 60:27:50:0c:21:7b:75:0d:0b:73:5e:a2:6f:23:bb:8c: 97:35:b0:94:18:73:79:bf:15:08:8b:b2:7f:60:74:ef: 30:3a:81:df:1e:14:62:b9:4f:94:f1:32:f5:18:60:dd: 4a:a8:c8:17:32:32:ae:f8:3c:c9:fb:7e:45:56:ba:36: 71:e4:46:34:00:75:c7:63:e3:03:0e:02:44:9b:0a:da: a4:ae:62:3d:a0:51:49:67:b0:6d:4a:37:f4:76:64:23: 6d:23:6a:12:4a:4c:ab:72:46:82:bc:eb:69:03:8b:d6: 59:21:3f:61:3c:de:84:26:e5:34:aa:30:9a:9c:f8:f8: 0c:7e:02:a6:b0:c3:e0:1a:ed:34:9a:a9:b3:5b:40:15: cc:15:e2:dc:fb:2d:2a:07:a6:5f:e8:b5:cf:b8:b1:26: b9:5f:70:2d:f2:38:8a:23:27:ad:e3:ca:73:47:a3:e3: 6d:42:27:a7:75:68:65:a4:ac:d3:1e:8e:a0:fe:16:0f: 94:b8:50:f6:0d:c8:f3:e8:94:5e:bf:28:7a:9f:34:c0: aa:c4:6d:6c:e7:7a:25:da:47:dc:8c:06:0e:bc:1a:29: be:dd:88:06:0c:be:bf:e6:33:8d:28:21:00:59:29:ff Fingerprint (SHA-256): B2:10:93:8F:B8:3C:B4:09:E1:ED:7E:CF:FE:5C:CD:64:16:61:97:77:9B:A2:F9:65:CA:D5:9E:A5:18:E9:76:41 Fingerprint (SHA1): C0:75:44:12:DC:9B:99:A7:AD:38:FC:FA:AF:75:4B:31:43:56:BD:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2036: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2037: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194640 (0x433ee250) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:25 2025 Not After : Thu Nov 28 11:48:25 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c0:62:f8:d5:22:1d:24:8f:1a:a1:00:4a:f6:56:b2: c4:69:6c:67:f0:65:bd:b7:6d:16:2c:8b:b7:fe:92:d3: 25:37:35:06:2b:d5:f0:45:e5:c7:d7:5d:8e:2f:97:37: 07:5e:cc:5c:7d:5f:fc:f9:4d:2e:1d:9e:77:a5:64:6f: b4:ff:40:74:52:9e:b0:57:0f:40:b1:42:95:3b:4c:07: 93:1d:c3:d2:72:1d:59:8c:1a:72:21:92:31:18:2c:af: 18:50:6e:a4:73:14:68:5d:c5:ff:2a:25:df:9a:c1:96: f4:d7:8a:8f:9f:1f:cc:05:19:df:db:b6:c0:42:d8:2c: a3:50:f8:b5:58:d4:9a:98:43:97:e4:09:c7:1b:e5:79: 47:39:25:a1:3c:ad:ef:b3:04:3b:c0:9f:39:c4:1e:7b: ae:b7:2d:f2:1f:c4:5b:ba:6b:f8:bb:9a:c4:ff:98:6f: 82:27:21:97:cf:2a:13:67:54:15:d3:83:07:2d:e6:1c: f8:90:4f:1f:f1:16:a1:69:8b:a4:24:88:19:b1:45:25: d3:61:0d:99:fe:bc:59:9f:b9:fd:fc:ac:9f:2a:cf:8d: db:f7:d7:37:5a:70:20:da:f1:4f:28:0f:8e:8d:8a:4d: aa:16:6a:0c:7f:80:c8:64:18:d0:b3:57:5d:d3:b2:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:ba:8f:64:78:0b:51:5b:cd:0b:da:ee:b0:7a:77:d5: 17:13:1a:63:d6:f9:9a:e3:81:69:f2:3a:8f:d2:2c:cd: ff:f8:65:37:02:32:c1:1f:13:16:a4:a3:0d:25:8a:bf: e4:e6:9f:ba:74:52:34:ee:4d:2f:3a:db:7a:cb:ac:80: 48:e4:16:74:bb:d4:5c:23:c9:79:e5:af:6c:06:9b:65: 97:c1:61:d5:db:1a:cd:91:c6:8a:de:82:62:d3:31:d9: 4b:56:a4:3e:36:5e:83:37:99:17:50:a2:fb:f6:30:c7: 24:02:23:21:a6:b0:43:a2:ef:5d:3a:a4:95:b2:ac:19: 6f:60:bb:f5:7c:1c:58:67:b0:a5:a7:e3:d6:bb:47:00: 16:a0:9a:3d:00:56:3b:ae:56:a1:d2:1c:89:52:bd:d4: 84:47:ec:51:1e:fc:f0:eb:14:54:a1:1c:c8:e8:f9:48: b8:6b:c1:5a:fb:b4:4e:e2:41:28:8c:98:a1:90:e7:6b: 9e:23:8b:27:41:51:09:cc:12:87:ef:eb:a4:5a:fd:f5: 23:65:ba:a4:9d:50:28:d1:c4:ff:e9:5c:36:f2:21:bf: ec:63:7b:4d:84:c7:a8:4e:8b:80:fc:64:41:8a:02:fd: 94:6e:44:dd:bb:59:8c:f6:4a:ef:15:36:05:d2:57:50 Fingerprint (SHA-256): 48:9E:43:39:75:48:D2:0D:18:9C:52:3C:2A:8A:EB:44:30:A0:BE:D9:8A:9B:AB:D6:BD:D8:53:3D:35:36:4D:94 Fingerprint (SHA1): 76:2D:B9:E7:ED:1C:F3:6A:1F:B5:E9:78:17:62:EF:A4:E1:5E:67:88 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2038: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2039: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194641 (0x433ee251) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:26 2025 Not After : Thu Nov 28 11:48:26 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:3e:82:82:86:58:c4:4d:fd:cb:4a:83:fc:21:df:a3: ed:da:4c:ff:19:d5:b6:b1:9b:73:5e:6a:51:98:2c:fb: 87:a6:a6:9c:1d:69:3f:6e:52:3d:bf:56:f1:48:e6:6a: 12:4c:3a:06:89:34:a4:23:c5:09:0f:25:be:f2:d9:4e: eb:ca:15:58:0c:92:c6:0e:c8:eb:a3:de:81:82:e9:0c: d5:bc:0e:c4:10:e1:8d:66:85:54:60:42:5f:a9:83:75: c6:e7:66:36:41:6e:c2:1c:2e:55:21:b9:eb:42:e9:90: f5:94:f8:d7:3a:a2:bd:0b:0b:d2:ab:13:b2:d7:45:cf: 8f:11:58:f0:22:7a:03:88:ae:b1:63:fd:2d:3a:cf:2d: 00:92:b9:92:45:4b:0c:b4:a4:2c:05:79:c1:a5:c6:02: 43:3d:69:ef:9f:cd:76:3c:d0:ca:f6:6e:9d:7f:87:26: 25:c3:30:0b:a9:6b:07:dd:ff:e6:5f:06:94:8f:4a:30: 12:7b:f6:61:5f:fd:b9:41:58:b1:97:6a:ad:e2:c3:9f: 8c:c2:6b:0f:56:c4:44:1c:4d:78:f5:90:5c:7e:ea:be: 9e:5c:cb:0b:07:b4:c6:fe:69:38:e2:07:e2:8f:d2:9e: bb:1e:3f:6a:b3:0a:3b:3e:8a:75:cf:5c:75:ef:4c:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:88:42:2c:66:e0:e4:6b:a3:0e:44:3c:02:a8:74:bf: f6:28:af:7a:fd:0b:0c:90:74:b7:db:63:ee:a5:45:b7: ca:9d:d9:b1:ec:6f:e9:84:b7:8c:6d:1b:61:2e:e4:ce: 4e:98:0e:d0:db:48:7f:1a:f6:3a:e6:40:2d:6f:06:4a: 21:35:a3:ba:2d:b0:85:63:7b:cc:09:48:7d:87:ec:0f: 6a:8d:49:8e:fa:bd:fa:56:ea:62:21:05:2a:cb:1b:ae: a0:b0:c1:41:2c:5d:9f:44:b2:78:d3:57:5a:f7:08:e9: 1e:1e:ed:75:85:f3:06:ab:bb:30:06:92:57:c4:3c:71: b6:43:d2:f6:9e:9c:27:15:1d:d0:ad:f1:77:da:2f:da: 74:2f:05:7b:fe:47:ab:32:04:e3:d5:05:99:fa:1e:20: bb:26:10:0f:a7:7b:22:19:b5:4f:c6:83:d7:36:46:24: d1:a8:ae:9e:a6:11:4d:2e:78:c1:c3:62:bf:68:35:b4: 55:94:f0:62:f5:28:ae:eb:bd:ed:97:f1:79:17:2d:32: c5:c3:47:dd:e6:72:c3:d0:b2:4b:4b:f3:09:29:7c:4c: 67:ee:ba:8b:e7:58:2e:1e:39:27:dd:fc:35:fd:01:60: 91:15:8e:57:80:90:2b:e3:b1:11:c2:c6:53:ca:f0:96 Fingerprint (SHA-256): 71:9D:AC:03:A0:1D:EA:D3:D8:84:CE:11:54:F6:E2:BD:78:F8:ED:D7:F0:D9:EE:C4:AF:CA:B8:26:D6:F0:10:10 Fingerprint (SHA1): 10:7A:AC:5C:14:90:26:EC:B9:D3:25:76:AC:34:F4:F9:37:D7:D0:96 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2040: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2041: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2042: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2043: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2044: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194639 (0x433ee24f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:24 2025 Not After : Thu Nov 28 11:48:24 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:a4:a5:d0:dd:e4:9c:14:74:51:50:91:9c:38:33:4d: 02:d5:99:45:90:d3:e7:a0:f1:25:14:36:c1:be:97:0c: 08:ae:b6:23:d1:64:f5:9f:3e:01:dc:19:4e:ee:33:8e: bf:45:61:18:88:f0:f2:2e:5a:31:b1:04:bf:5f:bd:32: bc:4c:42:5c:36:2d:e0:c3:d7:1e:da:b0:19:81:67:6e: 45:a4:17:7d:0b:71:3e:c2:1b:ed:7c:87:35:06:fc:74: 0b:6d:b2:28:7b:a7:97:0c:b4:20:c8:cc:58:3c:00:f9: 86:b8:a2:94:cd:c8:3c:df:6f:0e:b9:45:ca:38:3f:61: 0e:2c:70:d0:6a:f4:14:52:35:d0:e2:27:8b:77:73:66: f7:7b:c4:1c:23:f8:72:55:e3:13:e9:45:85:bb:77:72: 93:43:f3:2e:23:d6:d2:8c:22:7a:45:f8:a5:74:96:9c: 24:5d:63:50:8b:7d:cb:2d:6d:42:ff:ee:75:d9:25:73: 1f:aa:7a:a6:cf:0e:0a:bd:0c:2b:29:73:5c:ed:a0:e6: ea:fc:0f:9f:8f:07:8d:7d:d3:ee:18:4a:f2:8d:52:1e: 4e:ef:d0:b3:58:3d:23:8d:78:5f:7d:69:c5:7d:19:9f: 5d:65:5f:bd:20:90:08:a6:6d:61:14:08:0e:23:dc:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:fe:e7:1c:be:ba:b6:3a:b6:01:12:e0:bf:61:38:0b: 60:27:50:0c:21:7b:75:0d:0b:73:5e:a2:6f:23:bb:8c: 97:35:b0:94:18:73:79:bf:15:08:8b:b2:7f:60:74:ef: 30:3a:81:df:1e:14:62:b9:4f:94:f1:32:f5:18:60:dd: 4a:a8:c8:17:32:32:ae:f8:3c:c9:fb:7e:45:56:ba:36: 71:e4:46:34:00:75:c7:63:e3:03:0e:02:44:9b:0a:da: a4:ae:62:3d:a0:51:49:67:b0:6d:4a:37:f4:76:64:23: 6d:23:6a:12:4a:4c:ab:72:46:82:bc:eb:69:03:8b:d6: 59:21:3f:61:3c:de:84:26:e5:34:aa:30:9a:9c:f8:f8: 0c:7e:02:a6:b0:c3:e0:1a:ed:34:9a:a9:b3:5b:40:15: cc:15:e2:dc:fb:2d:2a:07:a6:5f:e8:b5:cf:b8:b1:26: b9:5f:70:2d:f2:38:8a:23:27:ad:e3:ca:73:47:a3:e3: 6d:42:27:a7:75:68:65:a4:ac:d3:1e:8e:a0:fe:16:0f: 94:b8:50:f6:0d:c8:f3:e8:94:5e:bf:28:7a:9f:34:c0: aa:c4:6d:6c:e7:7a:25:da:47:dc:8c:06:0e:bc:1a:29: be:dd:88:06:0c:be:bf:e6:33:8d:28:21:00:59:29:ff Fingerprint (SHA-256): B2:10:93:8F:B8:3C:B4:09:E1:ED:7E:CF:FE:5C:CD:64:16:61:97:77:9B:A2:F9:65:CA:D5:9E:A5:18:E9:76:41 Fingerprint (SHA1): C0:75:44:12:DC:9B:99:A7:AD:38:FC:FA:AF:75:4B:31:43:56:BD:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2045: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2046: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194640 (0x433ee250) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:25 2025 Not After : Thu Nov 28 11:48:25 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c0:62:f8:d5:22:1d:24:8f:1a:a1:00:4a:f6:56:b2: c4:69:6c:67:f0:65:bd:b7:6d:16:2c:8b:b7:fe:92:d3: 25:37:35:06:2b:d5:f0:45:e5:c7:d7:5d:8e:2f:97:37: 07:5e:cc:5c:7d:5f:fc:f9:4d:2e:1d:9e:77:a5:64:6f: b4:ff:40:74:52:9e:b0:57:0f:40:b1:42:95:3b:4c:07: 93:1d:c3:d2:72:1d:59:8c:1a:72:21:92:31:18:2c:af: 18:50:6e:a4:73:14:68:5d:c5:ff:2a:25:df:9a:c1:96: f4:d7:8a:8f:9f:1f:cc:05:19:df:db:b6:c0:42:d8:2c: a3:50:f8:b5:58:d4:9a:98:43:97:e4:09:c7:1b:e5:79: 47:39:25:a1:3c:ad:ef:b3:04:3b:c0:9f:39:c4:1e:7b: ae:b7:2d:f2:1f:c4:5b:ba:6b:f8:bb:9a:c4:ff:98:6f: 82:27:21:97:cf:2a:13:67:54:15:d3:83:07:2d:e6:1c: f8:90:4f:1f:f1:16:a1:69:8b:a4:24:88:19:b1:45:25: d3:61:0d:99:fe:bc:59:9f:b9:fd:fc:ac:9f:2a:cf:8d: db:f7:d7:37:5a:70:20:da:f1:4f:28:0f:8e:8d:8a:4d: aa:16:6a:0c:7f:80:c8:64:18:d0:b3:57:5d:d3:b2:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:ba:8f:64:78:0b:51:5b:cd:0b:da:ee:b0:7a:77:d5: 17:13:1a:63:d6:f9:9a:e3:81:69:f2:3a:8f:d2:2c:cd: ff:f8:65:37:02:32:c1:1f:13:16:a4:a3:0d:25:8a:bf: e4:e6:9f:ba:74:52:34:ee:4d:2f:3a:db:7a:cb:ac:80: 48:e4:16:74:bb:d4:5c:23:c9:79:e5:af:6c:06:9b:65: 97:c1:61:d5:db:1a:cd:91:c6:8a:de:82:62:d3:31:d9: 4b:56:a4:3e:36:5e:83:37:99:17:50:a2:fb:f6:30:c7: 24:02:23:21:a6:b0:43:a2:ef:5d:3a:a4:95:b2:ac:19: 6f:60:bb:f5:7c:1c:58:67:b0:a5:a7:e3:d6:bb:47:00: 16:a0:9a:3d:00:56:3b:ae:56:a1:d2:1c:89:52:bd:d4: 84:47:ec:51:1e:fc:f0:eb:14:54:a1:1c:c8:e8:f9:48: b8:6b:c1:5a:fb:b4:4e:e2:41:28:8c:98:a1:90:e7:6b: 9e:23:8b:27:41:51:09:cc:12:87:ef:eb:a4:5a:fd:f5: 23:65:ba:a4:9d:50:28:d1:c4:ff:e9:5c:36:f2:21:bf: ec:63:7b:4d:84:c7:a8:4e:8b:80:fc:64:41:8a:02:fd: 94:6e:44:dd:bb:59:8c:f6:4a:ef:15:36:05:d2:57:50 Fingerprint (SHA-256): 48:9E:43:39:75:48:D2:0D:18:9C:52:3C:2A:8A:EB:44:30:A0:BE:D9:8A:9B:AB:D6:BD:D8:53:3D:35:36:4D:94 Fingerprint (SHA1): 76:2D:B9:E7:ED:1C:F3:6A:1F:B5:E9:78:17:62:EF:A4:E1:5E:67:88 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2047: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2048: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194641 (0x433ee251) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:26 2025 Not After : Thu Nov 28 11:48:26 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:3e:82:82:86:58:c4:4d:fd:cb:4a:83:fc:21:df:a3: ed:da:4c:ff:19:d5:b6:b1:9b:73:5e:6a:51:98:2c:fb: 87:a6:a6:9c:1d:69:3f:6e:52:3d:bf:56:f1:48:e6:6a: 12:4c:3a:06:89:34:a4:23:c5:09:0f:25:be:f2:d9:4e: eb:ca:15:58:0c:92:c6:0e:c8:eb:a3:de:81:82:e9:0c: d5:bc:0e:c4:10:e1:8d:66:85:54:60:42:5f:a9:83:75: c6:e7:66:36:41:6e:c2:1c:2e:55:21:b9:eb:42:e9:90: f5:94:f8:d7:3a:a2:bd:0b:0b:d2:ab:13:b2:d7:45:cf: 8f:11:58:f0:22:7a:03:88:ae:b1:63:fd:2d:3a:cf:2d: 00:92:b9:92:45:4b:0c:b4:a4:2c:05:79:c1:a5:c6:02: 43:3d:69:ef:9f:cd:76:3c:d0:ca:f6:6e:9d:7f:87:26: 25:c3:30:0b:a9:6b:07:dd:ff:e6:5f:06:94:8f:4a:30: 12:7b:f6:61:5f:fd:b9:41:58:b1:97:6a:ad:e2:c3:9f: 8c:c2:6b:0f:56:c4:44:1c:4d:78:f5:90:5c:7e:ea:be: 9e:5c:cb:0b:07:b4:c6:fe:69:38:e2:07:e2:8f:d2:9e: bb:1e:3f:6a:b3:0a:3b:3e:8a:75:cf:5c:75:ef:4c:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:88:42:2c:66:e0:e4:6b:a3:0e:44:3c:02:a8:74:bf: f6:28:af:7a:fd:0b:0c:90:74:b7:db:63:ee:a5:45:b7: ca:9d:d9:b1:ec:6f:e9:84:b7:8c:6d:1b:61:2e:e4:ce: 4e:98:0e:d0:db:48:7f:1a:f6:3a:e6:40:2d:6f:06:4a: 21:35:a3:ba:2d:b0:85:63:7b:cc:09:48:7d:87:ec:0f: 6a:8d:49:8e:fa:bd:fa:56:ea:62:21:05:2a:cb:1b:ae: a0:b0:c1:41:2c:5d:9f:44:b2:78:d3:57:5a:f7:08:e9: 1e:1e:ed:75:85:f3:06:ab:bb:30:06:92:57:c4:3c:71: b6:43:d2:f6:9e:9c:27:15:1d:d0:ad:f1:77:da:2f:da: 74:2f:05:7b:fe:47:ab:32:04:e3:d5:05:99:fa:1e:20: bb:26:10:0f:a7:7b:22:19:b5:4f:c6:83:d7:36:46:24: d1:a8:ae:9e:a6:11:4d:2e:78:c1:c3:62:bf:68:35:b4: 55:94:f0:62:f5:28:ae:eb:bd:ed:97:f1:79:17:2d:32: c5:c3:47:dd:e6:72:c3:d0:b2:4b:4b:f3:09:29:7c:4c: 67:ee:ba:8b:e7:58:2e:1e:39:27:dd:fc:35:fd:01:60: 91:15:8e:57:80:90:2b:e3:b1:11:c2:c6:53:ca:f0:96 Fingerprint (SHA-256): 71:9D:AC:03:A0:1D:EA:D3:D8:84:CE:11:54:F6:E2:BD:78:F8:ED:D7:F0:D9:EE:C4:AF:CA:B8:26:D6:F0:10:10 Fingerprint (SHA1): 10:7A:AC:5C:14:90:26:EC:B9:D3:25:76:AC:34:F4:F9:37:D7:D0:96 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2049: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2050: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2051: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194643 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2052: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2053: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2054: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2055: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194644 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2056: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2057: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2058: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2059: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194645 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2060: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2061: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2062: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2063: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194646 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2064: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2065: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2066: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2067: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194647 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2068: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2069: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2070: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194643 (0x433ee253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:d8:f9:82:52:e7:ef:cf:13:e7:2c:49:15:be:8f: be:ff:85:17:96:b6:25:cd:10:33:c9:bd:23:c7:0f:d5: f1:f3:be:27:89:44:e4:34:24:3c:8a:1d:b2:93:e4:0c: c5:ca:0e:c1:fd:27:e2:bc:6c:13:cc:54:20:36:8c:f7: da:31:3b:a6:f1:6a:76:76:78:77:7f:a1:24:37:de:8d: 1a:0f:76:47:d2:59:0a:fa:b4:cb:32:a1:c0:1a:8a:52: 4d:50:6c:16:f5:1b:ba:9d:41:e4:09:1b:d0:84:04:26: 55:e2:21:a4:93:5c:0d:f0:8d:08:5c:32:55:12:d4:8e: 4d:0c:7d:15:ed:7c:20:59:70:51:d0:e6:3f:ac:d4:26: 9c:50:8e:b6:b6:bc:e9:bd:30:1d:b9:fd:c5:69:f1:6c: 70:af:b0:d8:25:a6:fc:8e:91:b1:cf:fd:03:15:75:e4: 22:b0:b2:b7:1d:fa:5a:06:1b:1f:d0:15:e6:46:ea:6e: 0b:d7:f3:d1:26:3d:81:02:11:4f:51:f5:e7:72:75:9a: 6a:d2:b9:f8:7b:d4:80:ff:05:ca:4a:91:2a:8e:ab:25: 61:9a:2d:a6:b3:67:75:fb:9d:78:46:49:86:5c:9d:e1: 63:6a:f4:9c:ed:18:b2:e8:e2:91:e9:be:53:15:25:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:c4:97:5a:53:98:22:ff:3e:c4:55:23:0d:d2:d8:a7: 3a:5d:82:f7:df:90:6f:5d:a2:3f:f8:32:c3:d0:33:49: 62:14:8b:75:4e:65:31:f1:00:f2:05:2d:23:65:17:72: 8e:ea:4f:b0:46:46:72:22:bf:5c:14:69:a8:03:62:0e: f2:02:88:4d:75:7b:70:1f:4d:ea:89:cc:78:ab:80:a3: 7d:f1:30:9e:e0:7f:d9:99:4f:73:74:4c:ce:ec:f5:2f: ee:c8:8e:10:80:70:18:53:9f:a6:a2:49:59:32:92:de: d0:a7:2b:5e:d5:59:f4:f7:8e:19:83:b8:8b:b9:05:26: bb:4c:dd:fc:87:da:7d:3f:41:fa:c9:7f:71:14:a7:12: 27:27:2e:9c:51:33:97:3f:d9:0b:ed:51:a6:41:07:53: 1b:d8:fe:5e:0e:e2:b0:b9:11:8d:63:ba:fb:8f:cf:8f: ad:3d:77:66:a4:40:03:56:12:8f:73:7b:6b:54:f0:c7: 39:7b:5c:25:a7:a0:04:81:a6:d1:df:eb:5b:54:c2:00: b4:83:12:ac:a8:c8:50:74:03:3e:4b:6f:24:d9:65:65: 66:35:cf:c7:88:07:8b:cb:cd:b3:a8:95:da:79:f2:c1: e6:72:37:02:3d:1f:d4:89:b7:74:d9:9c:c7:89:c5:5a Fingerprint (SHA-256): 37:CA:24:A8:DB:84:E4:88:E4:22:5C:A2:53:52:4C:A8:3D:AB:09:3B:F5:0C:E0:B0:3D:99:F9:1E:1D:5A:30:00 Fingerprint (SHA1): 89:6C:03:32:F6:24:3B:57:7B:4D:28:F4:59:7F:5D:C2:CC:5A:94:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2071: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2072: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194644 (0x433ee254) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:6e:3f:b9:d2:2a:12:60:55:a4:71:49:d6:86:f0:83: 46:df:eb:99:a0:23:ff:e6:32:96:c0:c0:8b:cc:0f:52: f7:23:c8:24:5d:7a:61:a6:12:c4:75:88:66:3f:01:4a: 41:4b:70:99:6d:ba:7d:5d:0e:f3:fa:ce:59:dc:23:98: 07:26:9b:23:65:4b:35:03:14:95:fa:2b:5d:90:e1:d7: ee:31:55:5b:91:8e:4d:6f:03:20:93:09:3c:53:ed:c3: 46:94:7e:b7:bc:8a:97:ae:0f:58:c6:90:dc:bb:60:1d: 25:07:d9:6d:b5:70:2a:b2:d2:16:8c:dd:83:8c:f3:18: 6a:34:5f:f3:e6:a8:ba:88:2f:78:aa:80:8c:e8:ba:f5: 1b:33:da:d7:a9:b2:c6:9f:37:50:f7:7a:ed:53:77:af: 66:e2:38:01:4c:bf:5c:8c:6b:38:ab:f8:a6:f2:c2:87: ca:98:e8:7c:73:dc:ed:62:96:0c:db:c9:79:e6:87:95: 7b:c2:33:c6:04:be:96:11:37:b8:a7:6e:d0:c5:01:ea: f2:aa:84:cf:d0:69:25:33:60:90:4a:d1:34:f2:43:09: 90:4d:a1:4f:40:7d:35:8c:2c:0f:33:09:e1:dd:03:fc: 69:01:cc:8d:bb:16:bf:1b:43:b2:76:f5:fa:bb:a3:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:cb:8b:7e:73:f3:11:92:e1:ec:d7:fc:8f:48:3a:7d: f7:89:c8:63:0c:15:66:9d:83:7f:54:76:7c:a1:b2:45: af:3e:65:d8:04:d4:2c:f6:37:aa:f5:04:e4:e9:dc:a4: 9c:73:a4:e5:55:77:dd:32:ca:59:d9:94:8d:db:a3:68: d9:8a:cc:bd:0a:cc:2d:e9:bd:84:38:7c:8e:bd:4f:a9: 2b:bd:48:5b:44:7b:66:3d:2b:72:cc:79:f3:84:47:99: 3e:10:21:ed:9f:da:31:26:fa:a9:f2:f7:db:68:d5:63: 7d:ce:77:fd:10:e5:5d:af:61:7c:0a:32:d4:d2:71:0e: 5a:72:98:d4:b1:7a:1e:b1:55:a6:a8:76:3b:1e:48:31: 6b:db:b6:ce:7b:91:41:97:a7:dc:15:1a:f0:0b:f9:2d: 4f:60:22:b7:d5:69:21:e6:96:4a:88:a6:27:5b:bd:11: 8c:47:ef:47:91:e4:6e:ac:f0:4f:7e:41:78:72:9c:7c: 46:d4:eb:a8:3e:5a:b1:88:d5:0e:6c:ed:1c:d0:3b:b9: d3:bd:98:aa:ff:ef:de:d5:22:b8:91:54:66:1b:83:34: 6f:26:2a:09:33:fe:fb:a0:84:37:1b:b0:53:f4:80:81: 19:31:f2:e6:3c:c6:9c:2c:9c:fd:0e:6b:da:f6:29:fb Fingerprint (SHA-256): BA:8D:5A:58:A2:2A:12:B5:80:8F:69:F7:A7:11:91:CD:82:23:9E:DD:4F:92:27:59:7C:BC:EB:DE:EF:FD:C5:68 Fingerprint (SHA1): 80:54:DC:8E:C1:4D:7D:61:C8:50:0F:82:C8:CA:A2:8C:B7:4B:DB:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2073: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2074: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194645 (0x433ee255) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:30 2025 Not After : Thu Nov 28 11:48:30 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:33:ee:eb:8b:66:a5:84:1b:df:9a:fb:cf:f3:10:57: e6:71:b3:02:cc:91:ba:72:4d:8b:d3:43:9b:e2:ac:76: 2a:48:af:85:a7:b8:fd:fd:73:f3:4d:90:3a:26:36:f0: eb:d4:b0:23:24:ef:bb:bc:8d:be:5b:d8:87:63:71:c4: 21:d6:ac:f7:a1:18:08:62:75:c5:23:bd:50:b4:10:26: 75:78:5a:56:70:91:25:1f:3b:c2:c5:4e:cf:46:9c:29: 32:db:0d:8c:2e:82:59:62:13:98:71:20:9a:c0:63:86: 94:d2:ec:0f:15:a2:4f:c3:c5:dd:e3:96:29:c3:bd:c9: b8:67:c4:2a:42:ae:7f:4a:f0:c7:46:a6:d0:e8:d7:94: 52:c7:3d:c5:69:8e:c5:25:bb:97:84:c5:9e:5c:e4:e2: 5f:25:14:ad:d5:ea:36:83:41:e6:b3:c6:f9:7c:19:94: 26:60:32:16:f7:be:d3:b9:5f:92:36:7a:a3:22:c2:ba: 03:71:40:7a:46:e2:2a:05:a7:a4:79:8e:8b:08:37:da: fc:0a:a2:ba:64:2e:b0:46:ab:53:6e:cc:45:c9:2f:df: 88:3d:9f:63:db:13:c2:64:b8:18:9f:66:74:52:bb:76: 6f:0e:ce:77:52:a0:b9:b3:3d:0b:c9:9e:3a:95:03:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:71:0f:8e:c7:d3:2d:ef:f1:ef:5f:48:16:97:e1: 87:97:4a:77:3d:85:b3:e9:61:e9:82:ce:ad:47:7b:ba: 47:5d:38:c4:d9:52:7b:43:b2:b9:10:dd:f7:65:ff:33: 28:cb:9e:d4:58:18:dd:23:43:26:b5:9c:b1:89:0f:a9: 4d:f6:81:bb:6a:4d:4a:1e:74:ee:d4:01:85:63:8c:f3: ad:74:7a:51:72:c0:fd:ab:4c:1b:fc:97:c3:24:d2:c0: 75:d7:31:43:ff:c5:89:6a:7f:00:27:1a:11:e5:db:bf: a3:7c:8e:56:7e:f9:c6:03:3f:43:57:f6:a6:5e:33:3a: 6e:c5:1e:a6:f0:de:8a:21:01:a1:af:b2:37:f8:be:6c: a0:16:e2:f5:d0:1e:43:67:4b:0b:68:df:12:af:fd:2c: b2:f4:3e:f2:14:7d:af:28:2f:fd:8e:5c:2a:be:24:c7: 29:85:f9:7d:ce:17:2a:1b:e1:fa:bd:eb:8e:73:6d:9d: 5b:b2:56:00:f9:12:e8:1c:61:82:11:44:c4:bb:16:de: 0c:4e:b0:b6:83:0a:64:c7:1b:16:aa:c9:23:cd:68:4a: c5:64:14:f5:5f:3e:02:0a:68:e9:2d:1c:9f:93:eb:5c: 27:a7:aa:8c:fe:91:d7:1e:59:30:ab:af:d6:38:c4:7f Fingerprint (SHA-256): AE:73:3A:5C:F1:EB:C9:91:DB:ED:79:6C:8A:74:DD:E8:21:75:C4:A5:E6:2C:CB:9E:5A:3C:3F:A2:E6:1C:2E:3E Fingerprint (SHA1): 90:C9:77:A5:C8:34:1F:51:CA:8E:9A:D9:8D:8C:6B:59:C0:DA:61:50 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2075: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2076: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2077: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2078: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2079: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194643 (0x433ee253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:d8:f9:82:52:e7:ef:cf:13:e7:2c:49:15:be:8f: be:ff:85:17:96:b6:25:cd:10:33:c9:bd:23:c7:0f:d5: f1:f3:be:27:89:44:e4:34:24:3c:8a:1d:b2:93:e4:0c: c5:ca:0e:c1:fd:27:e2:bc:6c:13:cc:54:20:36:8c:f7: da:31:3b:a6:f1:6a:76:76:78:77:7f:a1:24:37:de:8d: 1a:0f:76:47:d2:59:0a:fa:b4:cb:32:a1:c0:1a:8a:52: 4d:50:6c:16:f5:1b:ba:9d:41:e4:09:1b:d0:84:04:26: 55:e2:21:a4:93:5c:0d:f0:8d:08:5c:32:55:12:d4:8e: 4d:0c:7d:15:ed:7c:20:59:70:51:d0:e6:3f:ac:d4:26: 9c:50:8e:b6:b6:bc:e9:bd:30:1d:b9:fd:c5:69:f1:6c: 70:af:b0:d8:25:a6:fc:8e:91:b1:cf:fd:03:15:75:e4: 22:b0:b2:b7:1d:fa:5a:06:1b:1f:d0:15:e6:46:ea:6e: 0b:d7:f3:d1:26:3d:81:02:11:4f:51:f5:e7:72:75:9a: 6a:d2:b9:f8:7b:d4:80:ff:05:ca:4a:91:2a:8e:ab:25: 61:9a:2d:a6:b3:67:75:fb:9d:78:46:49:86:5c:9d:e1: 63:6a:f4:9c:ed:18:b2:e8:e2:91:e9:be:53:15:25:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:c4:97:5a:53:98:22:ff:3e:c4:55:23:0d:d2:d8:a7: 3a:5d:82:f7:df:90:6f:5d:a2:3f:f8:32:c3:d0:33:49: 62:14:8b:75:4e:65:31:f1:00:f2:05:2d:23:65:17:72: 8e:ea:4f:b0:46:46:72:22:bf:5c:14:69:a8:03:62:0e: f2:02:88:4d:75:7b:70:1f:4d:ea:89:cc:78:ab:80:a3: 7d:f1:30:9e:e0:7f:d9:99:4f:73:74:4c:ce:ec:f5:2f: ee:c8:8e:10:80:70:18:53:9f:a6:a2:49:59:32:92:de: d0:a7:2b:5e:d5:59:f4:f7:8e:19:83:b8:8b:b9:05:26: bb:4c:dd:fc:87:da:7d:3f:41:fa:c9:7f:71:14:a7:12: 27:27:2e:9c:51:33:97:3f:d9:0b:ed:51:a6:41:07:53: 1b:d8:fe:5e:0e:e2:b0:b9:11:8d:63:ba:fb:8f:cf:8f: ad:3d:77:66:a4:40:03:56:12:8f:73:7b:6b:54:f0:c7: 39:7b:5c:25:a7:a0:04:81:a6:d1:df:eb:5b:54:c2:00: b4:83:12:ac:a8:c8:50:74:03:3e:4b:6f:24:d9:65:65: 66:35:cf:c7:88:07:8b:cb:cd:b3:a8:95:da:79:f2:c1: e6:72:37:02:3d:1f:d4:89:b7:74:d9:9c:c7:89:c5:5a Fingerprint (SHA-256): 37:CA:24:A8:DB:84:E4:88:E4:22:5C:A2:53:52:4C:A8:3D:AB:09:3B:F5:0C:E0:B0:3D:99:F9:1E:1D:5A:30:00 Fingerprint (SHA1): 89:6C:03:32:F6:24:3B:57:7B:4D:28:F4:59:7F:5D:C2:CC:5A:94:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2080: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2081: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194644 (0x433ee254) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:6e:3f:b9:d2:2a:12:60:55:a4:71:49:d6:86:f0:83: 46:df:eb:99:a0:23:ff:e6:32:96:c0:c0:8b:cc:0f:52: f7:23:c8:24:5d:7a:61:a6:12:c4:75:88:66:3f:01:4a: 41:4b:70:99:6d:ba:7d:5d:0e:f3:fa:ce:59:dc:23:98: 07:26:9b:23:65:4b:35:03:14:95:fa:2b:5d:90:e1:d7: ee:31:55:5b:91:8e:4d:6f:03:20:93:09:3c:53:ed:c3: 46:94:7e:b7:bc:8a:97:ae:0f:58:c6:90:dc:bb:60:1d: 25:07:d9:6d:b5:70:2a:b2:d2:16:8c:dd:83:8c:f3:18: 6a:34:5f:f3:e6:a8:ba:88:2f:78:aa:80:8c:e8:ba:f5: 1b:33:da:d7:a9:b2:c6:9f:37:50:f7:7a:ed:53:77:af: 66:e2:38:01:4c:bf:5c:8c:6b:38:ab:f8:a6:f2:c2:87: ca:98:e8:7c:73:dc:ed:62:96:0c:db:c9:79:e6:87:95: 7b:c2:33:c6:04:be:96:11:37:b8:a7:6e:d0:c5:01:ea: f2:aa:84:cf:d0:69:25:33:60:90:4a:d1:34:f2:43:09: 90:4d:a1:4f:40:7d:35:8c:2c:0f:33:09:e1:dd:03:fc: 69:01:cc:8d:bb:16:bf:1b:43:b2:76:f5:fa:bb:a3:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:cb:8b:7e:73:f3:11:92:e1:ec:d7:fc:8f:48:3a:7d: f7:89:c8:63:0c:15:66:9d:83:7f:54:76:7c:a1:b2:45: af:3e:65:d8:04:d4:2c:f6:37:aa:f5:04:e4:e9:dc:a4: 9c:73:a4:e5:55:77:dd:32:ca:59:d9:94:8d:db:a3:68: d9:8a:cc:bd:0a:cc:2d:e9:bd:84:38:7c:8e:bd:4f:a9: 2b:bd:48:5b:44:7b:66:3d:2b:72:cc:79:f3:84:47:99: 3e:10:21:ed:9f:da:31:26:fa:a9:f2:f7:db:68:d5:63: 7d:ce:77:fd:10:e5:5d:af:61:7c:0a:32:d4:d2:71:0e: 5a:72:98:d4:b1:7a:1e:b1:55:a6:a8:76:3b:1e:48:31: 6b:db:b6:ce:7b:91:41:97:a7:dc:15:1a:f0:0b:f9:2d: 4f:60:22:b7:d5:69:21:e6:96:4a:88:a6:27:5b:bd:11: 8c:47:ef:47:91:e4:6e:ac:f0:4f:7e:41:78:72:9c:7c: 46:d4:eb:a8:3e:5a:b1:88:d5:0e:6c:ed:1c:d0:3b:b9: d3:bd:98:aa:ff:ef:de:d5:22:b8:91:54:66:1b:83:34: 6f:26:2a:09:33:fe:fb:a0:84:37:1b:b0:53:f4:80:81: 19:31:f2:e6:3c:c6:9c:2c:9c:fd:0e:6b:da:f6:29:fb Fingerprint (SHA-256): BA:8D:5A:58:A2:2A:12:B5:80:8F:69:F7:A7:11:91:CD:82:23:9E:DD:4F:92:27:59:7C:BC:EB:DE:EF:FD:C5:68 Fingerprint (SHA1): 80:54:DC:8E:C1:4D:7D:61:C8:50:0F:82:C8:CA:A2:8C:B7:4B:DB:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2082: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2083: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194645 (0x433ee255) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:30 2025 Not After : Thu Nov 28 11:48:30 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:33:ee:eb:8b:66:a5:84:1b:df:9a:fb:cf:f3:10:57: e6:71:b3:02:cc:91:ba:72:4d:8b:d3:43:9b:e2:ac:76: 2a:48:af:85:a7:b8:fd:fd:73:f3:4d:90:3a:26:36:f0: eb:d4:b0:23:24:ef:bb:bc:8d:be:5b:d8:87:63:71:c4: 21:d6:ac:f7:a1:18:08:62:75:c5:23:bd:50:b4:10:26: 75:78:5a:56:70:91:25:1f:3b:c2:c5:4e:cf:46:9c:29: 32:db:0d:8c:2e:82:59:62:13:98:71:20:9a:c0:63:86: 94:d2:ec:0f:15:a2:4f:c3:c5:dd:e3:96:29:c3:bd:c9: b8:67:c4:2a:42:ae:7f:4a:f0:c7:46:a6:d0:e8:d7:94: 52:c7:3d:c5:69:8e:c5:25:bb:97:84:c5:9e:5c:e4:e2: 5f:25:14:ad:d5:ea:36:83:41:e6:b3:c6:f9:7c:19:94: 26:60:32:16:f7:be:d3:b9:5f:92:36:7a:a3:22:c2:ba: 03:71:40:7a:46:e2:2a:05:a7:a4:79:8e:8b:08:37:da: fc:0a:a2:ba:64:2e:b0:46:ab:53:6e:cc:45:c9:2f:df: 88:3d:9f:63:db:13:c2:64:b8:18:9f:66:74:52:bb:76: 6f:0e:ce:77:52:a0:b9:b3:3d:0b:c9:9e:3a:95:03:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:71:0f:8e:c7:d3:2d:ef:f1:ef:5f:48:16:97:e1: 87:97:4a:77:3d:85:b3:e9:61:e9:82:ce:ad:47:7b:ba: 47:5d:38:c4:d9:52:7b:43:b2:b9:10:dd:f7:65:ff:33: 28:cb:9e:d4:58:18:dd:23:43:26:b5:9c:b1:89:0f:a9: 4d:f6:81:bb:6a:4d:4a:1e:74:ee:d4:01:85:63:8c:f3: ad:74:7a:51:72:c0:fd:ab:4c:1b:fc:97:c3:24:d2:c0: 75:d7:31:43:ff:c5:89:6a:7f:00:27:1a:11:e5:db:bf: a3:7c:8e:56:7e:f9:c6:03:3f:43:57:f6:a6:5e:33:3a: 6e:c5:1e:a6:f0:de:8a:21:01:a1:af:b2:37:f8:be:6c: a0:16:e2:f5:d0:1e:43:67:4b:0b:68:df:12:af:fd:2c: b2:f4:3e:f2:14:7d:af:28:2f:fd:8e:5c:2a:be:24:c7: 29:85:f9:7d:ce:17:2a:1b:e1:fa:bd:eb:8e:73:6d:9d: 5b:b2:56:00:f9:12:e8:1c:61:82:11:44:c4:bb:16:de: 0c:4e:b0:b6:83:0a:64:c7:1b:16:aa:c9:23:cd:68:4a: c5:64:14:f5:5f:3e:02:0a:68:e9:2d:1c:9f:93:eb:5c: 27:a7:aa:8c:fe:91:d7:1e:59:30:ab:af:d6:38:c4:7f Fingerprint (SHA-256): AE:73:3A:5C:F1:EB:C9:91:DB:ED:79:6C:8A:74:DD:E8:21:75:C4:A5:E6:2C:CB:9E:5A:3C:3F:A2:E6:1C:2E:3E Fingerprint (SHA1): 90:C9:77:A5:C8:34:1F:51:CA:8E:9A:D9:8D:8C:6B:59:C0:DA:61:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2084: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2085: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194643 (0x433ee253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:d8:f9:82:52:e7:ef:cf:13:e7:2c:49:15:be:8f: be:ff:85:17:96:b6:25:cd:10:33:c9:bd:23:c7:0f:d5: f1:f3:be:27:89:44:e4:34:24:3c:8a:1d:b2:93:e4:0c: c5:ca:0e:c1:fd:27:e2:bc:6c:13:cc:54:20:36:8c:f7: da:31:3b:a6:f1:6a:76:76:78:77:7f:a1:24:37:de:8d: 1a:0f:76:47:d2:59:0a:fa:b4:cb:32:a1:c0:1a:8a:52: 4d:50:6c:16:f5:1b:ba:9d:41:e4:09:1b:d0:84:04:26: 55:e2:21:a4:93:5c:0d:f0:8d:08:5c:32:55:12:d4:8e: 4d:0c:7d:15:ed:7c:20:59:70:51:d0:e6:3f:ac:d4:26: 9c:50:8e:b6:b6:bc:e9:bd:30:1d:b9:fd:c5:69:f1:6c: 70:af:b0:d8:25:a6:fc:8e:91:b1:cf:fd:03:15:75:e4: 22:b0:b2:b7:1d:fa:5a:06:1b:1f:d0:15:e6:46:ea:6e: 0b:d7:f3:d1:26:3d:81:02:11:4f:51:f5:e7:72:75:9a: 6a:d2:b9:f8:7b:d4:80:ff:05:ca:4a:91:2a:8e:ab:25: 61:9a:2d:a6:b3:67:75:fb:9d:78:46:49:86:5c:9d:e1: 63:6a:f4:9c:ed:18:b2:e8:e2:91:e9:be:53:15:25:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:c4:97:5a:53:98:22:ff:3e:c4:55:23:0d:d2:d8:a7: 3a:5d:82:f7:df:90:6f:5d:a2:3f:f8:32:c3:d0:33:49: 62:14:8b:75:4e:65:31:f1:00:f2:05:2d:23:65:17:72: 8e:ea:4f:b0:46:46:72:22:bf:5c:14:69:a8:03:62:0e: f2:02:88:4d:75:7b:70:1f:4d:ea:89:cc:78:ab:80:a3: 7d:f1:30:9e:e0:7f:d9:99:4f:73:74:4c:ce:ec:f5:2f: ee:c8:8e:10:80:70:18:53:9f:a6:a2:49:59:32:92:de: d0:a7:2b:5e:d5:59:f4:f7:8e:19:83:b8:8b:b9:05:26: bb:4c:dd:fc:87:da:7d:3f:41:fa:c9:7f:71:14:a7:12: 27:27:2e:9c:51:33:97:3f:d9:0b:ed:51:a6:41:07:53: 1b:d8:fe:5e:0e:e2:b0:b9:11:8d:63:ba:fb:8f:cf:8f: ad:3d:77:66:a4:40:03:56:12:8f:73:7b:6b:54:f0:c7: 39:7b:5c:25:a7:a0:04:81:a6:d1:df:eb:5b:54:c2:00: b4:83:12:ac:a8:c8:50:74:03:3e:4b:6f:24:d9:65:65: 66:35:cf:c7:88:07:8b:cb:cd:b3:a8:95:da:79:f2:c1: e6:72:37:02:3d:1f:d4:89:b7:74:d9:9c:c7:89:c5:5a Fingerprint (SHA-256): 37:CA:24:A8:DB:84:E4:88:E4:22:5C:A2:53:52:4C:A8:3D:AB:09:3B:F5:0C:E0:B0:3D:99:F9:1E:1D:5A:30:00 Fingerprint (SHA1): 89:6C:03:32:F6:24:3B:57:7B:4D:28:F4:59:7F:5D:C2:CC:5A:94:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2086: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194643 (0x433ee253) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:c5:d8:f9:82:52:e7:ef:cf:13:e7:2c:49:15:be:8f: be:ff:85:17:96:b6:25:cd:10:33:c9:bd:23:c7:0f:d5: f1:f3:be:27:89:44:e4:34:24:3c:8a:1d:b2:93:e4:0c: c5:ca:0e:c1:fd:27:e2:bc:6c:13:cc:54:20:36:8c:f7: da:31:3b:a6:f1:6a:76:76:78:77:7f:a1:24:37:de:8d: 1a:0f:76:47:d2:59:0a:fa:b4:cb:32:a1:c0:1a:8a:52: 4d:50:6c:16:f5:1b:ba:9d:41:e4:09:1b:d0:84:04:26: 55:e2:21:a4:93:5c:0d:f0:8d:08:5c:32:55:12:d4:8e: 4d:0c:7d:15:ed:7c:20:59:70:51:d0:e6:3f:ac:d4:26: 9c:50:8e:b6:b6:bc:e9:bd:30:1d:b9:fd:c5:69:f1:6c: 70:af:b0:d8:25:a6:fc:8e:91:b1:cf:fd:03:15:75:e4: 22:b0:b2:b7:1d:fa:5a:06:1b:1f:d0:15:e6:46:ea:6e: 0b:d7:f3:d1:26:3d:81:02:11:4f:51:f5:e7:72:75:9a: 6a:d2:b9:f8:7b:d4:80:ff:05:ca:4a:91:2a:8e:ab:25: 61:9a:2d:a6:b3:67:75:fb:9d:78:46:49:86:5c:9d:e1: 63:6a:f4:9c:ed:18:b2:e8:e2:91:e9:be:53:15:25:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:c4:97:5a:53:98:22:ff:3e:c4:55:23:0d:d2:d8:a7: 3a:5d:82:f7:df:90:6f:5d:a2:3f:f8:32:c3:d0:33:49: 62:14:8b:75:4e:65:31:f1:00:f2:05:2d:23:65:17:72: 8e:ea:4f:b0:46:46:72:22:bf:5c:14:69:a8:03:62:0e: f2:02:88:4d:75:7b:70:1f:4d:ea:89:cc:78:ab:80:a3: 7d:f1:30:9e:e0:7f:d9:99:4f:73:74:4c:ce:ec:f5:2f: ee:c8:8e:10:80:70:18:53:9f:a6:a2:49:59:32:92:de: d0:a7:2b:5e:d5:59:f4:f7:8e:19:83:b8:8b:b9:05:26: bb:4c:dd:fc:87:da:7d:3f:41:fa:c9:7f:71:14:a7:12: 27:27:2e:9c:51:33:97:3f:d9:0b:ed:51:a6:41:07:53: 1b:d8:fe:5e:0e:e2:b0:b9:11:8d:63:ba:fb:8f:cf:8f: ad:3d:77:66:a4:40:03:56:12:8f:73:7b:6b:54:f0:c7: 39:7b:5c:25:a7:a0:04:81:a6:d1:df:eb:5b:54:c2:00: b4:83:12:ac:a8:c8:50:74:03:3e:4b:6f:24:d9:65:65: 66:35:cf:c7:88:07:8b:cb:cd:b3:a8:95:da:79:f2:c1: e6:72:37:02:3d:1f:d4:89:b7:74:d9:9c:c7:89:c5:5a Fingerprint (SHA-256): 37:CA:24:A8:DB:84:E4:88:E4:22:5C:A2:53:52:4C:A8:3D:AB:09:3B:F5:0C:E0:B0:3D:99:F9:1E:1D:5A:30:00 Fingerprint (SHA1): 89:6C:03:32:F6:24:3B:57:7B:4D:28:F4:59:7F:5D:C2:CC:5A:94:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2087: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194644 (0x433ee254) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:6e:3f:b9:d2:2a:12:60:55:a4:71:49:d6:86:f0:83: 46:df:eb:99:a0:23:ff:e6:32:96:c0:c0:8b:cc:0f:52: f7:23:c8:24:5d:7a:61:a6:12:c4:75:88:66:3f:01:4a: 41:4b:70:99:6d:ba:7d:5d:0e:f3:fa:ce:59:dc:23:98: 07:26:9b:23:65:4b:35:03:14:95:fa:2b:5d:90:e1:d7: ee:31:55:5b:91:8e:4d:6f:03:20:93:09:3c:53:ed:c3: 46:94:7e:b7:bc:8a:97:ae:0f:58:c6:90:dc:bb:60:1d: 25:07:d9:6d:b5:70:2a:b2:d2:16:8c:dd:83:8c:f3:18: 6a:34:5f:f3:e6:a8:ba:88:2f:78:aa:80:8c:e8:ba:f5: 1b:33:da:d7:a9:b2:c6:9f:37:50:f7:7a:ed:53:77:af: 66:e2:38:01:4c:bf:5c:8c:6b:38:ab:f8:a6:f2:c2:87: ca:98:e8:7c:73:dc:ed:62:96:0c:db:c9:79:e6:87:95: 7b:c2:33:c6:04:be:96:11:37:b8:a7:6e:d0:c5:01:ea: f2:aa:84:cf:d0:69:25:33:60:90:4a:d1:34:f2:43:09: 90:4d:a1:4f:40:7d:35:8c:2c:0f:33:09:e1:dd:03:fc: 69:01:cc:8d:bb:16:bf:1b:43:b2:76:f5:fa:bb:a3:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:cb:8b:7e:73:f3:11:92:e1:ec:d7:fc:8f:48:3a:7d: f7:89:c8:63:0c:15:66:9d:83:7f:54:76:7c:a1:b2:45: af:3e:65:d8:04:d4:2c:f6:37:aa:f5:04:e4:e9:dc:a4: 9c:73:a4:e5:55:77:dd:32:ca:59:d9:94:8d:db:a3:68: d9:8a:cc:bd:0a:cc:2d:e9:bd:84:38:7c:8e:bd:4f:a9: 2b:bd:48:5b:44:7b:66:3d:2b:72:cc:79:f3:84:47:99: 3e:10:21:ed:9f:da:31:26:fa:a9:f2:f7:db:68:d5:63: 7d:ce:77:fd:10:e5:5d:af:61:7c:0a:32:d4:d2:71:0e: 5a:72:98:d4:b1:7a:1e:b1:55:a6:a8:76:3b:1e:48:31: 6b:db:b6:ce:7b:91:41:97:a7:dc:15:1a:f0:0b:f9:2d: 4f:60:22:b7:d5:69:21:e6:96:4a:88:a6:27:5b:bd:11: 8c:47:ef:47:91:e4:6e:ac:f0:4f:7e:41:78:72:9c:7c: 46:d4:eb:a8:3e:5a:b1:88:d5:0e:6c:ed:1c:d0:3b:b9: d3:bd:98:aa:ff:ef:de:d5:22:b8:91:54:66:1b:83:34: 6f:26:2a:09:33:fe:fb:a0:84:37:1b:b0:53:f4:80:81: 19:31:f2:e6:3c:c6:9c:2c:9c:fd:0e:6b:da:f6:29:fb Fingerprint (SHA-256): BA:8D:5A:58:A2:2A:12:B5:80:8F:69:F7:A7:11:91:CD:82:23:9E:DD:4F:92:27:59:7C:BC:EB:DE:EF:FD:C5:68 Fingerprint (SHA1): 80:54:DC:8E:C1:4D:7D:61:C8:50:0F:82:C8:CA:A2:8C:B7:4B:DB:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2088: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194644 (0x433ee254) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:48:29 2025 Not After : Thu Nov 28 11:48:29 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:6e:3f:b9:d2:2a:12:60:55:a4:71:49:d6:86:f0:83: 46:df:eb:99:a0:23:ff:e6:32:96:c0:c0:8b:cc:0f:52: f7:23:c8:24:5d:7a:61:a6:12:c4:75:88:66:3f:01:4a: 41:4b:70:99:6d:ba:7d:5d:0e:f3:fa:ce:59:dc:23:98: 07:26:9b:23:65:4b:35:03:14:95:fa:2b:5d:90:e1:d7: ee:31:55:5b:91:8e:4d:6f:03:20:93:09:3c:53:ed:c3: 46:94:7e:b7:bc:8a:97:ae:0f:58:c6:90:dc:bb:60:1d: 25:07:d9:6d:b5:70:2a:b2:d2:16:8c:dd:83:8c:f3:18: 6a:34:5f:f3:e6:a8:ba:88:2f:78:aa:80:8c:e8:ba:f5: 1b:33:da:d7:a9:b2:c6:9f:37:50:f7:7a:ed:53:77:af: 66:e2:38:01:4c:bf:5c:8c:6b:38:ab:f8:a6:f2:c2:87: ca:98:e8:7c:73:dc:ed:62:96:0c:db:c9:79:e6:87:95: 7b:c2:33:c6:04:be:96:11:37:b8:a7:6e:d0:c5:01:ea: f2:aa:84:cf:d0:69:25:33:60:90:4a:d1:34:f2:43:09: 90:4d:a1:4f:40:7d:35:8c:2c:0f:33:09:e1:dd:03:fc: 69:01:cc:8d:bb:16:bf:1b:43:b2:76:f5:fa:bb:a3:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:cb:8b:7e:73:f3:11:92:e1:ec:d7:fc:8f:48:3a:7d: f7:89:c8:63:0c:15:66:9d:83:7f:54:76:7c:a1:b2:45: af:3e:65:d8:04:d4:2c:f6:37:aa:f5:04:e4:e9:dc:a4: 9c:73:a4:e5:55:77:dd:32:ca:59:d9:94:8d:db:a3:68: d9:8a:cc:bd:0a:cc:2d:e9:bd:84:38:7c:8e:bd:4f:a9: 2b:bd:48:5b:44:7b:66:3d:2b:72:cc:79:f3:84:47:99: 3e:10:21:ed:9f:da:31:26:fa:a9:f2:f7:db:68:d5:63: 7d:ce:77:fd:10:e5:5d:af:61:7c:0a:32:d4:d2:71:0e: 5a:72:98:d4:b1:7a:1e:b1:55:a6:a8:76:3b:1e:48:31: 6b:db:b6:ce:7b:91:41:97:a7:dc:15:1a:f0:0b:f9:2d: 4f:60:22:b7:d5:69:21:e6:96:4a:88:a6:27:5b:bd:11: 8c:47:ef:47:91:e4:6e:ac:f0:4f:7e:41:78:72:9c:7c: 46:d4:eb:a8:3e:5a:b1:88:d5:0e:6c:ed:1c:d0:3b:b9: d3:bd:98:aa:ff:ef:de:d5:22:b8:91:54:66:1b:83:34: 6f:26:2a:09:33:fe:fb:a0:84:37:1b:b0:53:f4:80:81: 19:31:f2:e6:3c:c6:9c:2c:9c:fd:0e:6b:da:f6:29:fb Fingerprint (SHA-256): BA:8D:5A:58:A2:2A:12:B5:80:8F:69:F7:A7:11:91:CD:82:23:9E:DD:4F:92:27:59:7C:BC:EB:DE:EF:FD:C5:68 Fingerprint (SHA1): 80:54:DC:8E:C1:4D:7D:61:C8:50:0F:82:C8:CA:A2:8C:B7:4B:DB:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2089: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194645 (0x433ee255) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:30 2025 Not After : Thu Nov 28 11:48:30 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:33:ee:eb:8b:66:a5:84:1b:df:9a:fb:cf:f3:10:57: e6:71:b3:02:cc:91:ba:72:4d:8b:d3:43:9b:e2:ac:76: 2a:48:af:85:a7:b8:fd:fd:73:f3:4d:90:3a:26:36:f0: eb:d4:b0:23:24:ef:bb:bc:8d:be:5b:d8:87:63:71:c4: 21:d6:ac:f7:a1:18:08:62:75:c5:23:bd:50:b4:10:26: 75:78:5a:56:70:91:25:1f:3b:c2:c5:4e:cf:46:9c:29: 32:db:0d:8c:2e:82:59:62:13:98:71:20:9a:c0:63:86: 94:d2:ec:0f:15:a2:4f:c3:c5:dd:e3:96:29:c3:bd:c9: b8:67:c4:2a:42:ae:7f:4a:f0:c7:46:a6:d0:e8:d7:94: 52:c7:3d:c5:69:8e:c5:25:bb:97:84:c5:9e:5c:e4:e2: 5f:25:14:ad:d5:ea:36:83:41:e6:b3:c6:f9:7c:19:94: 26:60:32:16:f7:be:d3:b9:5f:92:36:7a:a3:22:c2:ba: 03:71:40:7a:46:e2:2a:05:a7:a4:79:8e:8b:08:37:da: fc:0a:a2:ba:64:2e:b0:46:ab:53:6e:cc:45:c9:2f:df: 88:3d:9f:63:db:13:c2:64:b8:18:9f:66:74:52:bb:76: 6f:0e:ce:77:52:a0:b9:b3:3d:0b:c9:9e:3a:95:03:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:71:0f:8e:c7:d3:2d:ef:f1:ef:5f:48:16:97:e1: 87:97:4a:77:3d:85:b3:e9:61:e9:82:ce:ad:47:7b:ba: 47:5d:38:c4:d9:52:7b:43:b2:b9:10:dd:f7:65:ff:33: 28:cb:9e:d4:58:18:dd:23:43:26:b5:9c:b1:89:0f:a9: 4d:f6:81:bb:6a:4d:4a:1e:74:ee:d4:01:85:63:8c:f3: ad:74:7a:51:72:c0:fd:ab:4c:1b:fc:97:c3:24:d2:c0: 75:d7:31:43:ff:c5:89:6a:7f:00:27:1a:11:e5:db:bf: a3:7c:8e:56:7e:f9:c6:03:3f:43:57:f6:a6:5e:33:3a: 6e:c5:1e:a6:f0:de:8a:21:01:a1:af:b2:37:f8:be:6c: a0:16:e2:f5:d0:1e:43:67:4b:0b:68:df:12:af:fd:2c: b2:f4:3e:f2:14:7d:af:28:2f:fd:8e:5c:2a:be:24:c7: 29:85:f9:7d:ce:17:2a:1b:e1:fa:bd:eb:8e:73:6d:9d: 5b:b2:56:00:f9:12:e8:1c:61:82:11:44:c4:bb:16:de: 0c:4e:b0:b6:83:0a:64:c7:1b:16:aa:c9:23:cd:68:4a: c5:64:14:f5:5f:3e:02:0a:68:e9:2d:1c:9f:93:eb:5c: 27:a7:aa:8c:fe:91:d7:1e:59:30:ab:af:d6:38:c4:7f Fingerprint (SHA-256): AE:73:3A:5C:F1:EB:C9:91:DB:ED:79:6C:8A:74:DD:E8:21:75:C4:A5:E6:2C:CB:9E:5A:3C:3F:A2:E6:1C:2E:3E Fingerprint (SHA1): 90:C9:77:A5:C8:34:1F:51:CA:8E:9A:D9:8D:8C:6B:59:C0:DA:61:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2090: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194645 (0x433ee255) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:48:30 2025 Not After : Thu Nov 28 11:48:30 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:33:ee:eb:8b:66:a5:84:1b:df:9a:fb:cf:f3:10:57: e6:71:b3:02:cc:91:ba:72:4d:8b:d3:43:9b:e2:ac:76: 2a:48:af:85:a7:b8:fd:fd:73:f3:4d:90:3a:26:36:f0: eb:d4:b0:23:24:ef:bb:bc:8d:be:5b:d8:87:63:71:c4: 21:d6:ac:f7:a1:18:08:62:75:c5:23:bd:50:b4:10:26: 75:78:5a:56:70:91:25:1f:3b:c2:c5:4e:cf:46:9c:29: 32:db:0d:8c:2e:82:59:62:13:98:71:20:9a:c0:63:86: 94:d2:ec:0f:15:a2:4f:c3:c5:dd:e3:96:29:c3:bd:c9: b8:67:c4:2a:42:ae:7f:4a:f0:c7:46:a6:d0:e8:d7:94: 52:c7:3d:c5:69:8e:c5:25:bb:97:84:c5:9e:5c:e4:e2: 5f:25:14:ad:d5:ea:36:83:41:e6:b3:c6:f9:7c:19:94: 26:60:32:16:f7:be:d3:b9:5f:92:36:7a:a3:22:c2:ba: 03:71:40:7a:46:e2:2a:05:a7:a4:79:8e:8b:08:37:da: fc:0a:a2:ba:64:2e:b0:46:ab:53:6e:cc:45:c9:2f:df: 88:3d:9f:63:db:13:c2:64:b8:18:9f:66:74:52:bb:76: 6f:0e:ce:77:52:a0:b9:b3:3d:0b:c9:9e:3a:95:03:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:71:0f:8e:c7:d3:2d:ef:f1:ef:5f:48:16:97:e1: 87:97:4a:77:3d:85:b3:e9:61:e9:82:ce:ad:47:7b:ba: 47:5d:38:c4:d9:52:7b:43:b2:b9:10:dd:f7:65:ff:33: 28:cb:9e:d4:58:18:dd:23:43:26:b5:9c:b1:89:0f:a9: 4d:f6:81:bb:6a:4d:4a:1e:74:ee:d4:01:85:63:8c:f3: ad:74:7a:51:72:c0:fd:ab:4c:1b:fc:97:c3:24:d2:c0: 75:d7:31:43:ff:c5:89:6a:7f:00:27:1a:11:e5:db:bf: a3:7c:8e:56:7e:f9:c6:03:3f:43:57:f6:a6:5e:33:3a: 6e:c5:1e:a6:f0:de:8a:21:01:a1:af:b2:37:f8:be:6c: a0:16:e2:f5:d0:1e:43:67:4b:0b:68:df:12:af:fd:2c: b2:f4:3e:f2:14:7d:af:28:2f:fd:8e:5c:2a:be:24:c7: 29:85:f9:7d:ce:17:2a:1b:e1:fa:bd:eb:8e:73:6d:9d: 5b:b2:56:00:f9:12:e8:1c:61:82:11:44:c4:bb:16:de: 0c:4e:b0:b6:83:0a:64:c7:1b:16:aa:c9:23:cd:68:4a: c5:64:14:f5:5f:3e:02:0a:68:e9:2d:1c:9f:93:eb:5c: 27:a7:aa:8c:fe:91:d7:1e:59:30:ab:af:d6:38:c4:7f Fingerprint (SHA-256): AE:73:3A:5C:F1:EB:C9:91:DB:ED:79:6C:8A:74:DD:E8:21:75:C4:A5:E6:2C:CB:9E:5A:3C:3F:A2:E6:1C:2E:3E Fingerprint (SHA1): 90:C9:77:A5:C8:34:1F:51:CA:8E:9A:D9:8D:8C:6B:59:C0:DA:61:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2091: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2092: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194648 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2093: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2094: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2095: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2096: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194649 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2097: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2098: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2099: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2100: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194650 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2101: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2102: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2103: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2104: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128194651 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2105: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2106: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2107: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2108: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194652 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2109: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2110: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2111: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2112: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194653 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2113: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2114: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2115: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2116: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128194654 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2117: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2118: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2119: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2120: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2121: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2122: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2123: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194648 (0x433ee258) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:34 2025 Not After : Thu Nov 28 11:48:34 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:ba:ef:15:80:20:cd:f1:06:51:8f:e3:b0:a3:d3:58: ae:fc:4c:f9:52:87:61:15:32:5e:cf:95:3f:2f:29:37: f2:4e:c0:42:86:6a:22:7b:2b:a5:c7:7e:4f:8e:fc:d4: 56:a0:7c:52:e2:e8:2f:3e:d3:ff:49:8a:eb:fc:63:d8: ba:7c:92:84:e9:46:82:d8:19:a0:f3:f5:2e:0f:97:64: 53:87:77:be:6e:31:d4:51:2a:17:0d:65:df:68:cf:aa: 20:24:ad:c5:07:5a:90:ac:fb:3e:70:ba:da:e9:94:df: 46:67:eb:41:54:05:8c:9d:78:3b:f1:f1:8e:21:d1:95: 15:08:2a:e3:45:a1:a8:18:c1:4f:96:d3:42:e2:e4:1f: 2a:9d:8b:fc:d8:c3:eb:e5:cb:ba:75:ef:b9:93:18:23: bd:7c:43:50:c9:a9:1d:9b:77:9f:b6:9f:c8:48:26:3c: c2:ff:12:ec:1e:d0:dd:a0:5d:b1:11:16:83:ae:0b:b9: ad:53:94:d8:ef:64:80:48:7e:f0:05:df:b4:f1:3e:bc: ce:43:77:d5:61:76:74:9b:76:7c:05:40:92:ce:12:c8: ce:20:44:7c:be:d3:69:96:c0:e7:e1:e4:b6:11:21:27: 9e:fc:20:1f:e1:2c:37:19:9c:d1:f3:ea:6b:b2:d8:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:e8:42:9f:5b:fd:d3:51:23:75:23:43:7d:77:7d:dc: 41:64:16:36:85:2a:a6:c1:cb:bc:95:93:1c:9c:05:be: d8:d1:d2:08:4e:ff:d7:66:cb:e3:bc:f6:a5:59:f2:54: c2:95:bf:37:52:20:e5:8a:7c:3b:bc:be:d9:a2:99:1f: be:82:28:6f:cb:02:8d:e6:d1:2f:15:34:43:e9:06:45: 3a:fa:b2:53:bd:c4:bd:61:e7:a5:18:ed:64:b5:da:23: e0:ce:84:c5:79:40:f5:0d:73:e3:58:34:67:e4:86:5c: 39:b2:ea:d6:23:a1:0c:0c:e7:66:88:5b:de:14:23:08: 73:d9:06:b9:1b:3b:d0:84:27:f1:7b:38:9b:ce:e1:46: c4:65:b0:b4:c3:b0:9c:ea:d5:72:54:17:f2:a9:36:8f: 9d:65:97:fe:27:6f:ae:fb:b4:98:42:c8:2d:3a:3b:c1: 00:77:8b:6e:21:49:5e:cb:48:4b:98:7f:b1:fc:fe:5c: b4:2b:7a:60:13:74:f4:7d:27:6e:f2:75:77:55:d3:61: 7f:32:a2:f5:37:30:2d:62:55:4c:a2:ea:34:34:9c:21: b8:26:a7:6a:6d:bf:e7:7c:10:02:19:f1:8a:66:a0:04: 7e:9b:a4:10:30:01:df:42:fb:b0:22:6f:4a:b3:df:9b Fingerprint (SHA-256): 9A:3D:C7:23:BB:D4:A2:89:73:42:56:1C:1E:26:31:00:AB:3B:AE:A6:CC:C3:3F:38:E9:23:3E:6F:D6:3A:60:16 Fingerprint (SHA1): 4E:A9:2F:FF:25:EB:D9:C5:DB:7B:9E:0C:A2:39:41:40:50:15:A1:B5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2124: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2125: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2126: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2127: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194648 (0x433ee258) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:34 2025 Not After : Thu Nov 28 11:48:34 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:ba:ef:15:80:20:cd:f1:06:51:8f:e3:b0:a3:d3:58: ae:fc:4c:f9:52:87:61:15:32:5e:cf:95:3f:2f:29:37: f2:4e:c0:42:86:6a:22:7b:2b:a5:c7:7e:4f:8e:fc:d4: 56:a0:7c:52:e2:e8:2f:3e:d3:ff:49:8a:eb:fc:63:d8: ba:7c:92:84:e9:46:82:d8:19:a0:f3:f5:2e:0f:97:64: 53:87:77:be:6e:31:d4:51:2a:17:0d:65:df:68:cf:aa: 20:24:ad:c5:07:5a:90:ac:fb:3e:70:ba:da:e9:94:df: 46:67:eb:41:54:05:8c:9d:78:3b:f1:f1:8e:21:d1:95: 15:08:2a:e3:45:a1:a8:18:c1:4f:96:d3:42:e2:e4:1f: 2a:9d:8b:fc:d8:c3:eb:e5:cb:ba:75:ef:b9:93:18:23: bd:7c:43:50:c9:a9:1d:9b:77:9f:b6:9f:c8:48:26:3c: c2:ff:12:ec:1e:d0:dd:a0:5d:b1:11:16:83:ae:0b:b9: ad:53:94:d8:ef:64:80:48:7e:f0:05:df:b4:f1:3e:bc: ce:43:77:d5:61:76:74:9b:76:7c:05:40:92:ce:12:c8: ce:20:44:7c:be:d3:69:96:c0:e7:e1:e4:b6:11:21:27: 9e:fc:20:1f:e1:2c:37:19:9c:d1:f3:ea:6b:b2:d8:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:e8:42:9f:5b:fd:d3:51:23:75:23:43:7d:77:7d:dc: 41:64:16:36:85:2a:a6:c1:cb:bc:95:93:1c:9c:05:be: d8:d1:d2:08:4e:ff:d7:66:cb:e3:bc:f6:a5:59:f2:54: c2:95:bf:37:52:20:e5:8a:7c:3b:bc:be:d9:a2:99:1f: be:82:28:6f:cb:02:8d:e6:d1:2f:15:34:43:e9:06:45: 3a:fa:b2:53:bd:c4:bd:61:e7:a5:18:ed:64:b5:da:23: e0:ce:84:c5:79:40:f5:0d:73:e3:58:34:67:e4:86:5c: 39:b2:ea:d6:23:a1:0c:0c:e7:66:88:5b:de:14:23:08: 73:d9:06:b9:1b:3b:d0:84:27:f1:7b:38:9b:ce:e1:46: c4:65:b0:b4:c3:b0:9c:ea:d5:72:54:17:f2:a9:36:8f: 9d:65:97:fe:27:6f:ae:fb:b4:98:42:c8:2d:3a:3b:c1: 00:77:8b:6e:21:49:5e:cb:48:4b:98:7f:b1:fc:fe:5c: b4:2b:7a:60:13:74:f4:7d:27:6e:f2:75:77:55:d3:61: 7f:32:a2:f5:37:30:2d:62:55:4c:a2:ea:34:34:9c:21: b8:26:a7:6a:6d:bf:e7:7c:10:02:19:f1:8a:66:a0:04: 7e:9b:a4:10:30:01:df:42:fb:b0:22:6f:4a:b3:df:9b Fingerprint (SHA-256): 9A:3D:C7:23:BB:D4:A2:89:73:42:56:1C:1E:26:31:00:AB:3B:AE:A6:CC:C3:3F:38:E9:23:3E:6F:D6:3A:60:16 Fingerprint (SHA1): 4E:A9:2F:FF:25:EB:D9:C5:DB:7B:9E:0C:A2:39:41:40:50:15:A1:B5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2128: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2129: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2130: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194655 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2131: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2132: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2133: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2134: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194656 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2135: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2136: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2137: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2138: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128194657 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2139: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2140: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2141: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2142: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128194658 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2143: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2144: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2145: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2146: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128194659 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2147: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2148: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2149: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2150: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128194660 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2151: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2152: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2153: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2154: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128194661 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2155: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2156: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2157: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2158: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128194662 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2159: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2160: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #2161: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2162: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128194663 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2163: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2164: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #2165: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2166: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128194664 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2167: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2168: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2169: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2170: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128194665 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2171: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2172: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #2173: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2174: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128194666 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2175: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2176: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #2177: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2178: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128194667 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2179: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2180: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2181: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2182: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128194668 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2183: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2184: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #2185: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2186: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128194669 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2187: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2188: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #2189: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2190: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128194670 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2191: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2192: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #2193: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2194: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128194671 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2195: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2196: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #2197: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2198: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128194672 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2199: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2200: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #2201: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2202: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128194673 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2203: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2204: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #2205: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2206: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128194674 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2207: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2208: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #2209: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2210: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128194675 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2211: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2212: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #2213: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2214: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128194676 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2215: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2216: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #2217: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2218: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128194677 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2219: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2220: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #2221: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2222: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128194678 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2223: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2224: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #2225: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2226: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128194679 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2227: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2228: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #2229: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2230: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128194680 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2231: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2232: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #2233: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2234: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128194681 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2235: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2236: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #2237: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2238: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128194682 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2239: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2240: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #2241: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2242: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128194683 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2243: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2244: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #2245: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2246: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128194684 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2247: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2248: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2249: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2250: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2251: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2252: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2253: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2254: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2255: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2256: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2257: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2258: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2259: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2260: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2261: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2262: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2263: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2264: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2265: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2266: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2267: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2268: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2269: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2270: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2271: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194655 (0x433ee25f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:48:39 2025 Not After : Thu Nov 28 11:48:39 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 95:53:b8:26:a0:a4:81:8d:1c:58:91:83:2d:f9:64:be: 92:c2:d0:d8:2d:68:9e:ce:dd:80:09:e5:10:5f:78:e4: b8:93:1b:86:37:5d:14:10:2c:08:ac:0a:fc:bb:e9:b9: 2b:16:88:f6:ea:6b:31:36:f7:d6:ec:51:bf:7b:e0:85: 90:bd:02:53:6d:e0:bb:21:8b:0f:f4:8b:d5:85:d4:1c: e8:0b:83:c7:74:ec:52:39:8d:1c:89:19:3b:7a:5b:61: 13:b9:28:4b:09:18:5f:fd:ce:b3:20:d4:f0:45:89:e2: 77:89:c4:de:af:c4:b3:80:73:0e:11:0b:48:0d:30:18: 28:82:39:1a:f1:6a:f1:1d:eb:c3:36:c4:ba:dc:06:79: df:f1:92:12:40:8c:62:e4:01:e5:f7:63:ff:e9:25:08: 9c:ff:2f:6c:bf:2a:de:bc:61:9b:5e:11:86:8a:37:58: 62:47:f4:15:31:4b:99:61:92:1d:9e:94:b3:b8:0c:5e: 63:ca:f2:fc:ec:1b:f1:af:bf:fa:f4:9d:e1:3b:9c:66: b5:57:85:5b:59:a9:13:1e:aa:a5:72:19:1d:bd:6b:98: 3c:46:4d:f2:6a:50:b0:60:10:d1:67:97:70:63:c6:66: 44:71:8f:59:84:e2:8b:d6:4d:60:5f:d1:59:9b:47:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:e4:52:dc:58:bd:34:88:21:3a:b4:79:5b:a1:1d:86: f8:c1:e7:71:ed:97:27:30:fc:0e:12:9f:26:02:43:29: 42:48:3c:96:48:7c:cc:05:39:f8:7b:77:6e:b1:f2:05: b8:33:2a:56:60:00:21:40:25:93:f1:fb:32:45:05:89: 2f:13:d6:a8:fa:de:a0:7f:94:a6:8d:6f:b0:25:ba:5c: 1e:d8:c1:45:15:cb:06:0a:00:18:c0:7f:a6:bf:1b:b5: e8:86:5b:22:2a:f5:58:59:f3:72:79:ed:c7:b7:f2:f3: ed:e3:a5:2f:7a:2a:69:89:e6:0d:a3:15:5d:5e:1c:93: fa:a6:63:8f:9b:76:10:23:ee:d6:e1:17:44:0a:aa:d1: 59:a1:82:91:27:83:e3:48:42:6e:a3:f1:af:59:3a:52: 70:f8:34:e8:93:e6:34:93:fa:8d:27:67:a3:22:ec:1e: a4:4c:4f:d4:35:7d:1f:06:b4:51:df:9e:ec:40:98:07: fd:05:56:d5:93:09:66:fc:81:4f:a6:6d:c3:e9:a2:d3: 96:6e:46:42:28:13:0b:c1:1f:58:5b:58:2c:0d:49:07: cb:13:b2:af:b6:99:30:e4:d1:d4:35:fb:bf:b7:6d:9c: 7c:00:fa:15:ca:fc:91:b9:dd:69:52:47:84:0a:1f:a4 Fingerprint (SHA-256): 71:E2:7E:BA:B3:5A:FB:6A:B6:09:E5:BD:DF:CD:BF:AB:BD:FD:67:3C:B3:2F:6F:C8:49:42:29:40:07:3D:3B:39 Fingerprint (SHA1): A8:5A:1A:28:DF:32:AF:18:46:6F:A7:74:E9:98:58:BC:5E:7B:9B:DF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2272: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2273: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2274: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194685 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2275: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2276: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #2277: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2278: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128194686 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2279: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2280: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #2281: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2282: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128194687 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2283: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2284: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #2285: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2286: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128194688 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2287: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2288: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #2289: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2290: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128194689 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2291: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2292: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #2293: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2294: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128194690 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2295: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2296: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #2297: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2298: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128194691 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2299: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2300: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2301: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194685 (0x433ee27d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:02 2025 Not After : Thu Nov 28 11:49:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:6b:fa:7e:e2:3c:3c:0d:b1:1b:19:5e:d7:f2:7a:db: 70:bd:9a:99:39:27:cc:a2:80:57:b4:82:a6:1f:7b:8c: 1b:b8:79:63:12:a0:8e:a7:30:2b:64:ea:d5:fd:85:da: 8e:b0:f6:94:06:06:6c:d6:27:93:65:1f:9b:2e:7f:f8: 55:88:db:09:67:2e:7b:5e:66:c9:0f:b1:02:5f:c0:46: 1d:14:73:df:b0:9b:7d:c7:56:5a:fd:5c:d1:5c:08:1c: b8:d9:ce:69:f8:19:68:eb:3b:c9:d9:a7:13:a5:3d:17: 55:5c:5b:31:b0:a3:fd:ae:18:c2:34:61:cb:64:18:e0: c3:bf:9c:8e:2f:04:78:02:e7:e8:02:c8:6d:0b:d1:0b: 1d:43:9c:4b:33:7d:78:ef:35:11:1c:85:5d:a6:db:51: 0e:81:32:a9:be:c3:ff:a1:ea:ad:f8:98:5e:21:1a:2c: 35:26:ab:fe:8f:0c:bb:8d:47:9e:ce:65:4b:ed:23:ed: 39:37:b2:7d:23:5e:21:a7:51:65:95:8f:c5:ee:03:c7: e3:1e:58:23:92:97:0d:4a:19:37:ce:31:a3:56:76:75: 2d:61:65:80:67:2c:00:82:2b:93:44:c3:f8:cf:46:66: 22:25:91:e9:69:68:97:61:e3:4f:77:16:bb:55:27:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e1:13:10:65:5e:b3:bb:f0:e8:40:75:7b:3c:a9:75: bb:70:59:6d:5f:93:4e:5a:01:6b:da:28:2a:81:d1:0e: 62:a4:42:cc:63:15:27:f2:d6:78:62:26:fc:6a:31:bb: 03:6f:ac:b3:e2:0b:00:91:94:5b:cb:91:a4:85:14:8a: e3:79:30:59:38:3d:f6:25:67:c5:38:2e:d2:51:ab:70: c1:65:de:ac:5a:fb:15:69:17:9b:d6:64:b0:7d:de:58: be:d4:39:73:16:1d:88:21:b6:44:47:a4:c6:28:c0:3d: 5c:bf:42:6c:fa:49:9a:04:ed:1f:5f:6e:f5:21:8e:df: 81:0d:9d:c5:75:1c:91:9f:e4:26:e3:63:93:7b:48:c4: a0:f1:07:93:4f:42:c0:39:54:19:06:d5:2f:e6:1c:b6: 41:c0:21:00:eb:c1:1f:a3:6b:9f:e4:16:a5:bb:ea:aa: 0a:37:a0:0a:be:21:b2:4a:13:5f:8e:67:cc:ca:b7:48: e0:98:4e:77:98:9f:ae:ab:7d:c6:b1:ff:ad:f4:3a:0b: b6:ac:78:7a:47:62:f4:68:e6:50:05:9f:2f:06:16:d4: 14:47:12:e6:fd:53:31:d1:e9:d8:30:41:d8:27:c1:9b: b5:4b:1b:b4:49:bb:f3:3a:9d:b8:6d:17:ca:e3:69:9a Fingerprint (SHA-256): A0:E0:23:BB:D2:EB:FD:5E:D2:F4:33:B9:8F:BD:5C:2D:27:48:C6:12:3B:59:3B:8D:B8:65:2E:2F:AC:A9:E2:16 Fingerprint (SHA1): 58:4F:D9:FB:2C:47:29:1F:A8:16:17:39:37:27:22:90:0B:AB:FA:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #2302: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2303: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2304: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2305: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194685 (0x433ee27d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:02 2025 Not After : Thu Nov 28 11:49:02 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:6b:fa:7e:e2:3c:3c:0d:b1:1b:19:5e:d7:f2:7a:db: 70:bd:9a:99:39:27:cc:a2:80:57:b4:82:a6:1f:7b:8c: 1b:b8:79:63:12:a0:8e:a7:30:2b:64:ea:d5:fd:85:da: 8e:b0:f6:94:06:06:6c:d6:27:93:65:1f:9b:2e:7f:f8: 55:88:db:09:67:2e:7b:5e:66:c9:0f:b1:02:5f:c0:46: 1d:14:73:df:b0:9b:7d:c7:56:5a:fd:5c:d1:5c:08:1c: b8:d9:ce:69:f8:19:68:eb:3b:c9:d9:a7:13:a5:3d:17: 55:5c:5b:31:b0:a3:fd:ae:18:c2:34:61:cb:64:18:e0: c3:bf:9c:8e:2f:04:78:02:e7:e8:02:c8:6d:0b:d1:0b: 1d:43:9c:4b:33:7d:78:ef:35:11:1c:85:5d:a6:db:51: 0e:81:32:a9:be:c3:ff:a1:ea:ad:f8:98:5e:21:1a:2c: 35:26:ab:fe:8f:0c:bb:8d:47:9e:ce:65:4b:ed:23:ed: 39:37:b2:7d:23:5e:21:a7:51:65:95:8f:c5:ee:03:c7: e3:1e:58:23:92:97:0d:4a:19:37:ce:31:a3:56:76:75: 2d:61:65:80:67:2c:00:82:2b:93:44:c3:f8:cf:46:66: 22:25:91:e9:69:68:97:61:e3:4f:77:16:bb:55:27:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:e1:13:10:65:5e:b3:bb:f0:e8:40:75:7b:3c:a9:75: bb:70:59:6d:5f:93:4e:5a:01:6b:da:28:2a:81:d1:0e: 62:a4:42:cc:63:15:27:f2:d6:78:62:26:fc:6a:31:bb: 03:6f:ac:b3:e2:0b:00:91:94:5b:cb:91:a4:85:14:8a: e3:79:30:59:38:3d:f6:25:67:c5:38:2e:d2:51:ab:70: c1:65:de:ac:5a:fb:15:69:17:9b:d6:64:b0:7d:de:58: be:d4:39:73:16:1d:88:21:b6:44:47:a4:c6:28:c0:3d: 5c:bf:42:6c:fa:49:9a:04:ed:1f:5f:6e:f5:21:8e:df: 81:0d:9d:c5:75:1c:91:9f:e4:26:e3:63:93:7b:48:c4: a0:f1:07:93:4f:42:c0:39:54:19:06:d5:2f:e6:1c:b6: 41:c0:21:00:eb:c1:1f:a3:6b:9f:e4:16:a5:bb:ea:aa: 0a:37:a0:0a:be:21:b2:4a:13:5f:8e:67:cc:ca:b7:48: e0:98:4e:77:98:9f:ae:ab:7d:c6:b1:ff:ad:f4:3a:0b: b6:ac:78:7a:47:62:f4:68:e6:50:05:9f:2f:06:16:d4: 14:47:12:e6:fd:53:31:d1:e9:d8:30:41:d8:27:c1:9b: b5:4b:1b:b4:49:bb:f3:3a:9d:b8:6d:17:ca:e3:69:9a Fingerprint (SHA-256): A0:E0:23:BB:D2:EB:FD:5E:D2:F4:33:B9:8F:BD:5C:2D:27:48:C6:12:3B:59:3B:8D:B8:65:2E:2F:AC:A9:E2:16 Fingerprint (SHA1): 58:4F:D9:FB:2C:47:29:1F:A8:16:17:39:37:27:22:90:0B:AB:FA:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #2306: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2307: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2308: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2309: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194692 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2310: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2311: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2312: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2313: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194693 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2314: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2315: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2316: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2317: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194694 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2318: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2319: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2320: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2321: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194695 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2322: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2323: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2324: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2325: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2326: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2327: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194692 (0x433ee284) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:07 2025 Not After : Thu Nov 28 11:49:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:5e:bc:2a:05:fb:c0:28:6e:16:e3:d1:4d:3e:15:7d: 56:94:d8:2c:70:81:b9:8f:79:c3:1d:16:a6:9f:dc:71: dd:f6:77:10:46:3c:e2:11:57:49:4b:8e:db:a4:60:b5: 46:81:e4:37:3a:eb:a2:cc:58:16:06:53:9e:81:72:c2: 08:15:0c:d6:17:60:fe:78:9b:28:34:5e:13:3e:57:0a: 7d:37:72:f6:12:40:b4:ce:87:b5:19:07:e2:06:bb:d9: aa:f7:58:3e:fa:b4:9e:35:36:77:16:bd:3d:a6:0f:3f: dd:f7:32:c1:0b:51:5b:9a:90:0a:71:27:2c:42:ac:73: 5f:ac:16:6c:fd:77:f0:2d:87:aa:37:36:bb:66:19:f4: a7:34:a4:66:b4:91:66:21:6a:97:dd:de:f4:87:ab:92: 7e:d2:71:29:12:68:9f:5b:d3:47:2f:53:50:65:e3:26: 63:75:26:0e:b9:c4:bb:0c:36:3c:7e:39:17:b3:57:70: 9c:fb:c3:e5:33:69:56:0c:46:02:eb:7e:da:b8:a4:a3: 25:b0:39:41:30:b6:3b:41:3b:a0:8e:95:c7:33:e3:4b: cd:12:fa:d5:7d:ba:af:20:5e:5f:77:1c:cd:4d:0d:05: d0:dd:71:4e:a8:98:52:72:3a:09:6d:00:25:54:84:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:be:c8:00:5e:61:9d:dd:ee:57:1b:a7:f7:ee:27:3b: 80:78:7d:be:be:85:b1:60:e7:6f:59:81:52:07:bb:d5: 2a:9b:47:72:cf:39:20:8a:c6:41:03:71:2e:a4:9e:79: 76:94:b1:ef:d1:54:13:ac:2e:35:e2:86:35:18:ae:ef: 99:4e:e8:b5:c7:7a:8f:c3:ec:89:9b:aa:68:26:cb:39: 15:79:83:e0:d0:bb:18:12:7e:88:35:ef:eb:a0:9d:b4: 80:bd:f5:2f:5d:c2:41:03:44:04:a2:c8:3b:40:df:63: a1:aa:83:b0:fc:8a:b5:30:17:59:35:df:d6:87:96:1f: f3:c0:32:cc:a7:16:67:90:45:a0:de:e0:85:43:d2:3d: 1f:ac:d4:83:d4:20:35:50:20:1c:08:29:6f:06:b9:85: 0c:03:56:42:2a:9c:1b:d0:ce:c7:5e:17:ee:ea:76:71: 61:97:fe:7f:36:3c:87:29:28:65:89:74:8d:14:9e:f4: c2:4d:bd:e5:76:34:3d:81:a5:2f:35:ca:12:6e:07:b8: 6e:10:ad:43:47:6b:7f:45:37:0d:90:c9:8e:78:1a:b5: cd:3f:65:c0:eb:da:7a:87:de:22:d2:31:d6:9a:01:e0: 61:3a:a0:4b:25:c0:2f:61:71:27:6a:91:a7:01:59:d1 Fingerprint (SHA-256): B4:E4:4D:4D:F3:AC:72:D1:2E:0A:5A:AA:D0:B9:04:A7:DA:D4:94:B5:4F:78:21:78:64:6E:63:45:08:74:99:A9 Fingerprint (SHA1): D4:7D:4A:75:59:28:95:CF:9F:59:96:59:64:D9:DD:68:2E:B8:34:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2328: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2329: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2330: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194693 (0x433ee285) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:08 2025 Not After : Thu Nov 28 11:49:08 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:2e:2a:15:d7:f1:fc:c1:f2:50:7d:4d:f7:65:39:3e: c5:bb:c6:e6:31:2d:b9:6a:29:03:ee:55:d1:22:77:c4: 2a:40:dd:80:f4:e4:cb:5a:5d:e5:1b:b2:f5:c4:ea:de: f2:80:1e:db:82:c7:44:9d:20:0a:f4:2b:6d:5c:75:58: 56:90:12:9e:3c:9a:67:52:98:76:80:6c:81:44:14:d2: 2b:f0:48:c9:0e:28:79:18:c1:84:23:29:78:91:ee:90: a6:d2:00:da:1c:df:45:b9:e9:5e:0d:7d:be:1c:28:1b: c3:11:68:ba:3a:06:7d:64:f6:bb:69:66:51:64:78:a4: 29:58:75:bb:3a:4b:93:b4:d7:cc:3b:a8:31:53:b9:b4: 2f:c1:e9:92:8a:b0:f7:07:f1:85:d7:4a:8b:22:f6:1f: 05:b6:ac:21:5c:bd:1e:93:da:fa:85:a1:04:09:40:f5: bc:6e:f8:1c:08:59:38:72:17:59:57:69:d5:e9:5c:31: 3e:73:5a:be:cf:65:7a:d9:b4:e1:70:65:3b:1f:d8:44: c2:84:1d:40:a1:ae:0d:4c:17:28:41:a4:74:4c:5a:1f: 11:63:48:97:18:b3:89:f8:57:03:c8:00:b5:fa:23:cf: 1d:ba:0c:dd:fa:69:49:1a:97:d4:67:0f:3a:57:ff:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:bf:91:ed:ba:b1:c2:66:1e:1d:ae:a3:66:14:91:ee: 0e:4c:81:b5:d3:28:2e:07:0c:6b:b7:36:87:81:9b:58: 62:08:5a:ee:ae:ba:dc:f4:d5:d5:01:6f:10:ec:dd:26: 1c:01:b2:37:3f:34:84:df:dc:99:c8:b1:01:26:4a:9b: 35:7b:e5:aa:b3:76:c5:f6:9b:06:32:9c:06:df:c5:a3: 70:22:7e:e3:01:6b:db:5d:99:81:d1:09:54:78:f8:de: f6:7c:2a:56:67:40:cd:25:11:32:42:55:15:39:86:0f: 74:82:b2:15:f8:24:55:9e:04:cc:72:19:ad:04:cb:f3: d0:12:8a:5d:c3:fb:9c:de:e1:42:0d:d3:7b:75:e8:0f: 1b:2d:77:f7:76:b1:19:40:e8:3a:eb:0b:d8:01:fa:16: 9e:73:51:90:bc:71:16:a4:67:a2:ba:7f:b5:f2:12:26: ff:ba:98:c0:22:af:57:2a:99:0f:ee:32:30:72:a8:15: bb:43:b4:84:8b:73:5f:f2:4f:f7:3a:dd:4c:f8:ab:09: df:e4:1b:c8:37:85:39:b3:81:8f:77:9f:a1:20:e0:e4: 38:db:1f:a6:0d:4c:0b:d8:62:e4:3b:67:c7:86:dd:77: a4:c6:62:41:d6:89:41:b3:36:a2:ed:47:9c:b4:83:97 Fingerprint (SHA-256): E7:44:16:3F:96:E2:52:4B:AD:96:FD:24:72:BE:F7:7C:F0:AB:90:F2:FA:CA:0E:6E:3B:93:B8:71:3D:03:90:36 Fingerprint (SHA1): A4:C5:98:0F:10:5F:D4:93:99:12:DF:51:15:7D:8D:5A:E6:86:96:3B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2331: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2332: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194694 (0x433ee286) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:49:08 2025 Not After : Thu Nov 28 11:49:08 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:49:61:82:36:1a:1c:e3:5d:2b:5b:7e:51:81:dd:39: 04:88:40:a5:ef:a8:a7:ba:21:34:09:7e:58:a2:61:b6: 30:56:a7:5d:b0:ad:0b:2b:e0:b5:35:b0:d2:c3:87:65: df:18:08:2f:d2:87:67:56:c8:e8:b3:6f:20:a9:2e:17: ad:a2:45:ce:94:b6:38:ab:7a:59:7c:7b:75:5c:0f:b2: eb:16:bb:96:75:5c:41:5c:fd:40:0d:a8:c1:a0:2c:e3: be:67:71:4f:7f:bf:03:0a:2f:9e:d1:41:b6:f1:5b:b6: a7:32:4a:c1:44:98:ca:09:14:e9:98:b0:c3:a8:e7:ff: eb:3e:ff:b5:da:e9:4e:df:82:40:b5:97:8a:fa:90:93: 07:84:cb:7e:49:ad:13:02:0f:9a:59:62:0c:04:17:cf: ba:e0:71:5c:cb:fd:df:c2:31:c7:ab:43:f3:e5:b8:90: c7:c0:3e:53:ac:29:ac:d7:60:03:62:a7:ef:ef:01:02: c7:05:74:b6:08:8b:a7:8b:81:11:ce:c5:67:e2:aa:5b: 93:5e:9e:91:af:06:51:ae:7d:7f:0d:50:dd:83:65:39: 1e:e6:a2:69:02:ab:f9:93:a9:7c:f4:27:21:be:b2:c7: 56:9a:a5:be:b6:f1:29:df:fd:f1:c2:2e:94:4c:0d:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:b2:67:ed:56:04:c1:5d:9e:2e:b5:24:7d:33:78:1a: 48:5f:6a:68:7b:b1:a1:48:84:a9:25:b9:a4:a8:7c:be: 85:f6:f8:92:e3:0d:e8:3f:bf:b8:32:eb:8b:2c:38:36: 50:51:09:8a:28:4a:27:63:f6:bc:b5:b3:c7:74:33:f6: 44:3a:12:99:39:7b:c9:9f:ce:d6:d0:6f:2b:5b:02:eb: 33:d4:be:19:56:48:73:62:3d:31:4f:c2:b9:1c:20:82: 7a:1d:90:a6:a4:42:1c:5f:95:07:a1:3b:25:10:32:e4: 02:f3:8f:b3:cd:c3:01:b9:81:83:ef:76:f6:9e:fc:29: 9c:ad:cb:6b:cf:41:2a:33:62:7a:23:40:b3:a3:85:b8: b0:16:83:04:17:63:e7:a5:b0:4a:1c:8b:a7:2b:98:fc: aa:6e:03:96:92:d6:08:26:6f:e1:1c:b8:cd:a0:bf:cf: 43:8d:5b:da:99:ad:41:e6:80:c3:f2:f6:9d:f8:a0:cd: 70:3e:51:fc:77:24:4a:74:c0:2d:18:e3:89:da:c3:96: 14:14:e3:d2:a4:43:db:d8:1b:40:d3:61:b1:86:b7:35: ef:a1:0f:1d:34:ce:7d:d4:fb:62:9b:98:89:eb:fd:94: 5b:ed:bd:42:f5:86:b6:55:f0:35:3c:40:d4:85:b1:ce Fingerprint (SHA-256): B8:D0:71:CE:25:F2:A1:41:28:AB:74:97:0C:21:DD:43:EF:B4:B6:0E:01:15:B6:B7:12:EC:5F:D8:7E:01:12:80 Fingerprint (SHA1): E3:D2:A5:C2:47:DB:F9:90:71:16:6E:E7:36:AE:41:AB:EA:AC:CD:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2333: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2334: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194696 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2335: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2336: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2337: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2338: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194697 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2339: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2340: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2341: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2342: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194698 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2343: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2344: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2345: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2346: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128194699 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2347: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2348: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2349: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2350: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128194700 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2351: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2352: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2353: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2354: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2355: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2356: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #2357: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194696 (0x433ee288) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:11 2025 Not After : Thu Nov 28 11:49:11 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:e6:6b:fb:42:8a:92:9e:8a:8b:f9:ff:24:34:2d:7d: ba:4d:de:eb:9d:d8:6e:99:53:ea:34:06:d1:0f:cd:18: 1b:97:50:c1:47:36:35:f2:17:f6:f0:99:cf:98:a8:e4: a7:aa:d7:dc:d6:1a:b2:a4:f0:ed:0d:bd:12:57:01:4e: 9b:0a:5b:ce:0b:c4:b1:ec:3a:bd:3e:1d:b5:ba:a2:b8: 13:49:68:d4:cb:98:e6:7f:b3:07:cf:17:cf:59:99:37: ee:70:b7:23:8d:e7:a5:78:b4:26:1e:5b:e3:2e:1e:40: 90:6b:1d:1a:22:68:cd:aa:78:34:c6:2b:01:b7:8a:80: 54:a4:10:90:50:b4:a8:8e:67:16:b6:17:39:68:c9:14: 91:5c:1e:1e:7a:1e:8c:7c:a2:76:e3:e1:8b:ef:ab:0f: d8:a4:14:b3:67:d3:39:3d:9f:e1:a7:59:25:13:27:60: 26:e9:be:6f:ac:30:f1:e9:53:7d:59:76:0a:4e:7a:d1: ac:14:77:59:e2:60:c0:c9:e9:f6:4b:f2:2a:8f:a2:7f: d1:7e:04:72:fb:19:78:40:51:9f:2f:76:84:9d:c9:d8: bb:24:e7:f2:c9:94:a3:23:c9:1c:af:51:84:24:61:b9: fe:1f:52:ae:c5:8d:ad:4e:e5:01:8b:5a:8b:5c:ce:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:9e:20:2a:01:5b:e1:0e:99:6a:63:1e:7f:bc:5b:17: 67:b3:bc:a5:77:20:6c:cf:82:2a:1b:f2:c6:95:47:2f: 86:b7:8f:17:d0:da:fc:8b:0f:a9:7f:24:0b:7f:72:88: 6c:ec:01:c7:ac:ce:da:9b:4a:69:10:bc:2a:48:cb:dc: 0e:f4:48:5d:68:41:ac:ce:bf:7f:44:8c:b6:59:37:88: 5a:4e:22:dd:b2:f5:a6:0e:8c:4b:31:af:ae:11:72:93: 2a:b8:64:58:8e:47:05:9b:90:18:d8:cb:4a:23:ff:40: 55:1c:7d:b1:b7:50:81:f7:bf:01:60:49:9d:22:b9:2f: 43:1f:ae:b6:22:a2:b6:ab:6e:35:e0:f6:6d:f5:5a:59: 30:dd:e5:b3:7e:99:ea:46:56:12:a3:d1:d4:aa:02:9a: 20:2c:49:4f:6c:62:9a:23:7d:ac:dc:1e:65:a1:e3:04: a6:1a:d0:2f:0a:02:80:22:5c:21:75:56:ce:c0:52:b8: 37:af:1b:3e:08:91:21:55:aa:0f:41:81:88:e5:47:6d: 8c:82:7e:42:0e:0a:6e:ff:e3:27:e8:a4:39:9b:22:f0: db:8e:d7:e9:96:39:d9:ec:f3:89:75:0c:7c:6b:59:e5: 25:71:78:6a:23:ef:61:9b:58:92:31:35:27:bb:2b:2c Fingerprint (SHA-256): 35:3A:19:2D:78:F8:79:94:AE:E3:78:A9:2B:DF:F2:B7:42:FC:F2:F0:C2:B6:25:8C:F3:F1:93:29:B5:60:6F:E3 Fingerprint (SHA1): 08:46:B7:F7:34:35:9E:5A:3F:2C:31:C8:29:75:41:6A:A2:A6:BA:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2358: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2359: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194697 (0x433ee289) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:11 2025 Not After : Thu Nov 28 11:49:11 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:df:fb:4b:c1:50:4f:e5:32:ae:2d:12:65:82:43:64: 07:c6:43:bf:16:e6:a9:2e:b2:b9:b3:7b:b5:64:9a:7b: d8:e9:f6:00:68:16:30:54:cc:05:d2:5e:bb:54:10:53: 42:01:0a:2c:82:da:7e:8b:50:7f:81:a6:42:18:b0:94: 1a:b0:d8:e9:f8:f9:0d:bb:08:2c:80:f1:3b:79:c8:b7: 07:88:c8:8c:f7:c1:b9:16:e3:c2:db:c1:10:a0:63:e9: cc:d0:39:5b:4c:0c:3d:17:15:10:5a:4b:1c:63:af:b7: 1a:09:5b:af:1c:90:5c:f6:36:2a:cb:62:8f:b2:5f:0c: 06:be:80:2b:a7:92:18:3f:9d:62:a5:eb:92:35:56:d5: a9:8e:45:40:b2:8f:f9:2b:93:fe:d4:da:23:b4:10:b3: a9:15:7e:5f:ce:ea:34:cb:45:92:2a:6a:dd:3d:6b:f5: c9:72:1c:dc:14:a7:ff:d5:d8:0a:ed:32:fb:fd:39:f0: 87:df:40:01:f4:8e:7a:dd:d2:b9:e9:ca:9e:e1:61:aa: 95:29:3e:88:09:1c:f8:62:67:d4:13:8d:9f:12:d6:0d: bb:c9:92:64:27:7c:81:9b:f5:f0:de:31:bd:2a:02:f1: 60:09:36:34:e5:4c:81:af:50:cf:dc:9a:d8:99:68:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: db:be:71:53:3d:3c:f1:f4:e7:06:e9:08:28:a3:d5:f5: d8:d5:50:4b:0a:2a:13:35:c1:60:3b:bd:6e:97:2b:dd: 8a:4b:62:85:a9:b5:ea:3c:d7:96:8f:9b:41:eb:a4:4c: dd:99:4a:0e:9e:f8:a2:05:9c:eb:a1:5f:c4:4d:e1:99: f7:b2:68:e9:7c:63:28:52:4b:ca:60:8d:cf:71:fb:f8: e4:f0:43:cb:08:44:0d:40:e0:28:c5:90:b0:1a:1c:93: ab:6e:81:91:0b:74:8e:9a:03:34:05:af:9b:a0:9e:ca: e9:bb:5a:bf:62:40:74:d1:f0:84:07:8a:0a:cf:c3:0b: 67:93:a5:b4:97:15:60:37:02:49:74:98:1b:0c:38:dc: d2:5f:e8:8f:35:a7:0b:08:63:0b:28:b8:d7:03:10:2c: 52:0c:19:2a:0c:6b:53:ff:a6:32:a8:4d:89:69:e2:c1: 11:94:2d:e9:5e:12:09:c9:fa:77:39:98:fa:71:3d:53: ac:d5:b0:38:42:52:30:9e:9c:04:03:60:62:4d:32:de: 3b:f0:b7:ba:35:a5:ca:6d:bb:bc:b2:d7:86:c7:5c:6e: 44:f3:f7:4d:3c:2b:9c:20:91:2e:9d:06:44:ee:ef:c9: 20:3c:af:48:bc:6d:4d:c5:eb:43:1c:1a:00:ba:ed:06 Fingerprint (SHA-256): 07:45:54:49:E8:D4:A6:D3:E5:B4:D1:2D:86:29:FB:98:17:19:E6:CA:3D:F2:26:43:32:93:A6:A2:7A:B4:AB:35 Fingerprint (SHA1): E3:5F:80:5F:7C:5E:4D:14:2E:E0:C6:B5:A6:5B:89:EA:70:7C:BD:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2360: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2361: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2362: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194698 (0x433ee28a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:49:12 2025 Not After : Thu Nov 28 11:49:12 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:f6:12:24:47:45:83:83:2c:8e:34:da:fe:82:00:6f: 68:97:5e:dc:3e:7a:34:f0:d0:ad:39:7d:bb:6d:b4:e7: 6c:54:f4:83:6e:a2:44:e4:3b:18:d3:d7:a7:3d:d4:dc: 3f:4a:e9:02:c5:85:75:b1:c7:f4:28:f0:12:e5:4a:a0: 18:07:a1:de:ea:2a:b2:59:a2:ab:61:5e:f4:87:df:af: c6:43:86:e1:6b:69:bd:8e:46:6e:07:d7:5e:7f:2f:88: a7:a1:1f:38:e3:c5:d1:68:50:7f:65:fd:88:96:d5:95: 0e:74:13:3a:d2:76:b8:28:62:0f:06:f6:04:98:9a:5f: c2:7b:8f:2f:29:c7:bc:d2:82:73:40:ec:10:fe:5a:6e: 17:0d:4b:8f:11:34:97:e9:6f:42:e0:b2:60:eb:a6:9e: 33:03:ce:18:e1:18:19:6b:fc:4e:b1:74:e1:c8:1d:a5: f2:a1:b6:e3:48:e7:8e:fe:b8:42:91:a6:ff:94:33:dd: f7:5d:4e:f0:bb:12:9d:b6:1c:40:31:07:74:fd:c6:db: 92:3b:ac:5a:d2:28:47:63:8c:d7:9a:2a:e3:78:e8:a4: 49:a6:94:0f:74:0a:15:08:f7:43:88:f1:67:5d:fb:05: 8e:06:c0:ac:f1:2d:14:73:55:ac:b7:69:70:dc:50:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:a4:aa:c6:53:eb:48:a2:80:f1:9a:ec:40:d3:b0:85: 83:72:ce:03:b4:20:a7:0d:6c:f2:ca:0d:e3:18:fc:e5: e8:21:4c:10:a6:8a:34:19:8d:aa:c1:3e:bc:02:eb:8f: 2e:af:60:87:73:3b:f5:fa:23:2b:8d:53:be:b2:26:2e: dd:f8:d3:6a:d2:00:a7:15:36:a3:50:9f:8d:46:c5:73: 3e:b6:32:ee:af:00:62:de:8d:78:75:0b:ae:73:31:b3: 32:c4:ba:1a:72:56:4a:f6:0a:41:72:07:1f:8f:a0:33: 4f:95:55:e0:dc:a9:54:8b:3c:07:66:2c:3e:27:b9:bb: 2f:a3:f3:b6:d7:88:47:1a:4c:72:15:86:7a:ed:e3:70: 9c:9b:bc:1c:81:41:7e:89:4f:89:df:06:4a:47:1a:97: 92:71:da:ec:bb:89:5d:20:b8:16:a5:35:02:51:23:2f: a7:87:75:f1:02:92:70:15:54:47:21:34:20:34:23:89: 1d:09:ab:a2:e1:76:84:57:30:88:e0:41:13:18:f2:44: 98:15:7d:7b:7a:c7:5e:e4:1c:04:5a:04:67:7f:9f:1f: 9a:18:cf:52:6d:85:6d:0b:d2:5c:7d:58:d5:16:e9:b2: 26:24:6b:c7:c4:42:44:64:b7:e9:fd:cd:49:9e:56:71 Fingerprint (SHA-256): BF:59:A9:A7:EA:7F:37:4C:CA:3D:4B:00:19:D0:02:1E:1C:34:87:21:75:CB:5C:9D:91:AA:C1:19:2C:3F:64:52 Fingerprint (SHA1): 34:93:67:E7:2C:D4:43:7D:70:76:86:03:8F:D1:F0:FF:6F:F1:4B:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #2363: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2364: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194701 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2365: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2366: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2367: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2368: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194702 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2369: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2370: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2371: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2372: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194703 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128194334.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2373: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2374: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2375: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2376: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194704 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2377: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2378: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #2379: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194701 (0x433ee28d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:14 2025 Not After : Thu Nov 28 11:49:14 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:dd:fb:77:13:79:b3:47:1c:12:bb:8a:89:11:8d:49: 68:f4:60:cf:b1:e0:a9:2f:5f:17:04:2a:41:4c:68:72: 2a:8d:db:b5:7e:82:22:ac:64:b3:af:85:9f:f7:d5:64: 63:06:36:64:ed:e1:6d:d5:3e:37:a5:62:ab:b2:ee:09: b6:91:ea:b5:80:92:46:95:40:3b:b2:2d:28:bc:6f:da: f4:2b:4b:3f:94:ba:1c:f8:0d:03:52:52:9d:1c:b4:a7: 00:e0:3b:8f:4c:fb:16:42:25:7d:35:92:5e:58:8e:a5: 4e:14:83:86:37:a8:48:54:26:06:91:a5:60:6a:d9:87: 4b:0f:91:25:a7:93:f3:c4:da:74:e3:bb:4d:f9:2f:a8: 16:2c:4a:5a:72:8d:93:06:8e:ba:60:4c:2c:a5:db:d5: 78:d7:75:7e:0f:d6:c7:50:04:4d:24:92:bb:ca:ef:16: 8c:93:eb:37:da:6c:1e:fb:79:0a:3b:c5:a8:db:cb:3a: 5a:27:e3:5f:9c:c6:c2:e4:2e:1f:e1:a5:55:4c:31:19: 7a:24:5d:4e:e7:40:ae:b4:0a:b3:5e:7e:11:37:ed:f3: 3f:af:1d:6f:fb:59:8c:40:54:c1:2c:88:3f:bf:05:14: 20:52:8d:d6:7e:84:9a:8a:b8:c3:f9:91:98:76:28:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:5f:44:6b:90:f7:32:a0:17:4d:0b:9c:6a:d5:6c:a5: 9d:e6:fa:b1:46:f1:ed:70:8f:b9:fe:52:91:4f:22:5e: a1:82:68:41:3e:95:e3:14:6e:54:af:2f:a3:59:63:48: 84:71:db:8d:16:88:33:8d:66:c3:1c:ae:4d:bf:82:fa: fe:ff:23:20:75:f7:dd:ab:3a:00:b7:a0:53:80:4d:03: d4:54:97:d1:c3:34:d9:88:18:5b:c4:69:78:1d:95:29: 11:22:51:e8:86:f9:70:5f:72:f7:c8:f6:ad:83:67:38: 6f:84:cd:69:16:a8:67:54:a7:23:1d:26:d8:1c:9e:d1: 36:c9:68:d8:17:e3:19:f4:ef:cc:42:2a:52:62:d0:41: 02:00:e7:54:5e:39:9c:2b:63:55:56:dc:51:dc:5b:be: 6f:e8:3f:c3:8b:45:1a:93:71:a2:a8:17:e2:15:33:5c: b2:84:5b:d9:35:e2:2a:37:ef:1b:53:4b:e0:29:86:35: 81:fe:b5:f5:0e:ce:b8:12:db:3b:33:3c:a6:11:2f:4f: 95:91:09:4e:fb:b9:8b:d9:96:ce:44:5e:36:03:36:d8: fd:4a:1c:63:3f:fa:d8:66:61:51:8d:62:c2:23:80:08: a6:87:e5:d3:55:92:f7:85:f3:5f:64:a7:24:a9:91:2f Fingerprint (SHA-256): 2B:92:36:99:F2:15:7D:EC:EA:02:B0:4C:5E:B5:CB:3A:ED:99:B2:64:DE:C3:C5:D1:B7:99:83:38:CA:10:11:C7 Fingerprint (SHA1): 35:22:9F:13:BB:76:65:68:56:BF:87:E9:C9:04:1B:95:CD:21:F5:6A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2380: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2381: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194705 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2382: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2383: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2384: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194706 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2385: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2386: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2387: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2388: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194707 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2389: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2390: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194708 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2391: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2392: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2393: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2394: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2395: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194709 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194335.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2396: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2397: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2398: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2399: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194710 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2400: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2401: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2402: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194705 (0x433ee291) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:49:17 2025 Not After : Thu Nov 28 11:49:17 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:04:47:b6:57:89:64:7a:97:c1:72:dd:4b:93:be:03: 2b:c9:93:94:fe:c5:5f:f6:5f:55:04:29:33:3a:07:f2: 5e:1e:42:aa:1e:28:c2:02:79:04:e9:a9:bf:f8:63:0b: d4:21:b1:5d:28:2e:80:fe:b9:5c:be:70:78:36:3e:a3: 55:55:b5:67:4e:52:8e:04:b6:dc:78:af:6e:9c:44:6c: fd:16:f5:f9:d1:9d:bf:f9:31:48:90:77:cb:ce:62:72: 87:80:12:55:a0:26:69:a5:60:1e:7d:e0:76:0f:2c:f8: aa:ec:07:9c:62:be:17:3f:4f:27:53:fd:c9:38:d2:29: 0b:ed:2c:ec:17:78:bc:7c:70:3e:42:c8:c3:33:bb:a4: cd:77:99:18:5c:ec:85:97:20:bd:77:49:bb:26:f8:29: e5:dd:9d:8c:a1:da:06:a1:01:72:1a:fc:4d:00:56:d5: 29:2c:bb:94:f8:f2:c8:85:c5:bb:8d:fc:a2:b2:8d:f0: 5f:44:f3:07:99:b9:0a:d8:3c:94:23:c8:ca:d7:22:2a: 03:f4:d5:6a:d6:88:e3:e2:e7:49:27:01:bf:4d:e9:88: 5a:d5:fb:16:42:09:f0:46:c8:63:e9:91:b8:70:05:d4: 9d:34:a6:f0:c5:0c:77:9b:cd:56:45:b5:81:69:d7:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:45:11:3e:d4:74:3e:95:c1:09:7e:d7:5f:4e:10:04: 80:2b:dc:bc:a0:3a:e2:38:a3:1c:af:3b:30:fe:44:b3: 3f:ce:8f:a5:04:05:0e:20:fe:7d:ed:a3:0c:9b:ca:64: ba:3f:72:e0:90:04:50:18:7d:ea:4b:7b:9a:b6:e3:11: a7:5c:a2:7c:ab:41:fe:f8:c4:f2:9c:af:a5:ac:74:2f: 78:b5:da:3e:d4:76:f1:df:5a:7e:a9:dc:00:5d:93:44: 70:17:4a:fd:10:09:c7:9d:c0:cf:0d:55:8b:f3:58:3e: db:af:21:e9:06:bb:9a:13:72:f0:bf:d6:00:2b:b9:c0: 07:a5:ec:0d:71:a1:60:68:ff:89:fd:92:45:24:bf:0d: 4d:0a:4b:32:ff:af:41:cc:bf:27:ff:d8:78:77:83:4c: 75:46:3c:47:c8:c3:53:87:dd:3f:b6:7c:a8:0d:2f:7f: 3e:3b:1e:9b:db:3b:ea:c8:b1:6a:6a:bc:ef:26:45:4f: 6c:c0:b4:ee:9d:be:b5:b1:42:8b:e0:f5:06:f4:9a:ee: e8:e5:f7:21:6a:cb:a5:aa:62:81:3d:60:e5:7a:38:50: 65:93:d1:94:79:de:0f:e2:54:3b:00:7c:84:13:87:d8: 39:b3:d8:ff:8d:60:54:3a:02:1a:f7:bc:7a:68:64:2b Fingerprint (SHA-256): BB:AD:83:F3:EA:ED:D8:8F:6B:BD:2C:43:94:50:B3:02:44:EA:23:29:70:8F:94:71:1E:DB:20:A2:31:43:4F:82 Fingerprint (SHA1): 4C:E9:7B:61:76:55:D4:62:CC:1D:9C:1D:96:43:0B:57:79:D6:9F:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2403: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194706 (0x433ee292) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:18 2025 Not After : Thu Nov 28 11:49:18 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:0a:79:8e:97:70:94:2f:19:ec:7c:9b:1b:1a:e6:42: 97:fd:05:8d:84:df:a5:4d:6a:8a:20:be:a0:0a:aa:a7: 14:6a:c4:87:af:a4:c6:18:b0:0f:96:ca:9f:c7:8f:ca: c4:a9:48:00:4b:90:5e:13:a0:6e:24:82:18:d5:12:98: 70:9e:87:90:d2:47:dc:d1:b1:88:87:b1:7a:36:c6:b9: 66:89:b1:f1:52:46:3e:03:2f:23:5a:c8:0b:b9:04:a0: 65:eb:e5:2c:a8:a3:79:ae:88:f9:3d:c9:6f:37:c0:1a: 7a:15:c3:00:59:a6:ff:bb:4e:4b:15:16:2e:c2:63:38: 76:8a:96:99:b9:5c:36:ab:04:93:48:4b:c3:81:5f:19: cd:d2:a4:e7:8b:c9:2f:9d:a5:d7:ed:65:89:57:e6:7d: 85:e7:17:1e:00:a8:0a:b9:2c:47:cd:02:73:55:b6:46: e0:22:df:bc:4e:a7:46:25:46:5a:82:dd:5a:93:da:b8: 0d:82:7b:73:d3:93:dd:42:28:76:50:3d:3c:ca:33:a8: 6d:47:79:11:e3:c5:fc:b9:7d:91:42:ac:39:28:be:3c: 12:1a:14:70:09:af:b9:40:25:66:57:ab:42:67:12:fe: 17:33:25:4e:42:d0:1a:cf:48:64:b5:fb:69:f3:06:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:a5:74:09:6e:c4:fd:84:63:05:fe:cc:ba:5d:16:41: 88:b8:84:d1:b6:d5:0b:4e:11:a3:e6:0b:94:03:e1:64: c9:7e:d3:b1:c2:25:dc:30:51:36:ca:37:b0:45:cf:51: af:a3:b6:ac:f4:f8:76:d3:c9:1d:64:c4:e7:ae:dc:4f: 72:1c:db:81:9f:fa:95:45:6c:d1:e3:c7:a0:dd:28:19: 31:45:7d:49:de:30:64:bf:dc:64:03:3b:e2:e6:d4:e1: d0:95:39:a5:a9:d0:5b:49:3b:e4:85:65:32:0d:99:ba: 0e:a0:51:45:71:40:35:3b:76:bb:42:e9:fb:05:70:83: 7d:3a:17:ff:93:d9:e4:cb:46:6a:af:e3:90:bc:73:d9: 96:d4:29:bd:aa:30:30:0c:55:48:11:4f:23:2b:02:d9: a7:8d:2c:3d:16:11:68:51:d3:c6:6f:7e:14:bc:54:65: 26:22:34:8e:2b:7e:27:8e:8e:35:96:ce:75:2e:48:4a: b3:17:1d:4c:9d:bb:fb:6a:2c:bc:e0:40:00:1b:11:86: f0:0c:f9:89:eb:23:a4:25:8b:86:7d:fa:dc:98:e3:97: 0b:22:02:48:95:dd:d9:48:b7:58:ef:50:01:0a:d2:79: 43:25:e0:98:93:c3:63:51:05:69:c5:ba:a3:b6:86:b1 Fingerprint (SHA-256): 0E:65:36:38:CB:D8:C9:9E:E1:F2:46:23:0F:03:FE:99:D4:B8:FF:56:77:C2:B8:EE:79:15:E6:78:49:DC:79:B0 Fingerprint (SHA1): 03:9B:58:6F:3A:BD:B2:A0:2F:FD:B0:89:DD:89:19:F4:AE:D4:72:5D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2404: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194706 (0x433ee292) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:18 2025 Not After : Thu Nov 28 11:49:18 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:0a:79:8e:97:70:94:2f:19:ec:7c:9b:1b:1a:e6:42: 97:fd:05:8d:84:df:a5:4d:6a:8a:20:be:a0:0a:aa:a7: 14:6a:c4:87:af:a4:c6:18:b0:0f:96:ca:9f:c7:8f:ca: c4:a9:48:00:4b:90:5e:13:a0:6e:24:82:18:d5:12:98: 70:9e:87:90:d2:47:dc:d1:b1:88:87:b1:7a:36:c6:b9: 66:89:b1:f1:52:46:3e:03:2f:23:5a:c8:0b:b9:04:a0: 65:eb:e5:2c:a8:a3:79:ae:88:f9:3d:c9:6f:37:c0:1a: 7a:15:c3:00:59:a6:ff:bb:4e:4b:15:16:2e:c2:63:38: 76:8a:96:99:b9:5c:36:ab:04:93:48:4b:c3:81:5f:19: cd:d2:a4:e7:8b:c9:2f:9d:a5:d7:ed:65:89:57:e6:7d: 85:e7:17:1e:00:a8:0a:b9:2c:47:cd:02:73:55:b6:46: e0:22:df:bc:4e:a7:46:25:46:5a:82:dd:5a:93:da:b8: 0d:82:7b:73:d3:93:dd:42:28:76:50:3d:3c:ca:33:a8: 6d:47:79:11:e3:c5:fc:b9:7d:91:42:ac:39:28:be:3c: 12:1a:14:70:09:af:b9:40:25:66:57:ab:42:67:12:fe: 17:33:25:4e:42:d0:1a:cf:48:64:b5:fb:69:f3:06:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:a5:74:09:6e:c4:fd:84:63:05:fe:cc:ba:5d:16:41: 88:b8:84:d1:b6:d5:0b:4e:11:a3:e6:0b:94:03:e1:64: c9:7e:d3:b1:c2:25:dc:30:51:36:ca:37:b0:45:cf:51: af:a3:b6:ac:f4:f8:76:d3:c9:1d:64:c4:e7:ae:dc:4f: 72:1c:db:81:9f:fa:95:45:6c:d1:e3:c7:a0:dd:28:19: 31:45:7d:49:de:30:64:bf:dc:64:03:3b:e2:e6:d4:e1: d0:95:39:a5:a9:d0:5b:49:3b:e4:85:65:32:0d:99:ba: 0e:a0:51:45:71:40:35:3b:76:bb:42:e9:fb:05:70:83: 7d:3a:17:ff:93:d9:e4:cb:46:6a:af:e3:90:bc:73:d9: 96:d4:29:bd:aa:30:30:0c:55:48:11:4f:23:2b:02:d9: a7:8d:2c:3d:16:11:68:51:d3:c6:6f:7e:14:bc:54:65: 26:22:34:8e:2b:7e:27:8e:8e:35:96:ce:75:2e:48:4a: b3:17:1d:4c:9d:bb:fb:6a:2c:bc:e0:40:00:1b:11:86: f0:0c:f9:89:eb:23:a4:25:8b:86:7d:fa:dc:98:e3:97: 0b:22:02:48:95:dd:d9:48:b7:58:ef:50:01:0a:d2:79: 43:25:e0:98:93:c3:63:51:05:69:c5:ba:a3:b6:86:b1 Fingerprint (SHA-256): 0E:65:36:38:CB:D8:C9:9E:E1:F2:46:23:0F:03:FE:99:D4:B8:FF:56:77:C2:B8:EE:79:15:E6:78:49:DC:79:B0 Fingerprint (SHA1): 03:9B:58:6F:3A:BD:B2:A0:2F:FD:B0:89:DD:89:19:F4:AE:D4:72:5D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2405: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2406: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194711 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2407: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2408: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2409: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194712 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2410: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2411: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2412: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2413: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194713 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2414: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2415: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194714 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2416: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2417: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2418: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2419: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2420: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194715 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194336.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2421: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2422: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2423: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2424: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194716 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2425: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2426: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2427: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2428: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194717 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128194337.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2429: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2430: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2431: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2432: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194718 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2433: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2434: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2435: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194711 (0x433ee297) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:49:22 2025 Not After : Thu Nov 28 11:49:22 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:da:f3:04:40:6a:b7:36:e3:9d:0d:10:41:55:67:e2: d5:d5:39:64:b1:82:ff:8c:a7:41:91:ec:48:ae:ca:cb: d0:de:d5:a4:11:f0:ac:20:60:c1:46:e6:d7:e7:6b:58: 76:a1:0b:f1:58:e9:5d:83:aa:ab:83:5e:e2:0a:4e:71: d4:c3:0e:55:2c:8c:65:81:46:2e:14:80:1e:b6:b8:92: 8a:b8:f7:9e:4f:eb:32:99:e7:07:6b:36:05:3a:13:b8: d1:34:5e:6d:65:fb:df:13:90:4e:c8:ef:02:d0:24:1b: 87:ab:fb:bb:77:5f:5d:92:8b:b1:60:78:10:15:76:1d: a7:7c:e1:e3:c0:a3:8a:90:4a:f8:a0:9d:40:dc:2c:5e: 0c:82:1d:d7:be:d1:35:47:78:5c:8d:2f:16:33:81:7c: 58:67:58:84:b2:b9:f6:c5:29:6c:28:84:3a:9e:21:4e: 56:e8:c9:d7:b9:cb:36:3b:db:17:df:63:67:7c:74:01: 37:36:d2:06:89:04:ce:45:80:00:d2:07:2a:3e:4f:8b: 69:9c:9d:6d:42:db:77:5e:18:46:3f:f3:80:28:df:cd: b3:b5:93:c4:f9:33:93:f0:6c:1c:4a:0c:2a:e1:af:b1: 4a:c3:dd:c7:e1:db:ce:fa:a7:09:80:2c:e2:e5:2a:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:d6:ce:ea:72:c0:2b:3d:86:79:50:47:f8:17:82:bb: db:4b:f8:d2:5a:1b:38:91:b8:9d:c7:54:7c:f9:71:be: ab:6d:a1:45:c7:54:ff:f7:5b:59:20:c3:bc:5d:d4:e2: eb:49:29:c1:b5:08:b8:e9:65:4b:08:67:ba:a9:48:fc: 03:80:1f:4d:6c:ef:15:3c:1e:a6:7e:a3:b0:88:e0:59: c9:ae:c2:da:2d:f1:62:ad:2d:89:94:51:e6:25:b5:16: 30:c3:57:8d:9b:6d:0f:ec:3d:4a:d9:9f:e9:b5:06:e8: bd:4a:e5:ca:3e:2c:45:6d:41:c0:bc:4e:0f:70:48:65: 31:67:ab:c5:86:7b:f8:aa:65:18:de:12:03:e5:e1:80: 45:b2:79:0d:1c:78:a4:c8:db:8a:7d:94:30:97:03:85: e6:37:df:e7:5a:4d:f8:45:06:a4:d2:ff:bf:bc:c2:8a: 4b:c8:03:90:5b:46:5d:09:e5:ac:d8:8a:64:2a:b3:a0: e7:54:bd:70:ba:97:5b:dd:89:89:a1:ea:54:1c:f0:cb: df:42:ef:d4:14:a2:a3:17:80:54:ca:cc:c2:f4:cb:7c: 35:f2:bc:24:6c:64:ec:78:73:8b:fe:9c:0d:dd:00:62: 57:2d:0c:57:5f:df:9f:76:28:97:2a:04:08:81:f6:40 Fingerprint (SHA-256): 2C:6F:9B:D3:8E:16:15:B4:C8:CE:9B:D5:C1:7E:B0:3A:C1:96:BC:E3:76:32:8A:0C:CB:CC:7E:5E:3C:06:1C:FF Fingerprint (SHA1): FF:1A:C3:89:6B:B4:1E:A2:B9:7E:DE:54:7A:82:78:81:CD:82:6B:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2436: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194712 (0x433ee298) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:23 2025 Not After : Thu Nov 28 11:49:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:96:81:c0:b3:5c:01:4f:c7:db:1f:72:9a:98:dc:89: 52:8d:15:92:16:00:f0:83:2d:04:14:43:12:3f:b3:5f: 76:29:3d:8a:3a:50:ad:ad:50:ca:bc:d1:4a:7a:e0:59: dd:ab:c4:d6:ce:90:84:43:22:94:ae:9f:d7:82:ce:be: f5:b1:5e:0f:2e:43:e4:c9:58:ec:67:80:5e:b5:7e:78: 7b:77:0b:05:fb:70:a6:8e:ea:8b:3b:5d:53:b4:b0:47: 51:6d:88:58:9d:d7:de:2d:d5:07:f6:31:47:8a:ff:d5: 6e:4e:86:58:42:90:28:cb:6b:bd:d4:16:01:98:91:1f: 1e:94:a8:c1:70:a2:32:49:0c:4c:06:86:72:e9:52:16: 20:d4:d8:5b:f2:d6:b5:c6:7e:4d:48:4e:41:d6:36:86: 1a:36:b5:d7:a7:df:62:d5:05:2f:a8:d1:0c:d6:53:d9: 05:53:86:ed:83:87:9b:03:83:2f:c1:e3:fa:3d:e8:09: 67:34:71:43:61:1a:c7:3b:58:88:1f:51:6a:1a:51:f9: 5c:bd:42:34:e7:c8:8f:78:08:ce:17:58:9c:70:1f:65: 2c:9a:ee:a1:e2:2a:20:52:90:d4:5f:2f:7b:48:b9:6f: 5f:7c:dd:06:db:51:1b:9c:2f:16:20:20:d0:c9:f3:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:a1:78:cf:bd:83:b0:4e:5a:16:a2:72:10:ba:ed:63: 21:58:60:a0:e4:44:6b:db:e9:c9:ed:4d:e3:09:1c:5a: 9d:20:bf:f3:92:88:28:db:06:f4:e6:e7:d6:cf:8f:c9: 5c:9d:50:ed:64:ff:d1:69:2f:d5:03:96:38:62:18:16: 01:68:cf:6c:6c:e3:36:d0:91:78:04:0c:65:e4:f8:db: 80:1a:8a:51:2b:aa:12:ec:2a:65:9c:87:eb:46:d5:5c: b5:9f:4d:ab:7d:64:c6:9f:a8:22:39:17:0c:76:bf:51: a9:11:c6:92:5b:ef:24:18:7b:93:f0:4d:79:62:97:9e: 5b:29:59:5c:f0:68:34:ef:cb:d4:6c:49:49:a3:75:f0: 1a:d2:b9:28:7c:20:22:7a:f4:65:90:fa:4c:cb:9b:ee: 36:3a:c6:dc:08:8b:18:0a:e6:1c:be:06:6c:c6:ad:84: 62:75:14:fc:ae:b7:85:dd:83:1c:9f:38:a8:d7:37:34: eb:35:e6:a1:c0:7b:47:15:07:23:72:58:1b:b2:1b:ba: 82:06:86:0d:d8:41:3a:0b:81:d5:85:ab:49:bd:c2:f9: 4c:fb:ef:c3:28:4e:22:84:65:12:b9:46:38:6d:2f:94: 36:31:21:bb:70:70:50:be:3e:83:08:e3:65:4e:e8:0a Fingerprint (SHA-256): 4D:19:A3:60:05:B4:19:3E:25:E0:53:C5:19:C6:06:5F:9C:10:0C:7A:AC:3B:82:8C:CD:7B:6E:85:19:5F:3F:D3 Fingerprint (SHA1): AA:41:68:08:9E:D3:E9:DB:4B:6E:F9:2C:5B:17:CC:5B:54:DD:29:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2437: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194712 (0x433ee298) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:23 2025 Not After : Thu Nov 28 11:49:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:96:81:c0:b3:5c:01:4f:c7:db:1f:72:9a:98:dc:89: 52:8d:15:92:16:00:f0:83:2d:04:14:43:12:3f:b3:5f: 76:29:3d:8a:3a:50:ad:ad:50:ca:bc:d1:4a:7a:e0:59: dd:ab:c4:d6:ce:90:84:43:22:94:ae:9f:d7:82:ce:be: f5:b1:5e:0f:2e:43:e4:c9:58:ec:67:80:5e:b5:7e:78: 7b:77:0b:05:fb:70:a6:8e:ea:8b:3b:5d:53:b4:b0:47: 51:6d:88:58:9d:d7:de:2d:d5:07:f6:31:47:8a:ff:d5: 6e:4e:86:58:42:90:28:cb:6b:bd:d4:16:01:98:91:1f: 1e:94:a8:c1:70:a2:32:49:0c:4c:06:86:72:e9:52:16: 20:d4:d8:5b:f2:d6:b5:c6:7e:4d:48:4e:41:d6:36:86: 1a:36:b5:d7:a7:df:62:d5:05:2f:a8:d1:0c:d6:53:d9: 05:53:86:ed:83:87:9b:03:83:2f:c1:e3:fa:3d:e8:09: 67:34:71:43:61:1a:c7:3b:58:88:1f:51:6a:1a:51:f9: 5c:bd:42:34:e7:c8:8f:78:08:ce:17:58:9c:70:1f:65: 2c:9a:ee:a1:e2:2a:20:52:90:d4:5f:2f:7b:48:b9:6f: 5f:7c:dd:06:db:51:1b:9c:2f:16:20:20:d0:c9:f3:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:a1:78:cf:bd:83:b0:4e:5a:16:a2:72:10:ba:ed:63: 21:58:60:a0:e4:44:6b:db:e9:c9:ed:4d:e3:09:1c:5a: 9d:20:bf:f3:92:88:28:db:06:f4:e6:e7:d6:cf:8f:c9: 5c:9d:50:ed:64:ff:d1:69:2f:d5:03:96:38:62:18:16: 01:68:cf:6c:6c:e3:36:d0:91:78:04:0c:65:e4:f8:db: 80:1a:8a:51:2b:aa:12:ec:2a:65:9c:87:eb:46:d5:5c: b5:9f:4d:ab:7d:64:c6:9f:a8:22:39:17:0c:76:bf:51: a9:11:c6:92:5b:ef:24:18:7b:93:f0:4d:79:62:97:9e: 5b:29:59:5c:f0:68:34:ef:cb:d4:6c:49:49:a3:75:f0: 1a:d2:b9:28:7c:20:22:7a:f4:65:90:fa:4c:cb:9b:ee: 36:3a:c6:dc:08:8b:18:0a:e6:1c:be:06:6c:c6:ad:84: 62:75:14:fc:ae:b7:85:dd:83:1c:9f:38:a8:d7:37:34: eb:35:e6:a1:c0:7b:47:15:07:23:72:58:1b:b2:1b:ba: 82:06:86:0d:d8:41:3a:0b:81:d5:85:ab:49:bd:c2:f9: 4c:fb:ef:c3:28:4e:22:84:65:12:b9:46:38:6d:2f:94: 36:31:21:bb:70:70:50:be:3e:83:08:e3:65:4e:e8:0a Fingerprint (SHA-256): 4D:19:A3:60:05:B4:19:3E:25:E0:53:C5:19:C6:06:5F:9C:10:0C:7A:AC:3B:82:8C:CD:7B:6E:85:19:5F:3F:D3 Fingerprint (SHA1): AA:41:68:08:9E:D3:E9:DB:4B:6E:F9:2C:5B:17:CC:5B:54:DD:29:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2438: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #2439: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194711 (0x433ee297) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:49:22 2025 Not After : Thu Nov 28 11:49:22 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:da:f3:04:40:6a:b7:36:e3:9d:0d:10:41:55:67:e2: d5:d5:39:64:b1:82:ff:8c:a7:41:91:ec:48:ae:ca:cb: d0:de:d5:a4:11:f0:ac:20:60:c1:46:e6:d7:e7:6b:58: 76:a1:0b:f1:58:e9:5d:83:aa:ab:83:5e:e2:0a:4e:71: d4:c3:0e:55:2c:8c:65:81:46:2e:14:80:1e:b6:b8:92: 8a:b8:f7:9e:4f:eb:32:99:e7:07:6b:36:05:3a:13:b8: d1:34:5e:6d:65:fb:df:13:90:4e:c8:ef:02:d0:24:1b: 87:ab:fb:bb:77:5f:5d:92:8b:b1:60:78:10:15:76:1d: a7:7c:e1:e3:c0:a3:8a:90:4a:f8:a0:9d:40:dc:2c:5e: 0c:82:1d:d7:be:d1:35:47:78:5c:8d:2f:16:33:81:7c: 58:67:58:84:b2:b9:f6:c5:29:6c:28:84:3a:9e:21:4e: 56:e8:c9:d7:b9:cb:36:3b:db:17:df:63:67:7c:74:01: 37:36:d2:06:89:04:ce:45:80:00:d2:07:2a:3e:4f:8b: 69:9c:9d:6d:42:db:77:5e:18:46:3f:f3:80:28:df:cd: b3:b5:93:c4:f9:33:93:f0:6c:1c:4a:0c:2a:e1:af:b1: 4a:c3:dd:c7:e1:db:ce:fa:a7:09:80:2c:e2:e5:2a:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:d6:ce:ea:72:c0:2b:3d:86:79:50:47:f8:17:82:bb: db:4b:f8:d2:5a:1b:38:91:b8:9d:c7:54:7c:f9:71:be: ab:6d:a1:45:c7:54:ff:f7:5b:59:20:c3:bc:5d:d4:e2: eb:49:29:c1:b5:08:b8:e9:65:4b:08:67:ba:a9:48:fc: 03:80:1f:4d:6c:ef:15:3c:1e:a6:7e:a3:b0:88:e0:59: c9:ae:c2:da:2d:f1:62:ad:2d:89:94:51:e6:25:b5:16: 30:c3:57:8d:9b:6d:0f:ec:3d:4a:d9:9f:e9:b5:06:e8: bd:4a:e5:ca:3e:2c:45:6d:41:c0:bc:4e:0f:70:48:65: 31:67:ab:c5:86:7b:f8:aa:65:18:de:12:03:e5:e1:80: 45:b2:79:0d:1c:78:a4:c8:db:8a:7d:94:30:97:03:85: e6:37:df:e7:5a:4d:f8:45:06:a4:d2:ff:bf:bc:c2:8a: 4b:c8:03:90:5b:46:5d:09:e5:ac:d8:8a:64:2a:b3:a0: e7:54:bd:70:ba:97:5b:dd:89:89:a1:ea:54:1c:f0:cb: df:42:ef:d4:14:a2:a3:17:80:54:ca:cc:c2:f4:cb:7c: 35:f2:bc:24:6c:64:ec:78:73:8b:fe:9c:0d:dd:00:62: 57:2d:0c:57:5f:df:9f:76:28:97:2a:04:08:81:f6:40 Fingerprint (SHA-256): 2C:6F:9B:D3:8E:16:15:B4:C8:CE:9B:D5:C1:7E:B0:3A:C1:96:BC:E3:76:32:8A:0C:CB:CC:7E:5E:3C:06:1C:FF Fingerprint (SHA1): FF:1A:C3:89:6B:B4:1E:A2:B9:7E:DE:54:7A:82:78:81:CD:82:6B:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2440: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194712 (0x433ee298) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:23 2025 Not After : Thu Nov 28 11:49:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:96:81:c0:b3:5c:01:4f:c7:db:1f:72:9a:98:dc:89: 52:8d:15:92:16:00:f0:83:2d:04:14:43:12:3f:b3:5f: 76:29:3d:8a:3a:50:ad:ad:50:ca:bc:d1:4a:7a:e0:59: dd:ab:c4:d6:ce:90:84:43:22:94:ae:9f:d7:82:ce:be: f5:b1:5e:0f:2e:43:e4:c9:58:ec:67:80:5e:b5:7e:78: 7b:77:0b:05:fb:70:a6:8e:ea:8b:3b:5d:53:b4:b0:47: 51:6d:88:58:9d:d7:de:2d:d5:07:f6:31:47:8a:ff:d5: 6e:4e:86:58:42:90:28:cb:6b:bd:d4:16:01:98:91:1f: 1e:94:a8:c1:70:a2:32:49:0c:4c:06:86:72:e9:52:16: 20:d4:d8:5b:f2:d6:b5:c6:7e:4d:48:4e:41:d6:36:86: 1a:36:b5:d7:a7:df:62:d5:05:2f:a8:d1:0c:d6:53:d9: 05:53:86:ed:83:87:9b:03:83:2f:c1:e3:fa:3d:e8:09: 67:34:71:43:61:1a:c7:3b:58:88:1f:51:6a:1a:51:f9: 5c:bd:42:34:e7:c8:8f:78:08:ce:17:58:9c:70:1f:65: 2c:9a:ee:a1:e2:2a:20:52:90:d4:5f:2f:7b:48:b9:6f: 5f:7c:dd:06:db:51:1b:9c:2f:16:20:20:d0:c9:f3:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:a1:78:cf:bd:83:b0:4e:5a:16:a2:72:10:ba:ed:63: 21:58:60:a0:e4:44:6b:db:e9:c9:ed:4d:e3:09:1c:5a: 9d:20:bf:f3:92:88:28:db:06:f4:e6:e7:d6:cf:8f:c9: 5c:9d:50:ed:64:ff:d1:69:2f:d5:03:96:38:62:18:16: 01:68:cf:6c:6c:e3:36:d0:91:78:04:0c:65:e4:f8:db: 80:1a:8a:51:2b:aa:12:ec:2a:65:9c:87:eb:46:d5:5c: b5:9f:4d:ab:7d:64:c6:9f:a8:22:39:17:0c:76:bf:51: a9:11:c6:92:5b:ef:24:18:7b:93:f0:4d:79:62:97:9e: 5b:29:59:5c:f0:68:34:ef:cb:d4:6c:49:49:a3:75:f0: 1a:d2:b9:28:7c:20:22:7a:f4:65:90:fa:4c:cb:9b:ee: 36:3a:c6:dc:08:8b:18:0a:e6:1c:be:06:6c:c6:ad:84: 62:75:14:fc:ae:b7:85:dd:83:1c:9f:38:a8:d7:37:34: eb:35:e6:a1:c0:7b:47:15:07:23:72:58:1b:b2:1b:ba: 82:06:86:0d:d8:41:3a:0b:81:d5:85:ab:49:bd:c2:f9: 4c:fb:ef:c3:28:4e:22:84:65:12:b9:46:38:6d:2f:94: 36:31:21:bb:70:70:50:be:3e:83:08:e3:65:4e:e8:0a Fingerprint (SHA-256): 4D:19:A3:60:05:B4:19:3E:25:E0:53:C5:19:C6:06:5F:9C:10:0C:7A:AC:3B:82:8C:CD:7B:6E:85:19:5F:3F:D3 Fingerprint (SHA1): AA:41:68:08:9E:D3:E9:DB:4B:6E:F9:2C:5B:17:CC:5B:54:DD:29:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2441: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194712 (0x433ee298) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:23 2025 Not After : Thu Nov 28 11:49:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:96:81:c0:b3:5c:01:4f:c7:db:1f:72:9a:98:dc:89: 52:8d:15:92:16:00:f0:83:2d:04:14:43:12:3f:b3:5f: 76:29:3d:8a:3a:50:ad:ad:50:ca:bc:d1:4a:7a:e0:59: dd:ab:c4:d6:ce:90:84:43:22:94:ae:9f:d7:82:ce:be: f5:b1:5e:0f:2e:43:e4:c9:58:ec:67:80:5e:b5:7e:78: 7b:77:0b:05:fb:70:a6:8e:ea:8b:3b:5d:53:b4:b0:47: 51:6d:88:58:9d:d7:de:2d:d5:07:f6:31:47:8a:ff:d5: 6e:4e:86:58:42:90:28:cb:6b:bd:d4:16:01:98:91:1f: 1e:94:a8:c1:70:a2:32:49:0c:4c:06:86:72:e9:52:16: 20:d4:d8:5b:f2:d6:b5:c6:7e:4d:48:4e:41:d6:36:86: 1a:36:b5:d7:a7:df:62:d5:05:2f:a8:d1:0c:d6:53:d9: 05:53:86:ed:83:87:9b:03:83:2f:c1:e3:fa:3d:e8:09: 67:34:71:43:61:1a:c7:3b:58:88:1f:51:6a:1a:51:f9: 5c:bd:42:34:e7:c8:8f:78:08:ce:17:58:9c:70:1f:65: 2c:9a:ee:a1:e2:2a:20:52:90:d4:5f:2f:7b:48:b9:6f: 5f:7c:dd:06:db:51:1b:9c:2f:16:20:20:d0:c9:f3:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:a1:78:cf:bd:83:b0:4e:5a:16:a2:72:10:ba:ed:63: 21:58:60:a0:e4:44:6b:db:e9:c9:ed:4d:e3:09:1c:5a: 9d:20:bf:f3:92:88:28:db:06:f4:e6:e7:d6:cf:8f:c9: 5c:9d:50:ed:64:ff:d1:69:2f:d5:03:96:38:62:18:16: 01:68:cf:6c:6c:e3:36:d0:91:78:04:0c:65:e4:f8:db: 80:1a:8a:51:2b:aa:12:ec:2a:65:9c:87:eb:46:d5:5c: b5:9f:4d:ab:7d:64:c6:9f:a8:22:39:17:0c:76:bf:51: a9:11:c6:92:5b:ef:24:18:7b:93:f0:4d:79:62:97:9e: 5b:29:59:5c:f0:68:34:ef:cb:d4:6c:49:49:a3:75:f0: 1a:d2:b9:28:7c:20:22:7a:f4:65:90:fa:4c:cb:9b:ee: 36:3a:c6:dc:08:8b:18:0a:e6:1c:be:06:6c:c6:ad:84: 62:75:14:fc:ae:b7:85:dd:83:1c:9f:38:a8:d7:37:34: eb:35:e6:a1:c0:7b:47:15:07:23:72:58:1b:b2:1b:ba: 82:06:86:0d:d8:41:3a:0b:81:d5:85:ab:49:bd:c2:f9: 4c:fb:ef:c3:28:4e:22:84:65:12:b9:46:38:6d:2f:94: 36:31:21:bb:70:70:50:be:3e:83:08:e3:65:4e:e8:0a Fingerprint (SHA-256): 4D:19:A3:60:05:B4:19:3E:25:E0:53:C5:19:C6:06:5F:9C:10:0C:7A:AC:3B:82:8C:CD:7B:6E:85:19:5F:3F:D3 Fingerprint (SHA1): AA:41:68:08:9E:D3:E9:DB:4B:6E:F9:2C:5B:17:CC:5B:54:DD:29:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2442: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2443: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194719 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2444: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2445: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2446: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194720 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2447: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2448: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #2449: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2450: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128194721 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2451: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2452: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #2453: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2454: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128194722 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2455: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2456: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2457: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2458: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128194723 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2459: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2460: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128194724 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2461: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2462: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #2463: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2464: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2465: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194725 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2466: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2467: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2468: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2469: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194726 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2470: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2471: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2472: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2473: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194727 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2474: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2475: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2476: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2477: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194728 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2478: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2479: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2480: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194719 (0x433ee29f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:49:27 2025 Not After : Thu Nov 28 11:49:27 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:47:80:84:08:2b:0d:5c:b5:6c:46:91:62:3f:b1:a3: e4:f2:30:1c:82:e3:52:f8:fa:04:9b:95:4b:e7:33:79: 8b:25:00:4a:c1:19:87:c5:15:24:7f:00:1a:9b:14:e2: 94:1b:69:10:26:29:c8:64:aa:68:71:27:9a:99:dd:96: 41:de:67:fb:36:27:54:27:72:62:04:3c:5b:5a:92:c8: d7:53:19:8d:f2:01:4c:58:0e:2e:55:a7:5f:59:cf:57: 10:29:f5:4b:ce:67:76:1e:a2:1f:b7:e7:fa:2a:a0:78: d4:18:db:85:3b:64:96:bc:1b:0a:5b:79:e5:6c:b7:1d: d0:c5:ca:43:ae:cf:77:1e:a8:47:ee:0e:63:1a:5c:31: 18:93:5b:8b:13:66:e1:02:f8:4f:df:6f:f9:9f:f5:c6: fd:f8:a9:16:7c:e4:e0:2c:b2:07:01:76:bc:a3:71:3d: f9:78:31:02:2e:6a:84:20:7f:05:bd:d7:7e:1f:f7:97: a9:96:c7:aa:e7:ad:39:76:8e:6c:fe:4a:d3:78:83:22: ee:a3:8e:71:da:7d:57:d8:f8:09:97:22:33:12:51:d2: a8:10:8c:35:07:99:7f:1d:e1:f1:d8:3c:fd:b8:0f:13: 48:27:e6:78:30:7c:88:7f:5f:1b:77:80:18:71:f0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:3d:41:de:79:b4:91:d8:c7:83:e3:f9:b3:b7:94:d5: e2:48:19:f2:1c:96:d2:fe:12:bb:02:fe:52:73:3f:47: 7a:d2:33:37:de:3d:95:5e:07:c9:30:16:68:03:1f:c7: 34:b6:0c:a5:cd:38:b0:ab:2a:25:61:97:39:6b:52:a8: a1:2f:33:fc:5c:0c:c4:91:56:87:ce:96:55:5a:4c:f5: cf:06:9b:f2:b9:b4:e6:b2:3a:86:71:cc:71:4b:29:b8: 45:99:67:64:15:06:74:78:8c:92:4f:e2:40:19:2d:15: 24:45:c2:76:d9:ed:57:23:4a:3d:15:61:59:1a:cd:0f: 9b:00:d7:5b:8c:bf:af:10:c0:af:1e:b4:c2:9f:51:23: d3:fb:c0:e6:72:79:40:04:f6:d5:bc:82:f7:38:e0:28: ae:73:ba:90:24:85:10:f9:a3:5c:94:9e:04:3f:b6:75: 00:64:ce:6c:82:86:82:1e:19:50:ff:a1:65:31:86:19: 0e:07:c7:fc:50:eb:97:cc:77:0c:ab:d2:50:b0:63:8d: 14:c7:1d:da:b6:ed:28:2c:30:e7:e2:18:7b:46:66:c7: 19:e4:96:4d:be:e4:70:0f:c6:e8:03:89:84:30:11:95: f9:34:2a:5d:2a:b0:d8:e8:fb:17:6f:26:a3:f8:b1:81 Fingerprint (SHA-256): 0B:00:80:12:C1:93:5C:64:B0:C1:6F:B1:37:47:4F:D0:C0:E6:F8:D2:05:C7:CA:1B:EA:7F:1E:6A:3C:CE:BF:62 Fingerprint (SHA1): A9:EB:A5:61:75:F9:BB:F5:6A:D6:D1:D4:DC:6C:2F:60:1B:F6:8B:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #2481: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2482: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2483: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2484: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2485: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194720 (0x433ee2a0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:49:28 2025 Not After : Thu Nov 28 11:49:28 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:07:57:57:a3:59:81:11:98:34:08:ab:3e:3c:af:d2: 6b:4a:6f:3f:ef:66:94:ef:61:35:89:cc:b5:d4:69:e5: 09:77:50:b7:14:60:90:e0:3a:ea:87:72:54:cb:b1:20: 5a:d9:41:74:92:a3:6f:cf:c7:b8:b0:90:d2:37:d8:71: 0e:16:ba:51:dd:e4:10:c6:3a:f8:96:c5:8f:2a:1d:dd: 54:cc:20:a8:b9:7c:a5:d0:4a:92:c7:b2:03:7c:be:8f: 7d:43:5d:e6:ba:07:17:52:20:25:9f:13:97:d6:b9:5b: 37:18:04:98:1d:f3:e7:f5:61:33:ea:81:07:15:ee:2e: 95:6b:ca:cb:8e:c7:3d:0a:ea:9a:c5:e9:bc:de:0c:46: 7e:54:bb:f8:12:0d:e4:11:61:a6:2d:42:ad:b5:98:6c: 12:4a:70:30:cb:46:4f:2e:90:79:2e:11:cf:07:58:40: d2:39:84:fb:49:63:d8:e1:55:67:24:35:4d:ee:98:12: b9:8f:18:8b:a6:5b:0c:3b:7f:ab:8f:46:e9:0e:e0:f8: b7:62:84:10:30:87:9e:b5:54:ca:1f:c9:57:65:30:66: d6:59:44:20:fa:3c:fc:c0:8f:59:12:ca:bd:c6:e2:c2: a2:2c:6f:30:c3:f2:4f:c7:26:91:72:8b:f1:c3:0a:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:8d:66:64:86:a0:cb:d3:4d:ad:4e:f1:40:1c:28:e1: 2e:51:bf:e6:60:2b:eb:61:c1:cd:5e:0c:25:55:00:4e: fa:94:6b:ef:47:e1:08:06:34:ab:bb:fc:0a:01:e0:82: 22:d2:42:0f:49:82:67:04:24:47:c9:3f:16:e2:20:f4: b7:7a:09:f0:39:1e:7f:14:61:86:7b:5b:3e:0c:65:b8: 4d:59:27:41:6e:8d:8c:79:60:8b:2b:a7:e3:59:cb:a0: 17:70:a3:95:23:35:01:4d:80:88:94:45:59:19:ff:e0: 33:20:be:c7:41:38:02:ae:9b:b0:7f:a5:7e:38:3f:99: d6:9d:7b:a1:1b:4c:a0:01:f2:1d:c9:70:24:19:88:7a: af:44:e0:be:05:22:1e:2d:0f:0e:09:8f:52:d3:1d:5e: a9:0e:f8:b7:ee:f4:c7:79:ac:a9:e5:7b:69:2b:fd:c1: 9b:ab:a8:8a:e8:b7:17:10:0a:f5:5f:16:d5:e7:d1:38: 3d:f4:e3:07:d7:1a:de:6d:57:18:43:c0:93:4e:dd:66: 14:d0:1d:ff:d1:f7:9d:ee:75:2a:1b:fb:00:ab:20:46: 02:cf:10:1c:0d:e5:7f:c9:c4:b5:de:2a:24:b7:45:68: 51:e0:51:a6:1c:2b:ca:40:01:09:41:d9:af:b6:2c:58 Fingerprint (SHA-256): 77:EE:6A:7D:6C:E4:97:3F:AD:04:B8:1E:F0:43:8D:1E:19:C4:CB:2D:62:96:BE:0E:14:B6:0E:C8:C6:B4:0F:F7 Fingerprint (SHA1): 21:2D:18:77:6C:BA:53:17:42:E7:7C:CD:35:93:C2:58:DC:59:CA:3C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #2490: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2491: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2492: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2493: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2494: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2495: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2496: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #2497: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #2498: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #2499: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #2500: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #2501: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #2502: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #2503: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #2504: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #2505: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #2506: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #2507: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2508: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194729 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2509: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2510: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2511: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2512: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194730 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2513: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2514: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2515: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2516: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194731 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2517: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2518: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2519: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2520: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128194732 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2521: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2522: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2523: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2524: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194733 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2525: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2526: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2527: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2528: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128194734 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2529: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2530: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2531: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2532: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128194735 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2533: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2534: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #2535: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2536: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128194736 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2537: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2538: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2539: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2540: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128194737 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2541: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2542: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2543: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194729 (0x433ee2a9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:35 2025 Not After : Thu Nov 28 11:49:35 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: bc:bd:fb:fe:b5:fa:16:67:ad:37:f7:6a:57:7f:ca:bb: 02:b3:ea:21:58:f7:3d:ce:a5:87:49:9c:70:bf:41:06: f6:69:d3:d8:da:20:94:ff:c6:0b:f0:2d:d7:09:32:e9: 02:9b:07:1c:40:9d:5c:7a:87:26:85:0a:71:ec:66:1f: 01:46:d8:31:5b:64:48:66:78:d8:ad:db:98:b7:c9:37: bb:9b:cd:37:88:fe:3f:55:08:55:0c:82:8b:33:2c:ba: b3:40:1d:98:73:10:6b:37:bc:07:8c:6c:9a:91:12:38: af:ab:06:e8:4b:71:9f:fc:78:3b:c2:74:6a:18:86:bf: 07:87:30:71:69:38:e3:9b:6d:93:5d:17:f5:87:0a:ea: bd:9f:05:4e:21:c9:68:8f:82:88:d9:ec:15:57:60:03: 34:85:c7:eb:a1:36:3b:e4:32:31:ca:fa:8d:e2:85:97: 5d:12:53:a6:d6:95:c0:99:39:74:f0:43:fc:54:a2:97: c9:ab:a2:46:b5:09:72:1a:46:f7:e6:9a:31:de:29:42: 24:f6:85:fc:bd:0f:f0:2a:1d:fa:a1:44:84:32:dd:48: 32:db:54:11:6a:0f:16:f1:2f:12:24:73:d2:9f:67:a4: bf:14:91:2b:ef:d5:ad:0e:fe:83:44:8d:e9:d2:0a:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:42:c3:12:d0:e4:aa:f9:2c:2b:f2:4e:94: 12:5a:44:c8:47:e5:19:31:f4:e7:6d:96:5c:14:8d:ae: 02:1c:2e:32:3f:6a:99:97:bf:99:f9:e1:b2:6e:b3:2a: cc:8c:39:84:21:b8:4f:d1:38:a1:76:11:af:d8 Fingerprint (SHA-256): AF:77:B9:3D:F5:CE:95:2F:90:2B:12:95:34:21:CF:81:9D:7B:AD:14:BD:55:D0:8F:5C:89:9D:90:93:33:BB:73 Fingerprint (SHA1): 21:91:D3:8E:4F:79:B5:2A:D8:1B:69:01:C3:B5:50:9E:17:41:4B:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2544: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194729 (0x433ee2a9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:35 2025 Not After : Thu Nov 28 11:49:35 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: bc:bd:fb:fe:b5:fa:16:67:ad:37:f7:6a:57:7f:ca:bb: 02:b3:ea:21:58:f7:3d:ce:a5:87:49:9c:70:bf:41:06: f6:69:d3:d8:da:20:94:ff:c6:0b:f0:2d:d7:09:32:e9: 02:9b:07:1c:40:9d:5c:7a:87:26:85:0a:71:ec:66:1f: 01:46:d8:31:5b:64:48:66:78:d8:ad:db:98:b7:c9:37: bb:9b:cd:37:88:fe:3f:55:08:55:0c:82:8b:33:2c:ba: b3:40:1d:98:73:10:6b:37:bc:07:8c:6c:9a:91:12:38: af:ab:06:e8:4b:71:9f:fc:78:3b:c2:74:6a:18:86:bf: 07:87:30:71:69:38:e3:9b:6d:93:5d:17:f5:87:0a:ea: bd:9f:05:4e:21:c9:68:8f:82:88:d9:ec:15:57:60:03: 34:85:c7:eb:a1:36:3b:e4:32:31:ca:fa:8d:e2:85:97: 5d:12:53:a6:d6:95:c0:99:39:74:f0:43:fc:54:a2:97: c9:ab:a2:46:b5:09:72:1a:46:f7:e6:9a:31:de:29:42: 24:f6:85:fc:bd:0f:f0:2a:1d:fa:a1:44:84:32:dd:48: 32:db:54:11:6a:0f:16:f1:2f:12:24:73:d2:9f:67:a4: bf:14:91:2b:ef:d5:ad:0e:fe:83:44:8d:e9:d2:0a:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:42:c3:12:d0:e4:aa:f9:2c:2b:f2:4e:94: 12:5a:44:c8:47:e5:19:31:f4:e7:6d:96:5c:14:8d:ae: 02:1c:2e:32:3f:6a:99:97:bf:99:f9:e1:b2:6e:b3:2a: cc:8c:39:84:21:b8:4f:d1:38:a1:76:11:af:d8 Fingerprint (SHA-256): AF:77:B9:3D:F5:CE:95:2F:90:2B:12:95:34:21:CF:81:9D:7B:AD:14:BD:55:D0:8F:5C:89:9D:90:93:33:BB:73 Fingerprint (SHA1): 21:91:D3:8E:4F:79:B5:2A:D8:1B:69:01:C3:B5:50:9E:17:41:4B:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2545: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194729 (0x433ee2a9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:35 2025 Not After : Thu Nov 28 11:49:35 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: bc:bd:fb:fe:b5:fa:16:67:ad:37:f7:6a:57:7f:ca:bb: 02:b3:ea:21:58:f7:3d:ce:a5:87:49:9c:70:bf:41:06: f6:69:d3:d8:da:20:94:ff:c6:0b:f0:2d:d7:09:32:e9: 02:9b:07:1c:40:9d:5c:7a:87:26:85:0a:71:ec:66:1f: 01:46:d8:31:5b:64:48:66:78:d8:ad:db:98:b7:c9:37: bb:9b:cd:37:88:fe:3f:55:08:55:0c:82:8b:33:2c:ba: b3:40:1d:98:73:10:6b:37:bc:07:8c:6c:9a:91:12:38: af:ab:06:e8:4b:71:9f:fc:78:3b:c2:74:6a:18:86:bf: 07:87:30:71:69:38:e3:9b:6d:93:5d:17:f5:87:0a:ea: bd:9f:05:4e:21:c9:68:8f:82:88:d9:ec:15:57:60:03: 34:85:c7:eb:a1:36:3b:e4:32:31:ca:fa:8d:e2:85:97: 5d:12:53:a6:d6:95:c0:99:39:74:f0:43:fc:54:a2:97: c9:ab:a2:46:b5:09:72:1a:46:f7:e6:9a:31:de:29:42: 24:f6:85:fc:bd:0f:f0:2a:1d:fa:a1:44:84:32:dd:48: 32:db:54:11:6a:0f:16:f1:2f:12:24:73:d2:9f:67:a4: bf:14:91:2b:ef:d5:ad:0e:fe:83:44:8d:e9:d2:0a:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:42:c3:12:d0:e4:aa:f9:2c:2b:f2:4e:94: 12:5a:44:c8:47:e5:19:31:f4:e7:6d:96:5c:14:8d:ae: 02:1c:2e:32:3f:6a:99:97:bf:99:f9:e1:b2:6e:b3:2a: cc:8c:39:84:21:b8:4f:d1:38:a1:76:11:af:d8 Fingerprint (SHA-256): AF:77:B9:3D:F5:CE:95:2F:90:2B:12:95:34:21:CF:81:9D:7B:AD:14:BD:55:D0:8F:5C:89:9D:90:93:33:BB:73 Fingerprint (SHA1): 21:91:D3:8E:4F:79:B5:2A:D8:1B:69:01:C3:B5:50:9E:17:41:4B:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #2546: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194729 (0x433ee2a9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:35 2025 Not After : Thu Nov 28 11:49:35 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: bc:bd:fb:fe:b5:fa:16:67:ad:37:f7:6a:57:7f:ca:bb: 02:b3:ea:21:58:f7:3d:ce:a5:87:49:9c:70:bf:41:06: f6:69:d3:d8:da:20:94:ff:c6:0b:f0:2d:d7:09:32:e9: 02:9b:07:1c:40:9d:5c:7a:87:26:85:0a:71:ec:66:1f: 01:46:d8:31:5b:64:48:66:78:d8:ad:db:98:b7:c9:37: bb:9b:cd:37:88:fe:3f:55:08:55:0c:82:8b:33:2c:ba: b3:40:1d:98:73:10:6b:37:bc:07:8c:6c:9a:91:12:38: af:ab:06:e8:4b:71:9f:fc:78:3b:c2:74:6a:18:86:bf: 07:87:30:71:69:38:e3:9b:6d:93:5d:17:f5:87:0a:ea: bd:9f:05:4e:21:c9:68:8f:82:88:d9:ec:15:57:60:03: 34:85:c7:eb:a1:36:3b:e4:32:31:ca:fa:8d:e2:85:97: 5d:12:53:a6:d6:95:c0:99:39:74:f0:43:fc:54:a2:97: c9:ab:a2:46:b5:09:72:1a:46:f7:e6:9a:31:de:29:42: 24:f6:85:fc:bd:0f:f0:2a:1d:fa:a1:44:84:32:dd:48: 32:db:54:11:6a:0f:16:f1:2f:12:24:73:d2:9f:67:a4: bf:14:91:2b:ef:d5:ad:0e:fe:83:44:8d:e9:d2:0a:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:42:c3:12:d0:e4:aa:f9:2c:2b:f2:4e:94: 12:5a:44:c8:47:e5:19:31:f4:e7:6d:96:5c:14:8d:ae: 02:1c:2e:32:3f:6a:99:97:bf:99:f9:e1:b2:6e:b3:2a: cc:8c:39:84:21:b8:4f:d1:38:a1:76:11:af:d8 Fingerprint (SHA-256): AF:77:B9:3D:F5:CE:95:2F:90:2B:12:95:34:21:CF:81:9D:7B:AD:14:BD:55:D0:8F:5C:89:9D:90:93:33:BB:73 Fingerprint (SHA1): 21:91:D3:8E:4F:79:B5:2A:D8:1B:69:01:C3:B5:50:9E:17:41:4B:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #2547: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2548: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2549: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2550: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2551: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2552: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2553: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2554: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2555: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2556: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2557: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2558: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2559: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2560: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2561: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2562: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #2563: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2564: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2565: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2566: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2567: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2568: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2569: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2570: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2571: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2572: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2573: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2574: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128114946Z nextupdate=20261128114946Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:49:46 2025 Next Update: Sat Nov 28 11:49:46 2026 CRL Extensions: chains.sh: #2575: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114946Z nextupdate=20261128114946Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:49:46 2025 Next Update: Sat Nov 28 11:49:46 2026 CRL Extensions: chains.sh: #2576: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114946Z nextupdate=20261128114946Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:49:46 2025 Next Update: Sat Nov 28 11:49:46 2026 CRL Extensions: chains.sh: #2577: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128114946Z nextupdate=20261128114946Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:49:46 2025 Next Update: Sat Nov 28 11:49:46 2026 CRL Extensions: chains.sh: #2578: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114947Z addcert 14 20251128114947Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:49:47 2025 Next Update: Sat Nov 28 11:49:46 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:49:47 2025 CRL Extensions: chains.sh: #2579: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114948Z addcert 15 20251128114948Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:49:48 2025 Next Update: Sat Nov 28 11:49:46 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:49:48 2025 CRL Extensions: chains.sh: #2580: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2581: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2582: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2583: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #2584: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #2585: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #2586: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #2587: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #2588: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #2589: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:41 2025 Not After : Thu Nov 28 11:49:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:8a:55:a0:c4:e0:80:89:e3:16:65:14:90:f3:d6:02: 25:a9:a1:c1:09:a2:f2:b6:f3:d8:29:3c:2d:a3:59:d1: 66:76:69:d8:e3:e9:69:06:f5:92:03:bb:44:ab:19:f1: b6:8f:88:31:fb:fa:0b:e6:30:52:d9:6d:e3:3c:86:87: d1:f7:93:4e:6a:f9:bd:ed:b3:43:2f:79:ee:75:79:7a: 97:c7:d1:85:a0:d2:dd:e9:72:a4:94:7d:9c:d3:a4:ec: 43:44:c0:75:cb:e1:f6:34:e1:6d:71:5d:00:c0:23:9f: 3e:e2:3f:37:d9:5c:c0:6f:3b:33:2a:f0:46:59:aa:20: e8:ef:9c:89:03:42:fa:56:19:6c:de:af:ed:0c:3c:78: fc:f8:32:fd:d8:7d:f9:47:ef:e4:68:8f:b9:fd:6f:c0: 9f:a2:18:6a:bf:c5:ce:4f:b9:e1:1b:b6:b4:97:7d:8e: 9d:22:fb:d4:bf:d4:1c:32:bb:b8:c8:eb:60:70:5d:af: 6b:b0:d1:12:7f:00:7c:09:ad:04:8e:37:43:24:24:55: 4d:21:8a:c5:cd:e8:ca:54:01:0e:d2:76:d6:8f:e8:a4: af:6e:10:0e:f5:36:92:5b:96:11:d8:5c:80:22:5a:7c: 42:19:f2:9c:77:6f:fc:be:60:92:12:4e:5d:ad:92:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:eb:88:a1:f7:41:52:d7:96:46:2a:95:07:a1:e9:8e: 60:eb:aa:0b:ed:e0:72:ae:59:06:a5:0d:89:5c:ef:98: fc:48:57:04:f2:78:4a:e2:41:7c:4d:44:9f:86:2f:87: 92:27:f3:c0:52:19:49:b2:07:ed:f8:22:f3:3c:5a:a4: 68:57:43:eb:3d:e4:d5:c0:34:d6:7b:bb:b8:c9:78:68: 5b:dd:52:c1:68:b9:b1:62:63:48:37:04:45:da:a3:44: 3e:0d:6a:3d:72:61:f4:e1:1b:bf:49:73:47:3b:58:e7: 84:f5:e3:aa:5f:6c:ef:21:23:22:87:44:3b:04:e5:2b: 17:f2:c4:6b:3b:4f:d9:36:99:42:e2:ba:82:d5:25:ae: 44:05:a9:6e:af:a0:c3:db:7d:17:d9:08:06:c0:99:7b: b4:65:af:d0:a3:3e:f5:96:0b:06:25:99:bf:69:ae:38: 4b:9a:cc:84:7c:4e:4f:f8:cd:09:04:3b:ab:98:86:7b: 28:21:ed:08:e8:19:40:87:a8:d3:14:1f:c7:00:a2:6d: 40:a6:7d:71:a3:02:20:2e:59:8e:f9:ff:9b:92:0b:0f: 55:ed:b3:09:30:c4:7a:b2:f3:b4:6e:c0:46:a2:aa:aa: 9a:a4:14:01:6a:53:ea:84:d9:48:0c:4f:68:b1:cc:1c Fingerprint (SHA-256): BA:2D:0F:D6:78:CA:A9:DC:66:EC:A6:82:E6:C1:85:28:B5:A3:87:D2:88:37:15:46:B2:0E:3A:1D:20:71:52:9B Fingerprint (SHA1): 5A:80:77:35:4E:C4:4F:14:AF:5B:F1:F0:A4:A1:FD:AB:B0:D6:DD:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2590: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2591: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:41 2025 Not After : Thu Nov 28 11:49:41 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:8a:55:a0:c4:e0:80:89:e3:16:65:14:90:f3:d6:02: 25:a9:a1:c1:09:a2:f2:b6:f3:d8:29:3c:2d:a3:59:d1: 66:76:69:d8:e3:e9:69:06:f5:92:03:bb:44:ab:19:f1: b6:8f:88:31:fb:fa:0b:e6:30:52:d9:6d:e3:3c:86:87: d1:f7:93:4e:6a:f9:bd:ed:b3:43:2f:79:ee:75:79:7a: 97:c7:d1:85:a0:d2:dd:e9:72:a4:94:7d:9c:d3:a4:ec: 43:44:c0:75:cb:e1:f6:34:e1:6d:71:5d:00:c0:23:9f: 3e:e2:3f:37:d9:5c:c0:6f:3b:33:2a:f0:46:59:aa:20: e8:ef:9c:89:03:42:fa:56:19:6c:de:af:ed:0c:3c:78: fc:f8:32:fd:d8:7d:f9:47:ef:e4:68:8f:b9:fd:6f:c0: 9f:a2:18:6a:bf:c5:ce:4f:b9:e1:1b:b6:b4:97:7d:8e: 9d:22:fb:d4:bf:d4:1c:32:bb:b8:c8:eb:60:70:5d:af: 6b:b0:d1:12:7f:00:7c:09:ad:04:8e:37:43:24:24:55: 4d:21:8a:c5:cd:e8:ca:54:01:0e:d2:76:d6:8f:e8:a4: af:6e:10:0e:f5:36:92:5b:96:11:d8:5c:80:22:5a:7c: 42:19:f2:9c:77:6f:fc:be:60:92:12:4e:5d:ad:92:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:eb:88:a1:f7:41:52:d7:96:46:2a:95:07:a1:e9:8e: 60:eb:aa:0b:ed:e0:72:ae:59:06:a5:0d:89:5c:ef:98: fc:48:57:04:f2:78:4a:e2:41:7c:4d:44:9f:86:2f:87: 92:27:f3:c0:52:19:49:b2:07:ed:f8:22:f3:3c:5a:a4: 68:57:43:eb:3d:e4:d5:c0:34:d6:7b:bb:b8:c9:78:68: 5b:dd:52:c1:68:b9:b1:62:63:48:37:04:45:da:a3:44: 3e:0d:6a:3d:72:61:f4:e1:1b:bf:49:73:47:3b:58:e7: 84:f5:e3:aa:5f:6c:ef:21:23:22:87:44:3b:04:e5:2b: 17:f2:c4:6b:3b:4f:d9:36:99:42:e2:ba:82:d5:25:ae: 44:05:a9:6e:af:a0:c3:db:7d:17:d9:08:06:c0:99:7b: b4:65:af:d0:a3:3e:f5:96:0b:06:25:99:bf:69:ae:38: 4b:9a:cc:84:7c:4e:4f:f8:cd:09:04:3b:ab:98:86:7b: 28:21:ed:08:e8:19:40:87:a8:d3:14:1f:c7:00:a2:6d: 40:a6:7d:71:a3:02:20:2e:59:8e:f9:ff:9b:92:0b:0f: 55:ed:b3:09:30:c4:7a:b2:f3:b4:6e:c0:46:a2:aa:aa: 9a:a4:14:01:6a:53:ea:84:d9:48:0c:4f:68:b1:cc:1c Fingerprint (SHA-256): BA:2D:0F:D6:78:CA:A9:DC:66:EC:A6:82:E6:C1:85:28:B5:A3:87:D2:88:37:15:46:B2:0E:3A:1D:20:71:52:9B Fingerprint (SHA1): 5A:80:77:35:4E:C4:4F:14:AF:5B:F1:F0:A4:A1:FD:AB:B0:D6:DD:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2592: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2593: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #2594: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #2595: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2596: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #2597: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2598: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114950Z nextupdate=20261128114950Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:49:50 2025 Next Update: Sat Nov 28 11:49:50 2026 CRL Extensions: chains.sh: #2599: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114951Z addcert 3 20251128114951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:49:51 2025 Next Update: Sat Nov 28 11:49:50 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:49:51 2025 CRL Extensions: chains.sh: #2600: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128114952Z addcert 4 20251128114952Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:49:52 2025 Next Update: Sat Nov 28 11:49:50 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:49:52 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:49:51 2025 CRL Extensions: chains.sh: #2601: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2602: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2603: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2604: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2605: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #2606: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2607: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2608: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #2609: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2610: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2611: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2612: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #2613: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2614: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:19 2025 Not After : Thu Nov 28 11:43:19 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d6:f1:0b:25:22:d3:c2:d4:cf:0c:fb:e3:e2:c5:49: d8:b0:f4:46:9b:88:03:6c:64:b1:ea:9b:93:b0:09:04: f1:10:d4:65:75:de:86:ee:4b:e7:2d:85:22:cd:2e:1c: 93:2e:f3:de:f8:d2:8f:ca:3f:1c:2a:ef:d8:85:0d:71: 2b:91:c9:81:80:02:16:42:72:69:23:a7:f7:7d:6d:76: ef:b8:1a:d9:e2:4b:74:7d:95:ef:a1:97:4f:83:47:7f: 7d:9d:87:ec:58:74:10:ed:3e:ea:06:1e:fc:dc:97:d4: dc:35:65:4d:db:01:df:ba:10:7e:36:82:85:be:1e:f5: ee:b3:35:be:5e:f1:2f:1e:a0:05:32:ef:57:42:26:4f: 26:01:14:84:ac:c9:28:80:89:34:57:65:31:4b:15:02: b0:ef:89:e8:e9:52:ee:db:58:21:45:39:fa:d7:9d:8a: 0d:40:69:54:8d:b3:b4:2c:f5:de:93:1b:c4:9b:38:4d: 67:84:1a:f6:08:66:1a:05:ef:0f:04:cb:b2:db:67:9f: 67:4f:c3:15:61:a3:d3:f6:c6:12:83:b1:41:f7:41:ce: 68:fd:32:10:72:1b:f5:95:7e:be:41:cc:b6:95:a9:9b: 1d:c6:82:2e:d5:e0:1b:18:af:95:1f:2b:b3:14:bd:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:8c:b0:32:75:bd:a8:10:ca:5c:cc:23:6a:22:f6:38: 4a:a3:8e:41:36:5a:9f:98:fd:d9:f4:66:30:90:71:71: 11:44:58:ec:56:7d:56:5f:d3:a1:26:b1:a4:56:54:68: 62:a0:61:6d:c5:37:bc:03:82:95:c0:ad:d1:4b:b4:10: 9b:10:87:91:ce:45:c8:25:a1:af:84:bc:21:47:98:8a: 42:11:36:30:f2:01:7e:72:ee:3c:ea:dd:4b:8c:56:b9: 28:25:1f:1d:01:5f:4d:66:6d:ef:c8:b1:88:1d:ab:d7: 5e:df:ef:04:0e:85:ee:fa:7d:45:75:ef:74:da:3f:27: f8:9b:63:e7:e2:72:cd:5a:cd:4c:52:77:45:60:78:99: b2:8b:2a:96:e9:79:0b:7d:d7:2b:1a:84:64:e3:93:6e: 26:fa:82:5e:dc:97:92:3d:3d:bb:ea:d3:72:6e:98:08: 15:2f:1b:24:38:a8:0c:6a:60:e3:e8:07:79:6c:ac:7c: 96:57:b3:ce:5d:d7:4e:5e:63:ff:78:0d:3b:1d:82:b1: 21:ef:63:9d:87:cc:05:6d:af:dc:55:fb:14:e1:4d:03: 36:30:7d:cb:4e:ff:e3:0e:82:19:62:13:67:0d:59:71: af:6c:36:53:95:1f:99:48:07:a3:f8:11:02:9d:5f:0c Fingerprint (SHA-256): 57:EA:58:A2:4D:27:1D:9D:E7:D4:FE:10:EA:06:CC:2B:CC:E8:84:A0:17:40:0A:20:4F:F1:4D:FA:66:7E:87:FE Fingerprint (SHA1): 39:4C:AF:9B:41:9E:A2:BC:8C:F9:B1:11:D9:2E:35:E0:3D:A8:5C:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #2615: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #2616: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2617: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2618: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #2619: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2620: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #2621: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2622: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194738 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2623: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2624: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2625: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2626: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128194739 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2627: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2628: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2629: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194379.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2630: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194338.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2631: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2632: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2633: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194379.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2634: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128194740 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2635: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2636: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2637: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194379.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2638: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194339.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2639: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2640: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2641: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2642: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128194741 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2643: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2644: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2645: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194379.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2646: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194340.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2647: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2648: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2649: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194379.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2650: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194341.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2651: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2652: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128114959Z nextupdate=20261128114959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:49:59 2025 Next Update: Sat Nov 28 11:49:59 2026 CRL Extensions: chains.sh: #2653: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128114959Z nextupdate=20261128114959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:49:59 2025 Next Update: Sat Nov 28 11:49:59 2026 CRL Extensions: chains.sh: #2654: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128114959Z nextupdate=20261128114959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:49:59 2025 Next Update: Sat Nov 28 11:49:59 2026 CRL Extensions: chains.sh: #2655: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128114959Z nextupdate=20261128114959Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:49:59 2025 Next Update: Sat Nov 28 11:49:59 2026 CRL Extensions: chains.sh: #2656: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115000Z addcert 20 20251128115000Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:50:00 2025 Next Update: Sat Nov 28 11:49:59 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:50:00 2025 CRL Extensions: chains.sh: #2657: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115001Z addcert 40 20251128115001Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:50:01 2025 Next Update: Sat Nov 28 11:49:59 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:50:00 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:50:01 2025 CRL Extensions: chains.sh: #2658: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2659: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2660: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2661: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194738 (0x433ee2b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:54 2025 Not After : Thu Nov 28 11:49:54 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:96:55:dd:8b:20:ce:33:4d:a3:d3:e2:6e:ff:d2:b6: f0:4d:da:85:f9:e8:a4:76:32:1f:b8:e0:53:0f:52:8d: 4b:15:43:b5:a3:58:df:7f:aa:71:81:d4:07:2f:0e:73: 9d:b0:9c:88:b3:9a:15:7d:fc:7f:36:bc:65:f5:81:4e: 04:02:a1:23:95:50:0b:82:12:9c:c7:d4:a7:76:94:2b: 39:8b:11:a9:aa:a7:5a:10:e2:5a:0d:07:74:d0:46:15: 03:b0:bb:74:b7:cb:93:b9:8d:7a:03:d4:ad:f7:fb:36: 1e:ce:27:24:34:b6:14:85:47:95:9d:47:ef:0b:29:29: 38:f8:58:f2:9b:dd:27:6c:fd:be:24:52:2f:8d:66:6d: f0:a3:91:61:3d:5c:c1:92:84:0a:64:13:0b:22:9e:26: 13:fa:77:2e:f9:71:c0:b5:a9:1c:e6:70:3d:6b:18:32: be:96:d2:79:ff:93:9e:d1:29:fb:df:1f:a6:06:b7:e9: 7e:ed:af:96:2b:51:33:e8:2c:90:f8:db:67:b4:e7:aa: 0c:ac:5c:e7:98:5e:be:09:fc:07:bf:e0:01:53:22:a2: 64:b8:ec:1f:b1:a3:27:a1:47:43:a4:e1:7c:b0:23:d3: 56:df:93:70:90:a9:14:6d:62:fa:34:8c:36:e4:df:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:25:0b:1c:d2:c7:01:21:39:75:eb:6a:b6:43:42:0f: 3d:69:05:54:71:cf:c2:c3:eb:1d:50:94:9c:25:e0:2c: 29:ef:72:1e:00:da:23:6f:f8:8c:4c:86:a1:8b:8a:91: e5:4a:e0:4d:17:45:29:cf:76:59:f7:ea:46:87:a8:6c: 67:5b:90:59:80:a2:2f:4a:e0:34:b9:d0:de:1c:87:99: 0a:67:6a:f4:98:b6:94:ca:c3:36:ad:b7:65:f6:76:ad: 5f:58:a9:39:d8:2a:71:a5:b6:49:0d:e7:bf:4a:08:45: 67:36:01:20:32:d3:00:72:53:69:bb:db:77:6d:0b:9d: 24:1b:0b:5e:91:f8:5c:17:5c:ee:de:67:2f:13:11:ea: 96:c7:56:bf:29:22:0e:1c:75:31:ed:9e:82:46:35:74: f2:b9:ff:ce:14:37:34:85:8a:4d:cf:49:7f:51:8d:f1: 20:f1:22:f1:16:f9:0c:ec:00:34:9e:b9:a9:90:84:9b: 7f:58:72:48:b4:d2:d8:97:06:f1:cc:e2:b3:ce:e6:8d: a3:98:94:72:a0:de:1f:a2:af:62:e7:42:a6:5f:25:0d: 8d:08:46:02:3d:9d:56:74:bf:1d:41:9c:a4:64:30:0b: d0:04:10:73:cf:19:fb:fa:34:98:bf:05:86:16:eb:ab Fingerprint (SHA-256): 6E:46:5C:CF:37:77:E4:F0:B2:74:56:09:15:7F:38:8E:25:46:96:BE:75:EE:83:29:EB:4E:C1:6C:8E:F4:60:BC Fingerprint (SHA1): 6C:49:48:5E:77:4B:C5:EB:92:29:66:06:64:22:70:AD:B5:1A:12:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2662: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2663: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194738 (0x433ee2b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:49:54 2025 Not After : Thu Nov 28 11:49:54 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:96:55:dd:8b:20:ce:33:4d:a3:d3:e2:6e:ff:d2:b6: f0:4d:da:85:f9:e8:a4:76:32:1f:b8:e0:53:0f:52:8d: 4b:15:43:b5:a3:58:df:7f:aa:71:81:d4:07:2f:0e:73: 9d:b0:9c:88:b3:9a:15:7d:fc:7f:36:bc:65:f5:81:4e: 04:02:a1:23:95:50:0b:82:12:9c:c7:d4:a7:76:94:2b: 39:8b:11:a9:aa:a7:5a:10:e2:5a:0d:07:74:d0:46:15: 03:b0:bb:74:b7:cb:93:b9:8d:7a:03:d4:ad:f7:fb:36: 1e:ce:27:24:34:b6:14:85:47:95:9d:47:ef:0b:29:29: 38:f8:58:f2:9b:dd:27:6c:fd:be:24:52:2f:8d:66:6d: f0:a3:91:61:3d:5c:c1:92:84:0a:64:13:0b:22:9e:26: 13:fa:77:2e:f9:71:c0:b5:a9:1c:e6:70:3d:6b:18:32: be:96:d2:79:ff:93:9e:d1:29:fb:df:1f:a6:06:b7:e9: 7e:ed:af:96:2b:51:33:e8:2c:90:f8:db:67:b4:e7:aa: 0c:ac:5c:e7:98:5e:be:09:fc:07:bf:e0:01:53:22:a2: 64:b8:ec:1f:b1:a3:27:a1:47:43:a4:e1:7c:b0:23:d3: 56:df:93:70:90:a9:14:6d:62:fa:34:8c:36:e4:df:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:25:0b:1c:d2:c7:01:21:39:75:eb:6a:b6:43:42:0f: 3d:69:05:54:71:cf:c2:c3:eb:1d:50:94:9c:25:e0:2c: 29:ef:72:1e:00:da:23:6f:f8:8c:4c:86:a1:8b:8a:91: e5:4a:e0:4d:17:45:29:cf:76:59:f7:ea:46:87:a8:6c: 67:5b:90:59:80:a2:2f:4a:e0:34:b9:d0:de:1c:87:99: 0a:67:6a:f4:98:b6:94:ca:c3:36:ad:b7:65:f6:76:ad: 5f:58:a9:39:d8:2a:71:a5:b6:49:0d:e7:bf:4a:08:45: 67:36:01:20:32:d3:00:72:53:69:bb:db:77:6d:0b:9d: 24:1b:0b:5e:91:f8:5c:17:5c:ee:de:67:2f:13:11:ea: 96:c7:56:bf:29:22:0e:1c:75:31:ed:9e:82:46:35:74: f2:b9:ff:ce:14:37:34:85:8a:4d:cf:49:7f:51:8d:f1: 20:f1:22:f1:16:f9:0c:ec:00:34:9e:b9:a9:90:84:9b: 7f:58:72:48:b4:d2:d8:97:06:f1:cc:e2:b3:ce:e6:8d: a3:98:94:72:a0:de:1f:a2:af:62:e7:42:a6:5f:25:0d: 8d:08:46:02:3d:9d:56:74:bf:1d:41:9c:a4:64:30:0b: d0:04:10:73:cf:19:fb:fa:34:98:bf:05:86:16:eb:ab Fingerprint (SHA-256): 6E:46:5C:CF:37:77:E4:F0:B2:74:56:09:15:7F:38:8E:25:46:96:BE:75:EE:83:29:EB:4E:C1:6C:8E:F4:60:BC Fingerprint (SHA1): 6C:49:48:5E:77:4B:C5:EB:92:29:66:06:64:22:70:AD:B5:1A:12:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2664: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2665: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2666: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194742 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2667: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2668: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2669: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2670: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194743 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2671: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2672: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2673: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2674: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194744 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2675: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2676: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2677: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2678: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128194745 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2679: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2680: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #2681: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194746 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2682: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #2683: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #2684: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2685: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128194747 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2686: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2687: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2688: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2689: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128194748 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2690: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2691: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #2692: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #2693: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #2694: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194742 (0x433ee2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:02 2025 Not After : Thu Nov 28 11:50:02 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:14:e9:99:0b:44:9a:a6:55:9f:65:af:6a:ff:09:8f: 89:1b:36:1c:dc:53:78:84:50:4a:98:3d:2d:d8:d1:b4: 6d:de:57:96:de:29:62:84:1c:d0:a8:16:73:d4:a9:9b: 81:86:f4:0b:c0:7c:32:46:c5:b0:7b:0c:44:45:9e:35: 9c:83:cf:22:b7:8a:6b:89:d7:1f:d0:c7:d0:7b:4c:44: a6:ee:0a:0e:e3:75:86:78:ba:52:46:21:0d:b8:8d:59: 17:7c:80:5c:31:a0:a9:0d:0b:2e:47:81:c0:c4:64:f1: 0e:88:5f:2c:f9:52:9e:19:da:0d:b1:d4:a8:74:b5:58: be:a8:88:bc:94:c0:9c:60:17:c8:7e:6c:cf:46:07:80: 45:04:9b:f9:59:ac:a9:d2:5e:97:16:84:2f:66:4a:1a: 0d:55:de:f7:31:b8:ad:33:d7:83:aa:fd:7a:6b:6c:77: 1b:dd:a4:ed:4a:80:56:fe:52:84:f0:9d:c9:68:30:a3: 8d:0c:30:4d:db:74:00:1c:de:fd:f8:2d:86:77:c6:f1: d3:5e:77:7c:bf:b1:0a:c2:0d:8b:a8:bc:ac:a6:5c:17: 61:f1:95:4e:aa:75:1a:97:5a:61:49:8f:d5:00:09:c9: d4:10:84:10:da:15:c5:cc:89:21:69:53:f0:1b:ca:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:83:66:f6:6f:94:de:13:03:14:ed:e5:03:bf:9e:65: 01:2e:d0:d8:cb:91:73:18:e3:87:47:28:89:94:81:63: 5c:ca:d3:18:e7:2b:1d:21:41:84:22:ca:b0:10:72:9a: 64:dd:10:53:6b:35:6d:d1:31:f4:28:30:27:29:db:e0: ed:05:4e:8a:9b:8c:0a:43:be:96:b5:8e:aa:c4:44:bc: 7b:60:5f:a5:1d:27:4d:d1:19:bf:a5:40:52:f6:7d:b5: 9f:08:bd:1f:1c:10:ad:d3:97:35:91:78:c6:cb:23:03: f3:c0:65:1c:58:e3:d2:c8:da:12:f0:d5:a7:8e:07:6f: 72:99:cb:21:11:75:86:85:f4:cd:67:4c:d6:ba:05:17: b2:66:70:83:df:f8:27:e5:ae:76:63:b7:89:ad:c3:ed: 84:1f:14:8f:44:4d:0e:9d:62:12:3b:8a:33:dd:d3:97: f1:d4:72:b7:a6:cb:59:08:12:99:2f:70:aa:77:17:9b: e2:dd:cc:9b:44:9c:02:c9:00:81:13:65:0b:28:ab:28: e2:ad:02:b0:30:b0:e7:16:f3:5a:a7:79:42:6a:ae:5a: 2c:5a:d1:d3:e7:0b:59:ba:0a:3e:1a:d2:bd:2d:5e:57: f0:fe:3d:a0:7c:da:5f:fe:4d:1c:dd:8b:bd:b4:d9:ce Fingerprint (SHA-256): 60:74:B8:6A:14:6D:FD:38:4A:F5:81:3E:E3:78:00:F1:59:84:A6:BA:1A:F8:9B:CA:8B:5F:3A:F0:A1:5D:11:AD Fingerprint (SHA1): 8D:91:3F:7E:3F:C8:4A:1A:ED:3A:82:63:1B:E3:BE:D2:28:FD:C3:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2695: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194744 (0x433ee2b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:04 2025 Not After : Thu Nov 28 11:50:04 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:a0:fa:32:9b:a3:af:c4:03:86:43:4a:fe:38:13:1a: 1c:a4:f5:5e:4f:95:83:dd:34:4c:95:35:f9:4f:a8:ce: 70:e4:44:79:3e:2d:cc:05:f8:56:3c:06:98:c4:f6:6a: 51:ed:59:02:89:25:5b:a5:4e:fa:85:ec:2f:67:51:38: d8:ae:94:46:a7:73:39:5f:43:bb:82:cd:6f:60:70:f1: 5b:25:a1:78:a6:8a:58:76:84:91:fe:0f:17:0c:13:80: 55:19:59:7d:66:2d:c7:21:84:71:a8:89:59:a9:c8:c2: c7:08:8c:ea:75:f1:87:5b:f6:0f:f6:7f:34:01:a5:d3: a6:c2:5a:50:8e:80:bd:69:47:87:98:df:0c:a4:ab:40: 9d:9f:34:cf:49:07:e8:ef:9d:28:52:9e:1e:e5:ef:70: 93:04:89:01:ec:ee:33:5b:e8:46:e7:48:fe:c8:f3:09: 69:24:2a:bd:33:7a:7b:d5:e2:fa:d4:94:b2:2c:d5:08: b3:d7:f2:d5:61:ca:25:03:d9:c8:c0:6d:b4:fc:c5:ba: 47:e1:c1:20:8f:bc:3e:50:a3:c9:9a:24:74:6e:9f:81: 5c:78:a5:75:b5:55:c9:8a:3d:ec:61:bb:2d:f7:98:e7: 03:79:45:60:b0:a6:ff:7a:d3:87:e9:86:c7:88:dc:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:5d:77:30:4c:a5:aa:4b:dd:45:8b:88:f5:e8:e1:11: db:58:76:7d:0a:99:5c:97:56:53:e2:66:99:ac:3c:87: 98:44:a1:d0:ba:97:1c:31:60:f4:74:30:e4:ed:08:03: a4:65:db:a6:44:54:63:81:ab:25:c4:70:4b:dc:7f:8f: 1b:9f:f8:fe:27:06:b7:73:bf:85:5f:67:a5:e2:07:9b: ff:b9:60:89:ac:a8:29:5f:b8:96:a1:ec:bd:c5:48:cd: 86:79:87:73:67:1c:d7:84:52:8b:ef:8c:8e:f4:f6:36: 5b:e0:4c:ab:9c:31:39:05:00:69:74:4a:d2:71:18:36: 58:9f:cd:3e:ca:61:15:5a:3c:67:37:d3:d8:48:49:f3: b0:b2:4c:ec:ce:13:14:a8:5e:14:11:df:af:c7:04:0c: 5f:5f:2b:ea:38:c2:bf:1d:02:6c:1f:57:e0:e3:1b:8b: e3:c2:6e:c8:01:5b:2d:be:75:f9:7d:d2:72:d7:ac:87: 72:53:7f:78:22:17:b4:30:4d:2d:4b:b2:41:80:9a:51: bf:31:f1:aa:0f:eb:82:9d:bf:6c:f2:23:2e:59:a4:17: ed:29:7b:2c:a4:a1:1e:3d:6a:e2:5b:95:3a:58:b2:f0: 70:49:01:c4:7f:1f:b6:64:f2:89:4d:fd:c7:94:0b:d1 Fingerprint (SHA-256): 5F:A4:90:E9:40:92:67:DB:DE:B1:23:E1:22:BE:7E:F0:3F:5F:50:B6:4F:4E:66:9A:70:D0:A7:56:FE:2A:2A:5B Fingerprint (SHA1): BE:BF:74:2F:7F:D5:B4:F3:0E:38:3D:10:0B:9B:39:26:2A:4C:B7:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #2696: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194742 (0x433ee2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:02 2025 Not After : Thu Nov 28 11:50:02 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:14:e9:99:0b:44:9a:a6:55:9f:65:af:6a:ff:09:8f: 89:1b:36:1c:dc:53:78:84:50:4a:98:3d:2d:d8:d1:b4: 6d:de:57:96:de:29:62:84:1c:d0:a8:16:73:d4:a9:9b: 81:86:f4:0b:c0:7c:32:46:c5:b0:7b:0c:44:45:9e:35: 9c:83:cf:22:b7:8a:6b:89:d7:1f:d0:c7:d0:7b:4c:44: a6:ee:0a:0e:e3:75:86:78:ba:52:46:21:0d:b8:8d:59: 17:7c:80:5c:31:a0:a9:0d:0b:2e:47:81:c0:c4:64:f1: 0e:88:5f:2c:f9:52:9e:19:da:0d:b1:d4:a8:74:b5:58: be:a8:88:bc:94:c0:9c:60:17:c8:7e:6c:cf:46:07:80: 45:04:9b:f9:59:ac:a9:d2:5e:97:16:84:2f:66:4a:1a: 0d:55:de:f7:31:b8:ad:33:d7:83:aa:fd:7a:6b:6c:77: 1b:dd:a4:ed:4a:80:56:fe:52:84:f0:9d:c9:68:30:a3: 8d:0c:30:4d:db:74:00:1c:de:fd:f8:2d:86:77:c6:f1: d3:5e:77:7c:bf:b1:0a:c2:0d:8b:a8:bc:ac:a6:5c:17: 61:f1:95:4e:aa:75:1a:97:5a:61:49:8f:d5:00:09:c9: d4:10:84:10:da:15:c5:cc:89:21:69:53:f0:1b:ca:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:83:66:f6:6f:94:de:13:03:14:ed:e5:03:bf:9e:65: 01:2e:d0:d8:cb:91:73:18:e3:87:47:28:89:94:81:63: 5c:ca:d3:18:e7:2b:1d:21:41:84:22:ca:b0:10:72:9a: 64:dd:10:53:6b:35:6d:d1:31:f4:28:30:27:29:db:e0: ed:05:4e:8a:9b:8c:0a:43:be:96:b5:8e:aa:c4:44:bc: 7b:60:5f:a5:1d:27:4d:d1:19:bf:a5:40:52:f6:7d:b5: 9f:08:bd:1f:1c:10:ad:d3:97:35:91:78:c6:cb:23:03: f3:c0:65:1c:58:e3:d2:c8:da:12:f0:d5:a7:8e:07:6f: 72:99:cb:21:11:75:86:85:f4:cd:67:4c:d6:ba:05:17: b2:66:70:83:df:f8:27:e5:ae:76:63:b7:89:ad:c3:ed: 84:1f:14:8f:44:4d:0e:9d:62:12:3b:8a:33:dd:d3:97: f1:d4:72:b7:a6:cb:59:08:12:99:2f:70:aa:77:17:9b: e2:dd:cc:9b:44:9c:02:c9:00:81:13:65:0b:28:ab:28: e2:ad:02:b0:30:b0:e7:16:f3:5a:a7:79:42:6a:ae:5a: 2c:5a:d1:d3:e7:0b:59:ba:0a:3e:1a:d2:bd:2d:5e:57: f0:fe:3d:a0:7c:da:5f:fe:4d:1c:dd:8b:bd:b4:d9:ce Fingerprint (SHA-256): 60:74:B8:6A:14:6D:FD:38:4A:F5:81:3E:E3:78:00:F1:59:84:A6:BA:1A:F8:9B:CA:8B:5F:3A:F0:A1:5D:11:AD Fingerprint (SHA1): 8D:91:3F:7E:3F:C8:4A:1A:ED:3A:82:63:1B:E3:BE:D2:28:FD:C3:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2697: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #2698: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194742 (0x433ee2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:02 2025 Not After : Thu Nov 28 11:50:02 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:14:e9:99:0b:44:9a:a6:55:9f:65:af:6a:ff:09:8f: 89:1b:36:1c:dc:53:78:84:50:4a:98:3d:2d:d8:d1:b4: 6d:de:57:96:de:29:62:84:1c:d0:a8:16:73:d4:a9:9b: 81:86:f4:0b:c0:7c:32:46:c5:b0:7b:0c:44:45:9e:35: 9c:83:cf:22:b7:8a:6b:89:d7:1f:d0:c7:d0:7b:4c:44: a6:ee:0a:0e:e3:75:86:78:ba:52:46:21:0d:b8:8d:59: 17:7c:80:5c:31:a0:a9:0d:0b:2e:47:81:c0:c4:64:f1: 0e:88:5f:2c:f9:52:9e:19:da:0d:b1:d4:a8:74:b5:58: be:a8:88:bc:94:c0:9c:60:17:c8:7e:6c:cf:46:07:80: 45:04:9b:f9:59:ac:a9:d2:5e:97:16:84:2f:66:4a:1a: 0d:55:de:f7:31:b8:ad:33:d7:83:aa:fd:7a:6b:6c:77: 1b:dd:a4:ed:4a:80:56:fe:52:84:f0:9d:c9:68:30:a3: 8d:0c:30:4d:db:74:00:1c:de:fd:f8:2d:86:77:c6:f1: d3:5e:77:7c:bf:b1:0a:c2:0d:8b:a8:bc:ac:a6:5c:17: 61:f1:95:4e:aa:75:1a:97:5a:61:49:8f:d5:00:09:c9: d4:10:84:10:da:15:c5:cc:89:21:69:53:f0:1b:ca:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:83:66:f6:6f:94:de:13:03:14:ed:e5:03:bf:9e:65: 01:2e:d0:d8:cb:91:73:18:e3:87:47:28:89:94:81:63: 5c:ca:d3:18:e7:2b:1d:21:41:84:22:ca:b0:10:72:9a: 64:dd:10:53:6b:35:6d:d1:31:f4:28:30:27:29:db:e0: ed:05:4e:8a:9b:8c:0a:43:be:96:b5:8e:aa:c4:44:bc: 7b:60:5f:a5:1d:27:4d:d1:19:bf:a5:40:52:f6:7d:b5: 9f:08:bd:1f:1c:10:ad:d3:97:35:91:78:c6:cb:23:03: f3:c0:65:1c:58:e3:d2:c8:da:12:f0:d5:a7:8e:07:6f: 72:99:cb:21:11:75:86:85:f4:cd:67:4c:d6:ba:05:17: b2:66:70:83:df:f8:27:e5:ae:76:63:b7:89:ad:c3:ed: 84:1f:14:8f:44:4d:0e:9d:62:12:3b:8a:33:dd:d3:97: f1:d4:72:b7:a6:cb:59:08:12:99:2f:70:aa:77:17:9b: e2:dd:cc:9b:44:9c:02:c9:00:81:13:65:0b:28:ab:28: e2:ad:02:b0:30:b0:e7:16:f3:5a:a7:79:42:6a:ae:5a: 2c:5a:d1:d3:e7:0b:59:ba:0a:3e:1a:d2:bd:2d:5e:57: f0:fe:3d:a0:7c:da:5f:fe:4d:1c:dd:8b:bd:b4:d9:ce Fingerprint (SHA-256): 60:74:B8:6A:14:6D:FD:38:4A:F5:81:3E:E3:78:00:F1:59:84:A6:BA:1A:F8:9B:CA:8B:5F:3A:F0:A1:5D:11:AD Fingerprint (SHA1): 8D:91:3F:7E:3F:C8:4A:1A:ED:3A:82:63:1B:E3:BE:D2:28:FD:C3:55 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2699: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194744 (0x433ee2b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:04 2025 Not After : Thu Nov 28 11:50:04 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:a0:fa:32:9b:a3:af:c4:03:86:43:4a:fe:38:13:1a: 1c:a4:f5:5e:4f:95:83:dd:34:4c:95:35:f9:4f:a8:ce: 70:e4:44:79:3e:2d:cc:05:f8:56:3c:06:98:c4:f6:6a: 51:ed:59:02:89:25:5b:a5:4e:fa:85:ec:2f:67:51:38: d8:ae:94:46:a7:73:39:5f:43:bb:82:cd:6f:60:70:f1: 5b:25:a1:78:a6:8a:58:76:84:91:fe:0f:17:0c:13:80: 55:19:59:7d:66:2d:c7:21:84:71:a8:89:59:a9:c8:c2: c7:08:8c:ea:75:f1:87:5b:f6:0f:f6:7f:34:01:a5:d3: a6:c2:5a:50:8e:80:bd:69:47:87:98:df:0c:a4:ab:40: 9d:9f:34:cf:49:07:e8:ef:9d:28:52:9e:1e:e5:ef:70: 93:04:89:01:ec:ee:33:5b:e8:46:e7:48:fe:c8:f3:09: 69:24:2a:bd:33:7a:7b:d5:e2:fa:d4:94:b2:2c:d5:08: b3:d7:f2:d5:61:ca:25:03:d9:c8:c0:6d:b4:fc:c5:ba: 47:e1:c1:20:8f:bc:3e:50:a3:c9:9a:24:74:6e:9f:81: 5c:78:a5:75:b5:55:c9:8a:3d:ec:61:bb:2d:f7:98:e7: 03:79:45:60:b0:a6:ff:7a:d3:87:e9:86:c7:88:dc:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:5d:77:30:4c:a5:aa:4b:dd:45:8b:88:f5:e8:e1:11: db:58:76:7d:0a:99:5c:97:56:53:e2:66:99:ac:3c:87: 98:44:a1:d0:ba:97:1c:31:60:f4:74:30:e4:ed:08:03: a4:65:db:a6:44:54:63:81:ab:25:c4:70:4b:dc:7f:8f: 1b:9f:f8:fe:27:06:b7:73:bf:85:5f:67:a5:e2:07:9b: ff:b9:60:89:ac:a8:29:5f:b8:96:a1:ec:bd:c5:48:cd: 86:79:87:73:67:1c:d7:84:52:8b:ef:8c:8e:f4:f6:36: 5b:e0:4c:ab:9c:31:39:05:00:69:74:4a:d2:71:18:36: 58:9f:cd:3e:ca:61:15:5a:3c:67:37:d3:d8:48:49:f3: b0:b2:4c:ec:ce:13:14:a8:5e:14:11:df:af:c7:04:0c: 5f:5f:2b:ea:38:c2:bf:1d:02:6c:1f:57:e0:e3:1b:8b: e3:c2:6e:c8:01:5b:2d:be:75:f9:7d:d2:72:d7:ac:87: 72:53:7f:78:22:17:b4:30:4d:2d:4b:b2:41:80:9a:51: bf:31:f1:aa:0f:eb:82:9d:bf:6c:f2:23:2e:59:a4:17: ed:29:7b:2c:a4:a1:1e:3d:6a:e2:5b:95:3a:58:b2:f0: 70:49:01:c4:7f:1f:b6:64:f2:89:4d:fd:c7:94:0b:d1 Fingerprint (SHA-256): 5F:A4:90:E9:40:92:67:DB:DE:B1:23:E1:22:BE:7E:F0:3F:5F:50:B6:4F:4E:66:9A:70:D0:A7:56:FE:2A:2A:5B Fingerprint (SHA1): BE:BF:74:2F:7F:D5:B4:F3:0E:38:3D:10:0B:9B:39:26:2A:4C:B7:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #2700: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #2701: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #2702: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #2703: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194742 (0x433ee2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:02 2025 Not After : Thu Nov 28 11:50:02 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:14:e9:99:0b:44:9a:a6:55:9f:65:af:6a:ff:09:8f: 89:1b:36:1c:dc:53:78:84:50:4a:98:3d:2d:d8:d1:b4: 6d:de:57:96:de:29:62:84:1c:d0:a8:16:73:d4:a9:9b: 81:86:f4:0b:c0:7c:32:46:c5:b0:7b:0c:44:45:9e:35: 9c:83:cf:22:b7:8a:6b:89:d7:1f:d0:c7:d0:7b:4c:44: a6:ee:0a:0e:e3:75:86:78:ba:52:46:21:0d:b8:8d:59: 17:7c:80:5c:31:a0:a9:0d:0b:2e:47:81:c0:c4:64:f1: 0e:88:5f:2c:f9:52:9e:19:da:0d:b1:d4:a8:74:b5:58: be:a8:88:bc:94:c0:9c:60:17:c8:7e:6c:cf:46:07:80: 45:04:9b:f9:59:ac:a9:d2:5e:97:16:84:2f:66:4a:1a: 0d:55:de:f7:31:b8:ad:33:d7:83:aa:fd:7a:6b:6c:77: 1b:dd:a4:ed:4a:80:56:fe:52:84:f0:9d:c9:68:30:a3: 8d:0c:30:4d:db:74:00:1c:de:fd:f8:2d:86:77:c6:f1: d3:5e:77:7c:bf:b1:0a:c2:0d:8b:a8:bc:ac:a6:5c:17: 61:f1:95:4e:aa:75:1a:97:5a:61:49:8f:d5:00:09:c9: d4:10:84:10:da:15:c5:cc:89:21:69:53:f0:1b:ca:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:83:66:f6:6f:94:de:13:03:14:ed:e5:03:bf:9e:65: 01:2e:d0:d8:cb:91:73:18:e3:87:47:28:89:94:81:63: 5c:ca:d3:18:e7:2b:1d:21:41:84:22:ca:b0:10:72:9a: 64:dd:10:53:6b:35:6d:d1:31:f4:28:30:27:29:db:e0: ed:05:4e:8a:9b:8c:0a:43:be:96:b5:8e:aa:c4:44:bc: 7b:60:5f:a5:1d:27:4d:d1:19:bf:a5:40:52:f6:7d:b5: 9f:08:bd:1f:1c:10:ad:d3:97:35:91:78:c6:cb:23:03: f3:c0:65:1c:58:e3:d2:c8:da:12:f0:d5:a7:8e:07:6f: 72:99:cb:21:11:75:86:85:f4:cd:67:4c:d6:ba:05:17: b2:66:70:83:df:f8:27:e5:ae:76:63:b7:89:ad:c3:ed: 84:1f:14:8f:44:4d:0e:9d:62:12:3b:8a:33:dd:d3:97: f1:d4:72:b7:a6:cb:59:08:12:99:2f:70:aa:77:17:9b: e2:dd:cc:9b:44:9c:02:c9:00:81:13:65:0b:28:ab:28: e2:ad:02:b0:30:b0:e7:16:f3:5a:a7:79:42:6a:ae:5a: 2c:5a:d1:d3:e7:0b:59:ba:0a:3e:1a:d2:bd:2d:5e:57: f0:fe:3d:a0:7c:da:5f:fe:4d:1c:dd:8b:bd:b4:d9:ce Fingerprint (SHA-256): 60:74:B8:6A:14:6D:FD:38:4A:F5:81:3E:E3:78:00:F1:59:84:A6:BA:1A:F8:9B:CA:8B:5F:3A:F0:A1:5D:11:AD Fingerprint (SHA1): 8D:91:3F:7E:3F:C8:4A:1A:ED:3A:82:63:1B:E3:BE:D2:28:FD:C3:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2704: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194746 (0x433ee2ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:50:05 2025 Not After : Thu Nov 28 11:50:05 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:68:ce:cb:22:a3:cf:d9:f9:e3:82:f7:0f:36:9f:82: cb:a8:a3:26:b1:e1:5a:d0:74:53:84:fc:3f:5a:60:24: 90:fe:20:32:32:b2:1d:14:30:6c:3e:5c:13:25:b9:27: 39:d0:93:52:c1:76:9c:c0:a6:76:7f:c9:95:74:e2:ff: bc:d7:da:54:26:41:5f:76:29:c1:d9:9f:fc:77:cd:c2: 9a:c2:56:6d:3f:3a:2b:47:89:bd:04:da:09:cc:bf:50: 42:70:3f:44:db:51:09:20:d6:e7:17:43:e1:c0:d5:e5: ea:94:94:72:12:a3:57:76:fd:5d:18:13:da:fb:47:95: b1:a6:88:45:f6:71:8a:38:fa:74:ab:b5:a1:be:8d:b8: f5:a2:e6:74:63:45:53:a5:dc:6e:ae:8a:63:63:fa:66: 1b:c4:f4:9e:be:89:ed:d9:c8:9d:fe:a1:43:ee:fe:e9: 21:b0:fb:25:66:70:2f:1d:df:f1:43:ee:d5:d5:f2:cb: 85:a5:09:6f:23:4e:3c:31:64:4f:81:cd:2d:ed:f7:24: 12:f6:02:ab:35:63:49:bb:c5:db:d7:83:a1:4a:09:88: 70:c1:0d:1f:ee:b7:11:6a:ce:8a:ed:14:04:8c:30:a5: 42:09:68:65:bb:05:95:c6:60:3b:d7:a7:3f:92:77:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:5f:ff:89:9c:bf:3f:24:f6:d1:bb:ee:1e:11:42:25: 62:cc:25:bf:4e:55:17:78:91:34:c3:e4:2f:ec:bf:e6: bd:1b:e2:01:0f:3b:b4:5b:3a:22:0b:57:2b:d0:4f:cd: 7b:0b:f3:3e:e2:6b:54:f5:69:83:15:5b:22:88:df:8d: 7f:b9:c6:c4:e8:ba:ac:9f:d5:e5:15:51:54:ad:b8:e8: 28:4f:2a:13:2e:83:e4:43:c6:d0:3a:32:2d:c7:65:c6: 45:e1:25:17:6c:77:2a:e0:ab:d0:06:d2:a3:2e:ec:ed: fb:e3:38:16:0e:b5:c4:3d:16:66:d1:10:c9:91:d7:f8: a1:d2:57:78:07:8c:5a:c7:7f:11:4c:f7:50:1f:63:65: 95:ad:fe:a9:b7:49:1d:a3:9e:ce:39:03:d4:75:30:83: db:0b:65:e7:54:9e:23:cf:0d:1b:ad:82:83:12:a4:91: 64:0d:f3:61:4c:59:02:4b:ce:be:b2:8b:9a:7b:f7:16: c6:cb:74:30:98:f7:d9:3c:a8:5f:13:72:64:9d:fc:35: 6d:27:6a:b8:11:85:1c:77:57:2c:64:e3:66:f5:c3:70: bf:a1:19:e0:33:26:3f:31:8f:26:0f:cb:cf:36:d4:72: 93:21:e5:21:ee:0f:60:9e:69:c5:22:f4:e2:30:a1:69 Fingerprint (SHA-256): 8D:8E:BB:6C:D1:1E:3D:67:5C:3F:68:F5:BA:69:0B:E0:7A:D8:9B:BF:23:00:BD:BF:A6:3F:00:31:8C:BB:B4:90 Fingerprint (SHA1): 4F:B3:0B:CE:58:69:68:F7:34:83:2B:99:C6:F1:68:89:20:2D:33:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #2705: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194742 (0x433ee2b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:02 2025 Not After : Thu Nov 28 11:50:02 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:14:e9:99:0b:44:9a:a6:55:9f:65:af:6a:ff:09:8f: 89:1b:36:1c:dc:53:78:84:50:4a:98:3d:2d:d8:d1:b4: 6d:de:57:96:de:29:62:84:1c:d0:a8:16:73:d4:a9:9b: 81:86:f4:0b:c0:7c:32:46:c5:b0:7b:0c:44:45:9e:35: 9c:83:cf:22:b7:8a:6b:89:d7:1f:d0:c7:d0:7b:4c:44: a6:ee:0a:0e:e3:75:86:78:ba:52:46:21:0d:b8:8d:59: 17:7c:80:5c:31:a0:a9:0d:0b:2e:47:81:c0:c4:64:f1: 0e:88:5f:2c:f9:52:9e:19:da:0d:b1:d4:a8:74:b5:58: be:a8:88:bc:94:c0:9c:60:17:c8:7e:6c:cf:46:07:80: 45:04:9b:f9:59:ac:a9:d2:5e:97:16:84:2f:66:4a:1a: 0d:55:de:f7:31:b8:ad:33:d7:83:aa:fd:7a:6b:6c:77: 1b:dd:a4:ed:4a:80:56:fe:52:84:f0:9d:c9:68:30:a3: 8d:0c:30:4d:db:74:00:1c:de:fd:f8:2d:86:77:c6:f1: d3:5e:77:7c:bf:b1:0a:c2:0d:8b:a8:bc:ac:a6:5c:17: 61:f1:95:4e:aa:75:1a:97:5a:61:49:8f:d5:00:09:c9: d4:10:84:10:da:15:c5:cc:89:21:69:53:f0:1b:ca:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:83:66:f6:6f:94:de:13:03:14:ed:e5:03:bf:9e:65: 01:2e:d0:d8:cb:91:73:18:e3:87:47:28:89:94:81:63: 5c:ca:d3:18:e7:2b:1d:21:41:84:22:ca:b0:10:72:9a: 64:dd:10:53:6b:35:6d:d1:31:f4:28:30:27:29:db:e0: ed:05:4e:8a:9b:8c:0a:43:be:96:b5:8e:aa:c4:44:bc: 7b:60:5f:a5:1d:27:4d:d1:19:bf:a5:40:52:f6:7d:b5: 9f:08:bd:1f:1c:10:ad:d3:97:35:91:78:c6:cb:23:03: f3:c0:65:1c:58:e3:d2:c8:da:12:f0:d5:a7:8e:07:6f: 72:99:cb:21:11:75:86:85:f4:cd:67:4c:d6:ba:05:17: b2:66:70:83:df:f8:27:e5:ae:76:63:b7:89:ad:c3:ed: 84:1f:14:8f:44:4d:0e:9d:62:12:3b:8a:33:dd:d3:97: f1:d4:72:b7:a6:cb:59:08:12:99:2f:70:aa:77:17:9b: e2:dd:cc:9b:44:9c:02:c9:00:81:13:65:0b:28:ab:28: e2:ad:02:b0:30:b0:e7:16:f3:5a:a7:79:42:6a:ae:5a: 2c:5a:d1:d3:e7:0b:59:ba:0a:3e:1a:d2:bd:2d:5e:57: f0:fe:3d:a0:7c:da:5f:fe:4d:1c:dd:8b:bd:b4:d9:ce Fingerprint (SHA-256): 60:74:B8:6A:14:6D:FD:38:4A:F5:81:3E:E3:78:00:F1:59:84:A6:BA:1A:F8:9B:CA:8B:5F:3A:F0:A1:5D:11:AD Fingerprint (SHA1): 8D:91:3F:7E:3F:C8:4A:1A:ED:3A:82:63:1B:E3:BE:D2:28:FD:C3:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2706: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #2707: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #2708: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #2709: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #2710: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #2711: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194747 (0x433ee2bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:50:06 2025 Not After : Thu Nov 28 11:50:06 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:27:6a:37:3d:ad:e2:1e:6c:d1:6d:c2:e6:30:cd:8b: 4e:8a:96:ef:3b:eb:79:a5:37:19:bc:f6:2c:aa:7d:c0: 42:34:53:f1:3b:ef:61:0c:2e:52:ab:eb:8c:00:01:10: 5b:83:6c:ed:b7:a7:08:15:b4:41:25:db:ea:2f:5e:e6: 44:c2:6c:b8:88:99:3e:27:46:07:7e:61:e0:1b:34:f9: 7e:a4:53:4f:9d:a3:ec:84:40:2f:ee:57:79:03:1b:3e: f3:5a:3b:11:f4:40:2a:de:3d:4b:ec:a8:af:1c:ea:76: 35:99:28:94:ed:df:64:18:df:ef:a1:8e:07:7f:5b:49: 13:d8:6a:d5:30:7e:b5:89:a3:a4:ec:a7:c3:12:0f:c3: 91:47:08:dd:44:b5:84:6a:fc:4b:89:7a:ce:a6:f9:7d: d6:8d:e1:d6:72:1a:45:45:8a:65:ff:08:d3:f1:9f:15: c4:0f:52:2f:aa:8e:37:fa:76:e0:83:ab:b9:fe:32:58: 6d:1b:ef:fe:79:ec:32:6f:b4:d2:1b:49:26:99:68:a5: 04:23:3d:00:e3:b6:e3:83:e1:8e:b8:88:7c:33:13:ba: 0c:4d:15:37:bd:c8:6a:9c:40:85:a6:05:30:ce:f5:6e: 1b:73:9a:fd:ee:01:1a:df:16:2f:12:ea:26:fa:ab:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 12:17:94:d6:0e:29:c7:e1:ba:d7:bb:56:50:b4:6c:97: 34:de:32:1a:34:65:bb:24:62:9b:fb:86:dd:4e:e5:3a: 1d:44:ec:13:fc:71:6e:0f:1f:19:11:5c:16:71:a3:ef: 0c:d3:5f:04:29:98:6b:7e:67:92:5b:c2:85:f4:ca:16: 3b:22:3f:47:2e:eb:90:70:a8:d9:07:79:71:3d:95:2d: 04:a0:f8:c3:25:2f:25:84:e0:68:60:3a:55:88:f3:94: a7:2e:77:06:89:29:58:19:7c:3d:87:74:d5:47:06:6a: 03:6d:90:e8:e0:e7:4c:7c:a2:21:1f:e1:cb:be:b0:ab: 33:07:d2:25:b8:5e:97:c1:e1:31:c7:2c:65:cd:27:fe: 0c:0c:4e:11:86:1e:38:71:6d:36:33:f8:21:97:ee:89: 9a:2c:1a:d4:91:ee:58:f3:6a:54:a2:b1:8c:05:33:01: 62:d3:77:d0:98:71:3e:76:c0:71:09:84:f4:b8:97:87: 38:87:e9:d2:09:6f:9f:27:73:e5:87:ba:aa:93:74:3e: 73:fd:62:b3:96:bd:1a:39:dd:ef:48:60:3b:71:02:3d: 8c:f9:10:4a:a2:ad:15:4f:61:37:fc:c5:56:27:90:62: c8:81:a0:0b:aa:8b:d8:a4:4b:18:06:d0:6a:4e:0c:c0 Fingerprint (SHA-256): FB:5C:57:83:16:58:75:DD:BC:71:A2:8D:98:AE:E6:9C:A9:B0:A4:BF:B8:E5:9B:20:84:B2:F6:C2:52:6A:6D:37 Fingerprint (SHA1): AE:AF:11:AA:8D:77:D9:85:90:75:08:30:FD:B4:56:98:B5:EF:39:D6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #2712: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #2713: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #2714: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #2715: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #2716: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #2717: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2718: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2719: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #2720: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2721: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2722: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #2723: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2724: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2725: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2726: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2727: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2728: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #2729: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2730: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2731: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2732: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2733: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #2734: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2735: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #2736: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #2737: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2334131 at Fri Nov 28 19:50:10 CST 2025 kill -USR1 2334131 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2334131 killed at Fri Nov 28 19:50:10 CST 2025 httpserv starting at Fri Nov 28 19:50:10 CST 2025 httpserv -D -p 9361 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/aiahttp/http_pid.2120400 & trying to connect to httpserv at Fri Nov 28 19:50:10 CST 2025 tstclnt -4 -p 9361 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9361 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2346683 >/dev/null 2>/dev/null httpserv with PID 2346683 found at Fri Nov 28 19:50:10 CST 2025 httpserv with PID 2346683 started at Fri Nov 28 19:50:10 CST 2025 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #2738: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2739: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194749 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2740: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2741: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2742: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194750 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2743: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2744: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2745: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2746: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194751 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2747: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2748: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194752 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2749: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2750: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2751: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2752: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2753: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1128194753 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2754: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2755: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2756: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2757: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2758: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194750 (0x433ee2be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:e4:f7:01:0e:e6:f6:eb:f4:63:65:e0:b1:ba:25:5f: fb:d3:4b:db:d8:b0:db:f5:17:be:2c:10:b3:e2:dc:98: ea:db:83:ef:68:dd:d1:4b:68:fe:3f:54:98:dd:00:01: 1d:dd:76:16:d5:3d:38:d3:47:60:cd:5b:ad:98:94:70: 15:3f:c7:43:ed:23:e5:bb:72:92:0c:b3:5d:62:d5:ab: ca:20:8c:4c:9c:b9:8c:11:46:66:79:73:0e:b3:63:c8: cb:b7:5d:8f:a3:1b:e6:c9:ac:46:ed:80:c0:b3:f4:34: 28:08:97:ab:84:fe:5d:11:f1:9e:88:fb:4b:b1:70:ec: 7b:36:39:6c:f3:29:28:e5:1c:98:94:0e:2f:e0:82:ca: fe:03:a3:95:ff:dc:53:a0:03:0d:aa:be:97:a9:30:8b: df:fa:b4:62:f5:a9:2c:05:c9:cd:19:55:d9:dc:33:9d: fb:21:20:2d:ab:1e:4c:8d:bd:bc:c5:60:a0:da:9e:bb: fb:15:1a:5f:7b:2a:d0:6a:67:97:15:5b:fc:ba:11:81: ff:42:59:e2:30:b0:5b:92:00:52:83:68:d2:c1:f0:ff: 74:67:3f:17:35:b9:ce:9c:46:35:9b:19:23:fa:79:84: 81:1f:37:28:58:8c:51:a4:fd:08:db:7f:46:fa:95:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:4e:d7:5c:f8:ad:14:da:5a:65:a9:94:ac:31:0f:8d: 86:f1:7e:1d:79:71:e3:e8:4e:09:0c:05:1e:e1:eb:c9: 4c:a1:a3:9e:82:85:af:01:7d:31:cb:d6:82:d8:36:21: 87:41:c4:6f:bc:b4:d8:83:b1:16:81:78:83:c7:df:7f: ff:50:ae:0a:b6:88:5b:60:d6:e9:35:4d:22:bc:6f:ad: e5:06:39:f4:c4:5e:19:22:12:09:77:94:24:e0:36:7a: de:56:cd:32:dd:25:3a:50:67:c9:df:bd:c7:10:e5:76: bd:31:00:24:29:ef:94:7c:e7:25:8a:7f:f0:97:62:6d: c4:6b:ab:17:26:4b:86:ce:c2:c9:8d:4b:1b:e5:48:63: 23:d2:b9:90:18:bd:19:ac:48:d6:01:3f:b7:63:69:04: 51:6a:6c:88:9c:0c:26:9a:c5:4d:db:0b:ce:c5:bf:9d: 45:6f:5f:aa:cd:d2:12:40:68:19:72:ca:2c:ab:30:36: 84:f8:c0:be:d7:df:94:1b:b0:36:fa:12:af:7a:40:b3: 3b:49:30:af:93:d8:d2:16:52:30:d4:ef:4c:29:10:72: e6:ba:7e:32:a2:b6:ca:c4:71:94:a5:e3:0a:e1:33:ec: e1:20:4c:14:e4:69:99:73:96:f2:df:b6:a2:b7:e6:a7 Fingerprint (SHA-256): FD:D2:83:96:8A:0D:F5:7B:DC:06:EE:23:45:F6:50:EF:56:6A:41:D0:84:9F:BD:B1:5A:D9:C2:BA:87:A5:46:6A Fingerprint (SHA1): FA:44:3D:6D:8B:0C:00:12:C7:00:BE:03:F0:DB:D7:6E:8E:EC:57:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2759: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194749 (0x433ee2bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:5c:3f:88:3b:45:10:dc:c5:fc:bf:28:1e:bb:d7:5e: 53:54:49:39:a7:f7:52:b6:2a:ee:5f:30:b4:d5:57:68: df:21:2b:ff:ef:b8:b6:ae:4a:1b:7f:83:21:65:f0:f3: 4a:ef:97:06:ab:b9:6a:80:0d:a7:d6:b9:b4:56:16:e5: 2c:8d:0d:2c:8a:18:9a:11:b2:ac:fd:04:f5:4f:89:fb: 60:8d:f6:db:b0:12:22:13:12:45:a1:4e:04:8e:e9:85: 86:79:5a:8f:26:c3:7a:b6:8a:94:fc:dd:43:3b:de:2a: 0a:d9:a3:18:d0:0c:82:d6:03:e2:70:0a:87:d8:ae:cc: a8:11:2c:d0:25:17:35:b4:bc:5a:ac:b4:07:1d:58:0d: 4f:ac:7e:b2:60:94:21:17:f9:ac:f7:35:25:a3:97:9a: 77:0f:a4:3e:51:ac:82:82:b2:35:98:01:d6:56:79:6b: 0a:d7:42:be:ce:59:d7:46:ac:6c:7f:10:9d:b7:00:f5: 57:1e:fb:1d:0a:d3:0a:31:81:87:0c:b1:74:56:19:fd: 81:0b:02:d9:a0:07:7c:17:76:2d:6e:a4:7a:e9:e3:ee: 19:90:e5:1f:24:54:1b:21:7f:12:74:23:57:fa:78:a3: 93:b3:99:8f:8e:40:b0:fc:79:d7:ee:3a:ed:31:31:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:5e:49:f6:4b:63:71:63:d3:c5:14:c2:bf:f2:6d:25: 3f:3a:41:ec:89:7d:60:66:54:fc:19:bc:47:4c:98:5f: 79:15:f2:e6:c6:df:b7:4c:29:8c:b4:bf:ca:1a:db:71: 16:b8:1d:88:f9:02:7e:a3:8a:4d:9b:8b:b3:3a:cf:48: 54:fe:ab:50:d4:72:23:42:b5:d7:84:d6:c7:47:13:b5: 72:d1:b3:3f:63:90:af:e6:c6:df:e4:55:73:c8:ff:78: c6:be:54:40:8e:d6:fa:63:28:01:cc:53:47:81:60:e5: a6:ff:8d:8f:dc:6d:9e:ff:f6:83:9f:e7:21:88:1f:4d: c8:27:92:45:c2:b7:52:05:40:b5:0f:1f:e1:41:60:cc: e1:e7:56:50:ee:13:a8:09:bf:1e:ea:83:bd:18:78:b0: f3:0f:42:98:ad:01:81:f6:96:16:c1:0d:db:76:05:90: 33:b7:17:f9:39:7a:6e:64:dc:db:69:27:f8:57:e4:4a: 35:09:0c:50:b6:ba:01:a3:82:90:29:0b:bd:7e:98:c2: f6:8c:25:d8:43:ea:a2:3a:21:a3:9b:0f:59:ce:db:a7: d1:68:76:b1:98:7d:72:36:18:2b:70:3d:ac:17:b1:d5: b1:b1:65:55:6e:ee:51:55:80:28:2d:7c:10:d7:75:5e Fingerprint (SHA-256): 45:95:2B:06:04:A1:E9:92:5D:55:EE:41:88:59:E5:91:B7:6D:2C:3B:C0:83:4B:CD:B2:D0:82:67:03:D5:D4:11 Fingerprint (SHA1): 6B:52:E2:51:79:9F:BB:B1:41:8C:F0:2D:0D:F4:30:F4:A0:38:BA:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2760: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2761: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2762: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2763: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194749 (0x433ee2bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:5c:3f:88:3b:45:10:dc:c5:fc:bf:28:1e:bb:d7:5e: 53:54:49:39:a7:f7:52:b6:2a:ee:5f:30:b4:d5:57:68: df:21:2b:ff:ef:b8:b6:ae:4a:1b:7f:83:21:65:f0:f3: 4a:ef:97:06:ab:b9:6a:80:0d:a7:d6:b9:b4:56:16:e5: 2c:8d:0d:2c:8a:18:9a:11:b2:ac:fd:04:f5:4f:89:fb: 60:8d:f6:db:b0:12:22:13:12:45:a1:4e:04:8e:e9:85: 86:79:5a:8f:26:c3:7a:b6:8a:94:fc:dd:43:3b:de:2a: 0a:d9:a3:18:d0:0c:82:d6:03:e2:70:0a:87:d8:ae:cc: a8:11:2c:d0:25:17:35:b4:bc:5a:ac:b4:07:1d:58:0d: 4f:ac:7e:b2:60:94:21:17:f9:ac:f7:35:25:a3:97:9a: 77:0f:a4:3e:51:ac:82:82:b2:35:98:01:d6:56:79:6b: 0a:d7:42:be:ce:59:d7:46:ac:6c:7f:10:9d:b7:00:f5: 57:1e:fb:1d:0a:d3:0a:31:81:87:0c:b1:74:56:19:fd: 81:0b:02:d9:a0:07:7c:17:76:2d:6e:a4:7a:e9:e3:ee: 19:90:e5:1f:24:54:1b:21:7f:12:74:23:57:fa:78:a3: 93:b3:99:8f:8e:40:b0:fc:79:d7:ee:3a:ed:31:31:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:5e:49:f6:4b:63:71:63:d3:c5:14:c2:bf:f2:6d:25: 3f:3a:41:ec:89:7d:60:66:54:fc:19:bc:47:4c:98:5f: 79:15:f2:e6:c6:df:b7:4c:29:8c:b4:bf:ca:1a:db:71: 16:b8:1d:88:f9:02:7e:a3:8a:4d:9b:8b:b3:3a:cf:48: 54:fe:ab:50:d4:72:23:42:b5:d7:84:d6:c7:47:13:b5: 72:d1:b3:3f:63:90:af:e6:c6:df:e4:55:73:c8:ff:78: c6:be:54:40:8e:d6:fa:63:28:01:cc:53:47:81:60:e5: a6:ff:8d:8f:dc:6d:9e:ff:f6:83:9f:e7:21:88:1f:4d: c8:27:92:45:c2:b7:52:05:40:b5:0f:1f:e1:41:60:cc: e1:e7:56:50:ee:13:a8:09:bf:1e:ea:83:bd:18:78:b0: f3:0f:42:98:ad:01:81:f6:96:16:c1:0d:db:76:05:90: 33:b7:17:f9:39:7a:6e:64:dc:db:69:27:f8:57:e4:4a: 35:09:0c:50:b6:ba:01:a3:82:90:29:0b:bd:7e:98:c2: f6:8c:25:d8:43:ea:a2:3a:21:a3:9b:0f:59:ce:db:a7: d1:68:76:b1:98:7d:72:36:18:2b:70:3d:ac:17:b1:d5: b1:b1:65:55:6e:ee:51:55:80:28:2d:7c:10:d7:75:5e Fingerprint (SHA-256): 45:95:2B:06:04:A1:E9:92:5D:55:EE:41:88:59:E5:91:B7:6D:2C:3B:C0:83:4B:CD:B2:D0:82:67:03:D5:D4:11 Fingerprint (SHA1): 6B:52:E2:51:79:9F:BB:B1:41:8C:F0:2D:0D:F4:30:F4:A0:38:BA:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2764: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194750 (0x433ee2be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:e4:f7:01:0e:e6:f6:eb:f4:63:65:e0:b1:ba:25:5f: fb:d3:4b:db:d8:b0:db:f5:17:be:2c:10:b3:e2:dc:98: ea:db:83:ef:68:dd:d1:4b:68:fe:3f:54:98:dd:00:01: 1d:dd:76:16:d5:3d:38:d3:47:60:cd:5b:ad:98:94:70: 15:3f:c7:43:ed:23:e5:bb:72:92:0c:b3:5d:62:d5:ab: ca:20:8c:4c:9c:b9:8c:11:46:66:79:73:0e:b3:63:c8: cb:b7:5d:8f:a3:1b:e6:c9:ac:46:ed:80:c0:b3:f4:34: 28:08:97:ab:84:fe:5d:11:f1:9e:88:fb:4b:b1:70:ec: 7b:36:39:6c:f3:29:28:e5:1c:98:94:0e:2f:e0:82:ca: fe:03:a3:95:ff:dc:53:a0:03:0d:aa:be:97:a9:30:8b: df:fa:b4:62:f5:a9:2c:05:c9:cd:19:55:d9:dc:33:9d: fb:21:20:2d:ab:1e:4c:8d:bd:bc:c5:60:a0:da:9e:bb: fb:15:1a:5f:7b:2a:d0:6a:67:97:15:5b:fc:ba:11:81: ff:42:59:e2:30:b0:5b:92:00:52:83:68:d2:c1:f0:ff: 74:67:3f:17:35:b9:ce:9c:46:35:9b:19:23:fa:79:84: 81:1f:37:28:58:8c:51:a4:fd:08:db:7f:46:fa:95:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:4e:d7:5c:f8:ad:14:da:5a:65:a9:94:ac:31:0f:8d: 86:f1:7e:1d:79:71:e3:e8:4e:09:0c:05:1e:e1:eb:c9: 4c:a1:a3:9e:82:85:af:01:7d:31:cb:d6:82:d8:36:21: 87:41:c4:6f:bc:b4:d8:83:b1:16:81:78:83:c7:df:7f: ff:50:ae:0a:b6:88:5b:60:d6:e9:35:4d:22:bc:6f:ad: e5:06:39:f4:c4:5e:19:22:12:09:77:94:24:e0:36:7a: de:56:cd:32:dd:25:3a:50:67:c9:df:bd:c7:10:e5:76: bd:31:00:24:29:ef:94:7c:e7:25:8a:7f:f0:97:62:6d: c4:6b:ab:17:26:4b:86:ce:c2:c9:8d:4b:1b:e5:48:63: 23:d2:b9:90:18:bd:19:ac:48:d6:01:3f:b7:63:69:04: 51:6a:6c:88:9c:0c:26:9a:c5:4d:db:0b:ce:c5:bf:9d: 45:6f:5f:aa:cd:d2:12:40:68:19:72:ca:2c:ab:30:36: 84:f8:c0:be:d7:df:94:1b:b0:36:fa:12:af:7a:40:b3: 3b:49:30:af:93:d8:d2:16:52:30:d4:ef:4c:29:10:72: e6:ba:7e:32:a2:b6:ca:c4:71:94:a5:e3:0a:e1:33:ec: e1:20:4c:14:e4:69:99:73:96:f2:df:b6:a2:b7:e6:a7 Fingerprint (SHA-256): FD:D2:83:96:8A:0D:F5:7B:DC:06:EE:23:45:F6:50:EF:56:6A:41:D0:84:9F:BD:B1:5A:D9:C2:BA:87:A5:46:6A Fingerprint (SHA1): FA:44:3D:6D:8B:0C:00:12:C7:00:BE:03:F0:DB:D7:6E:8E:EC:57:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2765: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2766: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2767: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2768: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2769: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2770: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194750 (0x433ee2be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:e4:f7:01:0e:e6:f6:eb:f4:63:65:e0:b1:ba:25:5f: fb:d3:4b:db:d8:b0:db:f5:17:be:2c:10:b3:e2:dc:98: ea:db:83:ef:68:dd:d1:4b:68:fe:3f:54:98:dd:00:01: 1d:dd:76:16:d5:3d:38:d3:47:60:cd:5b:ad:98:94:70: 15:3f:c7:43:ed:23:e5:bb:72:92:0c:b3:5d:62:d5:ab: ca:20:8c:4c:9c:b9:8c:11:46:66:79:73:0e:b3:63:c8: cb:b7:5d:8f:a3:1b:e6:c9:ac:46:ed:80:c0:b3:f4:34: 28:08:97:ab:84:fe:5d:11:f1:9e:88:fb:4b:b1:70:ec: 7b:36:39:6c:f3:29:28:e5:1c:98:94:0e:2f:e0:82:ca: fe:03:a3:95:ff:dc:53:a0:03:0d:aa:be:97:a9:30:8b: df:fa:b4:62:f5:a9:2c:05:c9:cd:19:55:d9:dc:33:9d: fb:21:20:2d:ab:1e:4c:8d:bd:bc:c5:60:a0:da:9e:bb: fb:15:1a:5f:7b:2a:d0:6a:67:97:15:5b:fc:ba:11:81: ff:42:59:e2:30:b0:5b:92:00:52:83:68:d2:c1:f0:ff: 74:67:3f:17:35:b9:ce:9c:46:35:9b:19:23:fa:79:84: 81:1f:37:28:58:8c:51:a4:fd:08:db:7f:46:fa:95:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:4e:d7:5c:f8:ad:14:da:5a:65:a9:94:ac:31:0f:8d: 86:f1:7e:1d:79:71:e3:e8:4e:09:0c:05:1e:e1:eb:c9: 4c:a1:a3:9e:82:85:af:01:7d:31:cb:d6:82:d8:36:21: 87:41:c4:6f:bc:b4:d8:83:b1:16:81:78:83:c7:df:7f: ff:50:ae:0a:b6:88:5b:60:d6:e9:35:4d:22:bc:6f:ad: e5:06:39:f4:c4:5e:19:22:12:09:77:94:24:e0:36:7a: de:56:cd:32:dd:25:3a:50:67:c9:df:bd:c7:10:e5:76: bd:31:00:24:29:ef:94:7c:e7:25:8a:7f:f0:97:62:6d: c4:6b:ab:17:26:4b:86:ce:c2:c9:8d:4b:1b:e5:48:63: 23:d2:b9:90:18:bd:19:ac:48:d6:01:3f:b7:63:69:04: 51:6a:6c:88:9c:0c:26:9a:c5:4d:db:0b:ce:c5:bf:9d: 45:6f:5f:aa:cd:d2:12:40:68:19:72:ca:2c:ab:30:36: 84:f8:c0:be:d7:df:94:1b:b0:36:fa:12:af:7a:40:b3: 3b:49:30:af:93:d8:d2:16:52:30:d4:ef:4c:29:10:72: e6:ba:7e:32:a2:b6:ca:c4:71:94:a5:e3:0a:e1:33:ec: e1:20:4c:14:e4:69:99:73:96:f2:df:b6:a2:b7:e6:a7 Fingerprint (SHA-256): FD:D2:83:96:8A:0D:F5:7B:DC:06:EE:23:45:F6:50:EF:56:6A:41:D0:84:9F:BD:B1:5A:D9:C2:BA:87:A5:46:6A Fingerprint (SHA1): FA:44:3D:6D:8B:0C:00:12:C7:00:BE:03:F0:DB:D7:6E:8E:EC:57:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2771: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194750 (0x433ee2be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:e4:f7:01:0e:e6:f6:eb:f4:63:65:e0:b1:ba:25:5f: fb:d3:4b:db:d8:b0:db:f5:17:be:2c:10:b3:e2:dc:98: ea:db:83:ef:68:dd:d1:4b:68:fe:3f:54:98:dd:00:01: 1d:dd:76:16:d5:3d:38:d3:47:60:cd:5b:ad:98:94:70: 15:3f:c7:43:ed:23:e5:bb:72:92:0c:b3:5d:62:d5:ab: ca:20:8c:4c:9c:b9:8c:11:46:66:79:73:0e:b3:63:c8: cb:b7:5d:8f:a3:1b:e6:c9:ac:46:ed:80:c0:b3:f4:34: 28:08:97:ab:84:fe:5d:11:f1:9e:88:fb:4b:b1:70:ec: 7b:36:39:6c:f3:29:28:e5:1c:98:94:0e:2f:e0:82:ca: fe:03:a3:95:ff:dc:53:a0:03:0d:aa:be:97:a9:30:8b: df:fa:b4:62:f5:a9:2c:05:c9:cd:19:55:d9:dc:33:9d: fb:21:20:2d:ab:1e:4c:8d:bd:bc:c5:60:a0:da:9e:bb: fb:15:1a:5f:7b:2a:d0:6a:67:97:15:5b:fc:ba:11:81: ff:42:59:e2:30:b0:5b:92:00:52:83:68:d2:c1:f0:ff: 74:67:3f:17:35:b9:ce:9c:46:35:9b:19:23:fa:79:84: 81:1f:37:28:58:8c:51:a4:fd:08:db:7f:46:fa:95:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:4e:d7:5c:f8:ad:14:da:5a:65:a9:94:ac:31:0f:8d: 86:f1:7e:1d:79:71:e3:e8:4e:09:0c:05:1e:e1:eb:c9: 4c:a1:a3:9e:82:85:af:01:7d:31:cb:d6:82:d8:36:21: 87:41:c4:6f:bc:b4:d8:83:b1:16:81:78:83:c7:df:7f: ff:50:ae:0a:b6:88:5b:60:d6:e9:35:4d:22:bc:6f:ad: e5:06:39:f4:c4:5e:19:22:12:09:77:94:24:e0:36:7a: de:56:cd:32:dd:25:3a:50:67:c9:df:bd:c7:10:e5:76: bd:31:00:24:29:ef:94:7c:e7:25:8a:7f:f0:97:62:6d: c4:6b:ab:17:26:4b:86:ce:c2:c9:8d:4b:1b:e5:48:63: 23:d2:b9:90:18:bd:19:ac:48:d6:01:3f:b7:63:69:04: 51:6a:6c:88:9c:0c:26:9a:c5:4d:db:0b:ce:c5:bf:9d: 45:6f:5f:aa:cd:d2:12:40:68:19:72:ca:2c:ab:30:36: 84:f8:c0:be:d7:df:94:1b:b0:36:fa:12:af:7a:40:b3: 3b:49:30:af:93:d8:d2:16:52:30:d4:ef:4c:29:10:72: e6:ba:7e:32:a2:b6:ca:c4:71:94:a5:e3:0a:e1:33:ec: e1:20:4c:14:e4:69:99:73:96:f2:df:b6:a2:b7:e6:a7 Fingerprint (SHA-256): FD:D2:83:96:8A:0D:F5:7B:DC:06:EE:23:45:F6:50:EF:56:6A:41:D0:84:9F:BD:B1:5A:D9:C2:BA:87:A5:46:6A Fingerprint (SHA1): FA:44:3D:6D:8B:0C:00:12:C7:00:BE:03:F0:DB:D7:6E:8E:EC:57:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2772: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2773: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2774: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2775: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2776: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2777: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194749 (0x433ee2bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:5c:3f:88:3b:45:10:dc:c5:fc:bf:28:1e:bb:d7:5e: 53:54:49:39:a7:f7:52:b6:2a:ee:5f:30:b4:d5:57:68: df:21:2b:ff:ef:b8:b6:ae:4a:1b:7f:83:21:65:f0:f3: 4a:ef:97:06:ab:b9:6a:80:0d:a7:d6:b9:b4:56:16:e5: 2c:8d:0d:2c:8a:18:9a:11:b2:ac:fd:04:f5:4f:89:fb: 60:8d:f6:db:b0:12:22:13:12:45:a1:4e:04:8e:e9:85: 86:79:5a:8f:26:c3:7a:b6:8a:94:fc:dd:43:3b:de:2a: 0a:d9:a3:18:d0:0c:82:d6:03:e2:70:0a:87:d8:ae:cc: a8:11:2c:d0:25:17:35:b4:bc:5a:ac:b4:07:1d:58:0d: 4f:ac:7e:b2:60:94:21:17:f9:ac:f7:35:25:a3:97:9a: 77:0f:a4:3e:51:ac:82:82:b2:35:98:01:d6:56:79:6b: 0a:d7:42:be:ce:59:d7:46:ac:6c:7f:10:9d:b7:00:f5: 57:1e:fb:1d:0a:d3:0a:31:81:87:0c:b1:74:56:19:fd: 81:0b:02:d9:a0:07:7c:17:76:2d:6e:a4:7a:e9:e3:ee: 19:90:e5:1f:24:54:1b:21:7f:12:74:23:57:fa:78:a3: 93:b3:99:8f:8e:40:b0:fc:79:d7:ee:3a:ed:31:31:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:5e:49:f6:4b:63:71:63:d3:c5:14:c2:bf:f2:6d:25: 3f:3a:41:ec:89:7d:60:66:54:fc:19:bc:47:4c:98:5f: 79:15:f2:e6:c6:df:b7:4c:29:8c:b4:bf:ca:1a:db:71: 16:b8:1d:88:f9:02:7e:a3:8a:4d:9b:8b:b3:3a:cf:48: 54:fe:ab:50:d4:72:23:42:b5:d7:84:d6:c7:47:13:b5: 72:d1:b3:3f:63:90:af:e6:c6:df:e4:55:73:c8:ff:78: c6:be:54:40:8e:d6:fa:63:28:01:cc:53:47:81:60:e5: a6:ff:8d:8f:dc:6d:9e:ff:f6:83:9f:e7:21:88:1f:4d: c8:27:92:45:c2:b7:52:05:40:b5:0f:1f:e1:41:60:cc: e1:e7:56:50:ee:13:a8:09:bf:1e:ea:83:bd:18:78:b0: f3:0f:42:98:ad:01:81:f6:96:16:c1:0d:db:76:05:90: 33:b7:17:f9:39:7a:6e:64:dc:db:69:27:f8:57:e4:4a: 35:09:0c:50:b6:ba:01:a3:82:90:29:0b:bd:7e:98:c2: f6:8c:25:d8:43:ea:a2:3a:21:a3:9b:0f:59:ce:db:a7: d1:68:76:b1:98:7d:72:36:18:2b:70:3d:ac:17:b1:d5: b1:b1:65:55:6e:ee:51:55:80:28:2d:7c:10:d7:75:5e Fingerprint (SHA-256): 45:95:2B:06:04:A1:E9:92:5D:55:EE:41:88:59:E5:91:B7:6D:2C:3B:C0:83:4B:CD:B2:D0:82:67:03:D5:D4:11 Fingerprint (SHA1): 6B:52:E2:51:79:9F:BB:B1:41:8C:F0:2D:0D:F4:30:F4:A0:38:BA:EF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2778: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194749 (0x433ee2bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:50:11 2025 Not After : Thu Nov 28 11:50:11 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:5c:3f:88:3b:45:10:dc:c5:fc:bf:28:1e:bb:d7:5e: 53:54:49:39:a7:f7:52:b6:2a:ee:5f:30:b4:d5:57:68: df:21:2b:ff:ef:b8:b6:ae:4a:1b:7f:83:21:65:f0:f3: 4a:ef:97:06:ab:b9:6a:80:0d:a7:d6:b9:b4:56:16:e5: 2c:8d:0d:2c:8a:18:9a:11:b2:ac:fd:04:f5:4f:89:fb: 60:8d:f6:db:b0:12:22:13:12:45:a1:4e:04:8e:e9:85: 86:79:5a:8f:26:c3:7a:b6:8a:94:fc:dd:43:3b:de:2a: 0a:d9:a3:18:d0:0c:82:d6:03:e2:70:0a:87:d8:ae:cc: a8:11:2c:d0:25:17:35:b4:bc:5a:ac:b4:07:1d:58:0d: 4f:ac:7e:b2:60:94:21:17:f9:ac:f7:35:25:a3:97:9a: 77:0f:a4:3e:51:ac:82:82:b2:35:98:01:d6:56:79:6b: 0a:d7:42:be:ce:59:d7:46:ac:6c:7f:10:9d:b7:00:f5: 57:1e:fb:1d:0a:d3:0a:31:81:87:0c:b1:74:56:19:fd: 81:0b:02:d9:a0:07:7c:17:76:2d:6e:a4:7a:e9:e3:ee: 19:90:e5:1f:24:54:1b:21:7f:12:74:23:57:fa:78:a3: 93:b3:99:8f:8e:40:b0:fc:79:d7:ee:3a:ed:31:31:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:5e:49:f6:4b:63:71:63:d3:c5:14:c2:bf:f2:6d:25: 3f:3a:41:ec:89:7d:60:66:54:fc:19:bc:47:4c:98:5f: 79:15:f2:e6:c6:df:b7:4c:29:8c:b4:bf:ca:1a:db:71: 16:b8:1d:88:f9:02:7e:a3:8a:4d:9b:8b:b3:3a:cf:48: 54:fe:ab:50:d4:72:23:42:b5:d7:84:d6:c7:47:13:b5: 72:d1:b3:3f:63:90:af:e6:c6:df:e4:55:73:c8:ff:78: c6:be:54:40:8e:d6:fa:63:28:01:cc:53:47:81:60:e5: a6:ff:8d:8f:dc:6d:9e:ff:f6:83:9f:e7:21:88:1f:4d: c8:27:92:45:c2:b7:52:05:40:b5:0f:1f:e1:41:60:cc: e1:e7:56:50:ee:13:a8:09:bf:1e:ea:83:bd:18:78:b0: f3:0f:42:98:ad:01:81:f6:96:16:c1:0d:db:76:05:90: 33:b7:17:f9:39:7a:6e:64:dc:db:69:27:f8:57:e4:4a: 35:09:0c:50:b6:ba:01:a3:82:90:29:0b:bd:7e:98:c2: f6:8c:25:d8:43:ea:a2:3a:21:a3:9b:0f:59:ce:db:a7: d1:68:76:b1:98:7d:72:36:18:2b:70:3d:ac:17:b1:d5: b1:b1:65:55:6e:ee:51:55:80:28:2d:7c:10:d7:75:5e Fingerprint (SHA-256): 45:95:2B:06:04:A1:E9:92:5D:55:EE:41:88:59:E5:91:B7:6D:2C:3B:C0:83:4B:CD:B2:D0:82:67:03:D5:D4:11 Fingerprint (SHA1): 6B:52:E2:51:79:9F:BB:B1:41:8C:F0:2D:0D:F4:30:F4:A0:38:BA:EF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2779: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2780: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194754 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2781: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2782: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2783: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194755 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2784: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2785: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2786: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194756 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2787: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2788: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2789: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194757 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2790: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2791: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2792: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194758 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2793: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2794: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2795: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194759 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2796: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2797: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2798: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194760 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2799: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2800: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2801: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194761 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2802: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2803: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2804: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194762 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2805: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2806: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2807: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2808: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1128194763 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2809: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2810: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1128194764 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2811: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2812: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1128194765 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2813: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2814: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2815: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2816: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2817: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1128194766 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2818: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2819: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1128194767 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2820: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2821: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1128194768 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2822: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2823: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #2824: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #2825: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2826: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1128194769 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2827: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2828: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1128194770 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2829: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2830: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1128194771 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2831: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2832: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #2833: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #2834: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2835: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1128194772 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2836: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2837: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1128194773 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2838: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2839: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1128194774 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2840: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2841: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2842: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2843: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2844: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1128194775 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2845: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2846: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2847: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2848: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194776 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2849: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2850: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194754 (0x433ee2c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Fri Nov 28 11:50:15 2025 Not After : Thu Nov 28 11:50:15 2075 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fc:ba:9b:98:67:ef:fd:b9:7a:2e:a6:2e:84:e7:99: 06:c1:1c:2a:22:04:89:5f:f0:59:89:14:b3:99:c1:36: c2:11:a7:31:e6:9b:b1:b2:36:09:71:20:4c:37:1c:f5: d5:a6:f2:2a:d5:38:aa:12:1b:43:43:63:06:75:46:3c: 3b:ff:1d:1f:05:39:2d:39:ec:30:84:07:31:7e:20:79: ff:6c:09:9a:90:09:db:bf:b7:45:17:04:2d:e9:e6:55: d0:5d:c7:3e:e1:62:cf:7e:e2:4b:cb:50:1d:92:db:37: b6:73:bd:3c:0b:40:d6:ca:ca:86:8f:3d:8e:46:1a:4e: bd:9d:8b:ef:f8:8c:e7:9a:1f:36:42:9c:b4:95:af:e0: 06:7c:9f:41:a2:ab:24:06:db:8c:70:f2:9f:ba:a7:58: 3a:c1:bb:c6:1d:25:b4:2a:9c:f7:06:cf:81:67:f6:40: e6:66:f3:92:8f:f2:03:27:66:2c:9b:d8:81:79:4a:7b: 9d:5e:aa:3d:0a:4d:8f:a5:3f:f1:d8:8b:71:a4:e1:7d: c2:49:3a:ad:47:da:48:d1:1d:a6:61:0d:74:6e:a5:5c: 68:88:d5:3b:db:f5:8a:a3:10:a9:2d:46:4c:e5:45:ac: 8f:db:58:2f:b2:4b:93:49:c9:2d:fb:2d:6e:c2:ad:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:30:f8:ce:2e:d6:b0:ce:e1:61:eb:38:72:0e:35:89: 0b:7a:aa:30:a5:d9:cf:f6:36:97:7d:8d:31:90:d1:3d: 0f:47:06:38:b7:4c:a9:cd:44:e8:95:91:27:43:f0:76: 3b:31:a8:3c:d4:11:79:90:3d:0c:49:0d:45:59:86:44: c6:63:68:af:13:ef:f0:4e:f7:01:05:ba:8e:a7:da:06: df:f4:df:36:76:6e:06:da:fa:56:db:45:4b:e6:c2:f0: e5:16:18:f8:58:1f:10:1d:d9:ba:7b:c9:f5:20:ca:71: 5e:c9:bf:0d:8f:a6:21:d4:8f:df:b8:ca:5a:de:ca:1e: 78:b5:7c:01:a0:84:0f:2b:1c:e5:7d:f5:b5:15:d1:74: ee:3b:1d:c9:37:6e:8c:30:1a:b9:99:05:5f:ea:fb:4a: ce:f0:d0:1a:3e:33:b8:58:44:26:0e:68:3c:00:f0:87: 35:be:fb:62:45:a7:f6:2a:6b:94:d1:6e:57:a1:01:56: bc:a8:ce:90:f8:85:f9:33:cd:88:6b:a2:da:b5:b6:2b: 75:28:d9:93:00:ca:88:b9:29:4f:83:9a:45:14:db:fe: 6d:93:a2:64:cc:2e:10:35:7e:2e:8c:02:5f:ce:a7:b0: 2a:53:57:6c:2e:6f:39:16:14:01:49:ab:39:75:aa:71 Fingerprint (SHA-256): 7A:32:23:CF:FC:F9:82:79:70:9A:58:D8:08:45:E3:4B:A2:79:E2:2B:91:6C:63:B8:D9:61:7A:25:3F:6A:B6:4D Fingerprint (SHA1): EC:AD:18:4F:A2:89:60:0D:A9:EF:D6:F0:45:A0:52:0D:9F:D1:58:93 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2851: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194755 (0x433ee2c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Fri Nov 28 11:50:16 2025 Not After : Thu Nov 28 11:50:16 2075 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:00:8b:18:35:15:9d:10:9a:1e:f5:55:88:1a:cf:c7: 03:c3:9f:d6:f1:f3:5b:b7:af:b2:e7:09:d8:43:7d:7a: cc:0e:de:d1:05:1f:3d:a1:d3:0a:ba:6a:a0:8b:6f:c2: 41:64:e8:d1:de:72:ed:20:1f:a3:dc:97:64:9f:17:7d: 05:df:f0:75:14:57:16:3e:19:21:ae:92:6e:a5:41:54: 3b:50:02:fe:76:c4:35:a3:e1:7a:a1:c5:2e:38:c9:eb: db:52:21:94:aa:2f:0a:31:0c:38:91:2a:d6:f9:76:97: dd:c6:0a:97:97:a8:d2:0f:70:68:01:a8:91:41:69:d1: 95:f5:48:00:00:3d:b3:c3:42:73:01:13:05:0a:fb:d0: b8:0f:fa:ad:6f:e9:96:82:40:b7:2f:fa:83:51:a0:7d: 8b:b8:25:8c:7b:99:2a:b5:04:92:d5:a7:36:f9:11:a9: 1c:b5:14:56:53:0c:90:31:0c:ad:bb:0e:17:ef:8b:43: c3:8e:0d:d8:d2:94:c9:7f:42:7e:5c:60:1f:66:3f:36: be:bf:dd:51:28:08:7a:bc:f1:70:e7:41:9c:db:97:fa: 30:9b:41:c5:6c:52:82:40:af:b2:4b:a2:c5:55:98:a4: 7c:bb:f2:61:7a:58:01:cd:a1:fe:c2:75:f8:59:ea:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:07:0d:f3:9d:0a:8f:07:f8:d3:e8:96:45:02:6a:ab: 34:57:b3:d3:0a:80:b4:00:0c:aa:e2:ff:9d:5b:80:1f: a4:bc:8a:20:ad:bd:ad:30:8a:b8:fa:18:cc:c5:22:71: 39:98:55:80:06:d0:ff:f0:b3:36:2b:46:36:ff:c1:f7: 95:ee:b3:98:5d:32:29:18:f6:aa:63:7e:13:8a:e0:d6: 71:93:fb:de:af:9b:44:bf:99:67:e2:67:11:ea:2d:11: b9:e4:c8:f2:4f:ff:06:4b:8f:89:a0:ac:70:d9:40:1b: 34:22:64:7c:09:3a:bb:d1:8e:08:d1:12:fc:00:d9:9f: f9:45:51:c2:6d:b2:73:20:8e:fb:7a:95:06:ba:40:d3: 28:ca:a3:8c:61:fd:27:20:65:dd:95:bb:6d:26:cf:89: 3a:3c:d5:83:0b:3c:8c:e6:07:4d:48:ec:f9:9a:df:5b: 9b:99:34:35:fc:0a:77:bd:43:60:6b:2b:6c:5a:71:79: 07:d8:27:55:8e:cb:ca:a2:ec:91:dd:65:f8:9e:09:ba: 55:ea:c9:0b:be:89:df:65:90:fc:47:20:ee:d8:5d:31: 9b:0f:02:80:e8:e1:2b:e9:7e:3b:72:dd:5a:c3:83:0a: 42:42:31:47:cd:59:c0:a3:e4:1c:fb:53:f3:23:b0:6b Fingerprint (SHA-256): D5:5E:56:10:EC:C3:10:40:91:5F:99:E6:EF:29:41:33:44:4E:54:4C:E3:B4:90:66:74:05:9F:C0:4E:8C:D9:33 Fingerprint (SHA1): 2A:53:63:3D:24:7E:44:55:25:A3:D6:33:CE:A9:D2:E7:18:44:F1:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2852: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194756 (0x433ee2c4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Fri Nov 28 11:50:16 2025 Not After : Thu Nov 28 11:50:16 2075 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:2a:04:fa:6f:4f:e5:76:60:30:02:98:e3:f1:ed:19: 4d:4e:e3:1f:db:84:ec:74:71:2a:3e:51:ff:ce:4b:93: ec:ba:b5:78:a1:2d:18:e7:fa:04:ed:a9:18:f6:f1:7a: d3:2f:5d:81:e4:13:42:6f:7a:3f:b0:34:66:12:6c:c9: 51:f3:bd:56:e4:4f:25:3e:6a:0d:63:87:48:18:56:de: 1a:75:84:86:f9:c1:d5:2c:88:08:06:7c:f2:b2:52:88: 4a:78:8f:a6:28:bc:1b:b1:7c:60:c2:13:5b:1d:be:69: 14:c1:d9:b9:d1:f8:21:83:3d:d3:05:f1:0b:58:7e:74: 38:1b:d8:a8:7f:19:98:91:fc:6f:c7:17:3f:0f:d2:8c: 04:ca:74:ae:a6:f5:17:d1:1b:a4:9c:62:21:ee:c7:03: 83:cd:cd:f8:55:21:6a:74:0f:c8:18:a1:ea:5c:e7:1c: fa:06:ac:6f:bd:13:41:59:28:c6:34:f9:80:7d:9f:3a: 88:ca:f2:0a:1e:36:83:29:b7:44:95:d0:fb:e4:85:73: e2:a0:86:17:11:95:b4:ce:56:de:12:46:01:7a:2b:94: a2:52:50:4a:f8:97:3a:ac:8a:27:af:53:f7:46:19:8b: 0d:58:bb:43:f9:0c:4b:af:d9:4c:25:c7:c9:80:bf:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:18:82:4a:9f:f7:81:e6:47:5b:03:5f:df:85:07:57: b5:f4:44:97:91:30:2c:fb:c0:b8:4c:c3:b3:b7:e7:cc: 02:ed:aa:47:9f:b2:d3:9d:e1:0e:00:48:18:3c:87:35: bc:9f:e5:eb:af:13:c4:ad:e0:21:55:25:23:33:1a:a2: 09:a5:02:0c:3f:c9:0b:89:43:9f:5b:d9:b7:f3:fd:d8: 6c:90:df:ee:9b:a1:9f:67:8b:6c:33:e3:ee:1d:20:df: d7:20:0c:7f:85:b5:6e:60:e1:b9:c5:8e:b5:13:c6:67: 67:ad:60:ed:c4:48:19:a0:ef:75:2c:62:e2:33:50:e1: 37:45:af:d5:2d:15:1a:24:cc:b7:16:c4:9f:36:46:a4: 2f:95:b4:40:88:19:27:f3:f6:c0:75:10:44:85:28:1f: 5f:fd:0f:f0:00:2e:8d:e0:dc:a7:ea:3c:ac:f9:8d:de: 31:45:2c:7d:ff:4b:ff:1a:30:bf:b1:76:78:f8:b3:a5: b4:9c:22:0c:83:10:77:62:ba:38:80:dc:a1:88:1c:18: e4:79:e5:26:b0:e0:0a:39:8e:61:22:ae:57:94:61:3e: ff:89:9f:e5:f5:44:07:c5:2e:ba:1b:9b:d6:44:b4:49: e4:82:ae:62:cf:87:6a:e3:dd:46:29:ec:fd:38:6e:10 Fingerprint (SHA-256): 27:68:FA:4E:36:82:D6:EB:6D:EC:A8:0E:E9:B2:DF:AF:E1:0D:4F:46:FC:E7:01:0F:A0:5A:2A:CE:48:2F:50:7B Fingerprint (SHA1): 5B:A5:1A:E6:44:FD:7A:A9:B3:62:FC:EF:4A:A1:58:EF:67:BF:83:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2853: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194757 (0x433ee2c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Fri Nov 28 11:50:17 2025 Not After : Thu Nov 28 11:50:17 2075 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:51:c7:d3:9a:95:bd:95:90:44:6c:b2:66:96:a5:62: 18:a4:e1:a7:6a:c8:11:f6:44:1c:8a:cc:28:9f:5c:86: 38:5c:9b:d0:9e:26:5d:4f:02:07:96:e8:2b:14:16:bc: 07:a8:5f:12:8c:34:f5:00:33:67:91:70:12:3a:29:47: 5a:a3:ca:42:27:9c:42:d0:1b:df:7a:7b:34:55:df:5d: 84:27:ab:a8:b4:05:af:05:8b:8b:71:05:dc:88:34:90: 8e:87:41:a8:63:07:2c:13:5b:7a:55:37:63:df:84:76: b1:c5:db:52:a9:7c:18:83:9b:28:32:2f:fd:d8:a1:68: 1e:48:94:04:af:75:49:33:01:77:33:bc:e0:cc:d1:e0: e4:b5:7d:94:89:80:49:83:65:74:be:6a:a6:0f:2d:1b: 6e:61:0f:63:07:eb:e9:4f:8c:b7:80:ea:5b:86:78:a2: c3:f9:1d:eb:05:fd:5e:4b:be:e1:4b:db:b7:af:95:ec: 9d:2d:e4:0f:bb:dd:19:ff:9d:f2:92:98:06:85:bc:73: 4b:e1:c0:41:70:c9:50:67:ff:2d:0c:6c:52:ef:27:ec: f0:ea:7b:a4:ad:e2:87:e5:f8:97:a0:03:b5:47:b1:df: 60:7d:22:6b:73:6e:26:89:71:60:6f:df:a4:f0:fe:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:c2:86:bb:03:48:1a:c1:4a:19:ee:55:a4:1c:dc:7f: 72:1b:60:a6:08:85:0e:df:13:c5:39:a0:cd:fc:76:ff: 2f:d5:5e:ed:a9:20:04:e6:2b:62:b0:bf:ef:14:f2:33: 1d:6a:9d:2b:63:5e:34:ad:cb:60:f3:c5:30:ce:21:e4: 8e:c1:96:84:62:a7:62:61:d4:ef:16:69:67:a2:18:e0: bd:0a:27:0d:17:d9:df:35:c5:00:61:8d:9b:a6:29:06: 7f:37:6a:40:18:bd:3f:e9:6f:90:1c:fe:59:de:d1:54: f4:59:b7:a1:7d:86:9d:45:11:b8:3e:6f:7f:a2:c4:14: 4c:ac:95:e5:59:40:1e:74:e6:15:be:53:b4:43:53:a0: c0:a4:d2:70:9e:a3:dc:0a:b7:27:c3:dd:9c:b0:ce:fe: f3:0b:1d:29:65:a4:c5:af:95:82:d3:1b:fe:72:20:a7: 7e:e2:9c:f0:44:fe:c4:7d:71:fe:ad:93:a9:78:78:37: 65:80:66:ca:24:4e:3b:90:d5:0d:ec:4e:d6:ed:eb:12: 08:07:f0:3d:6c:71:5e:f5:d6:2d:e0:dc:1e:e7:77:c4: 8f:af:f1:7b:36:3b:26:6f:d2:32:69:bd:ee:b1:93:57: e8:4f:ea:4f:0a:06:fb:82:c1:89:c0:fb:cb:22:4f:03 Fingerprint (SHA-256): E5:2E:4A:AA:F3:05:C4:65:D7:32:E0:38:E3:13:61:21:1D:AA:93:98:5B:4D:D0:DB:18:62:D6:AC:79:9F:BC:4F Fingerprint (SHA1): 12:F2:A9:37:84:3D:47:41:EF:CC:10:F2:90:F4:79:BC:17:B4:ED:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2854: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194758 (0x433ee2c6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Fri Nov 28 11:50:17 2025 Not After : Thu Nov 28 11:50:17 2075 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:5a:b4:66:ed:e0:4d:88:c1:67:18:0b:8d:ae:b9:1b: a1:35:fb:1f:39:45:11:10:7b:e0:60:79:b7:9a:da:bb: bd:d9:3a:09:73:10:36:b1:9f:00:17:a0:e8:11:e2:f4: f0:97:0c:b0:2e:7a:43:2d:7e:e4:03:2a:b1:6c:6e:08: a9:0f:4f:b8:55:d4:f6:05:0b:78:30:d0:d6:b6:e5:7a: b6:45:92:ed:58:1b:92:c6:54:18:13:90:6f:f9:d2:2c: 9b:80:51:b6:a2:f1:9a:97:2d:76:d7:39:fd:86:fd:78: b8:69:df:57:01:88:19:8e:c4:45:5c:9e:2b:1b:e3:df: 30:eb:c8:04:f5:dd:38:74:3c:84:4a:7f:c2:94:12:eb: 35:3f:a8:6f:88:3a:ef:25:75:89:48:fb:d7:1b:93:ea: 1b:8a:74:fb:81:95:8a:f4:e5:dd:04:df:13:c9:56:0b: 06:50:c9:e3:c5:54:3b:a2:12:03:83:19:ca:16:89:f6: 08:0f:3a:b9:18:93:fe:2a:0c:5e:25:a7:10:9a:de:78: b6:fd:7a:37:ea:a6:08:ef:37:79:30:6e:54:99:c4:ee: 7c:34:5f:fd:d5:4d:7f:6f:f0:17:11:1e:5f:39:63:8f: b4:8e:d9:a6:de:9a:87:97:15:7a:2d:dd:12:a6:9a:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:06:1f:a5:56:a0:8a:ad:91:73:c3:d7:7d:f0:88:97: c4:ca:67:33:f4:73:3c:58:8a:0b:7b:40:b4:28:7e:5e: 5d:ce:ad:a5:95:a6:9c:a8:97:4a:3d:18:96:50:c7:3e: b9:cc:ad:54:91:34:0b:cb:33:70:7c:39:35:52:37:8a: 7e:e4:c0:1b:ef:2a:d9:f4:5d:5c:c7:cc:68:0f:bf:77: 51:7c:62:aa:80:3e:e6:f0:95:70:8d:ff:5b:16:c3:fb: 28:7f:1a:32:23:62:96:50:ea:56:b3:f6:8b:13:fb:33: 71:5f:16:40:85:7c:08:d0:5d:bb:e8:ee:ed:85:08:cf: 08:ff:7a:db:8d:ec:26:61:c2:31:5f:ed:d9:fa:a9:dd: 6e:eb:f3:99:f8:8b:01:f8:35:57:f5:02:e2:c3:f7:a6: 00:15:ba:da:24:ab:ae:61:11:1d:92:01:e8:6b:a4:d0: cf:f3:e0:67:d7:a3:fa:90:88:46:d6:10:80:dc:42:f4: c7:8d:62:2d:fd:36:a5:db:47:df:e3:b9:da:5f:eb:af: 94:4f:69:e5:40:a2:fc:47:29:23:53:48:02:60:ec:e3: ed:35:9b:d6:e8:09:f6:9d:cb:b6:9b:80:ac:d6:a2:14: 64:8b:ea:ec:b1:ad:ac:e5:be:48:62:cf:7b:8e:44:e0 Fingerprint (SHA-256): E7:F3:D4:6C:CB:51:A6:F7:CF:B5:11:DA:CA:7F:40:C5:80:00:98:70:B6:FB:8E:FA:94:DC:D6:3E:A1:EE:B0:94 Fingerprint (SHA1): 24:C6:AC:C6:2B:BA:29:69:EA:73:C4:B3:2D:46:34:81:01:60:A0:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2855: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194759 (0x433ee2c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Fri Nov 28 11:50:18 2025 Not After : Thu Nov 28 11:50:18 2075 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:c3:0a:f0:35:95:cd:6f:20:b7:fb:26:cf:20:60:cc: 46:da:32:42:d2:51:3c:89:a7:69:dc:8a:1f:40:1e:c7: bc:0e:99:bc:53:a4:92:32:9d:b5:78:fb:08:ea:7e:6e: 68:fe:e2:92:2a:2f:f9:fd:fa:e0:8b:d3:49:2d:f8:2b: c8:68:2b:ea:80:0c:8c:5d:52:b6:a9:8b:db:da:f3:28: b2:f6:23:f3:b8:38:95:74:ee:a7:54:1e:57:38:2a:3a: 19:7b:db:9a:1a:10:fe:25:e0:e4:61:b9:4b:8d:a5:5b: b9:c0:60:4c:33:05:6f:b5:d8:9b:0f:ba:bd:7c:4f:8b: 4c:5b:3e:03:47:e2:fa:65:66:76:e1:bb:7a:b6:95:9e: a5:82:b7:da:30:81:77:20:4a:7e:99:96:a4:8c:4a:1e: 6d:de:37:d5:d2:f5:68:c7:21:6e:52:1e:d5:54:16:39: fc:72:8a:6e:af:da:c7:46:ad:04:03:24:62:0e:ee:6c: 57:c2:13:1a:87:c0:48:60:e0:e7:13:15:08:5f:1f:9b: 72:a5:8f:b7:07:50:8e:88:7e:e6:f6:14:f6:63:6d:3e: bd:33:9a:72:30:ac:5f:72:72:9b:0a:0f:73:7f:b1:e6: eb:a8:ab:fc:1b:5b:f2:50:aa:8b:91:0d:5e:30:fa:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:39:36:71:d9:5b:cc:8d:cf:0e:a0:03:c7:45:10:2e: 64:1a:0f:b6:a0:d6:b8:65:79:0f:65:49:ea:29:2d:bc: 5a:d3:41:47:ec:e2:6f:88:39:48:5d:4a:7e:2a:98:f6: 89:81:48:00:d7:7d:3f:59:89:f6:0f:c5:ef:1c:6a:af: 90:a7:b5:38:e7:61:d0:a5:28:74:66:10:70:0f:db:07: d0:c6:09:f2:54:78:15:5a:a5:db:8e:9f:b0:da:34:13: 6b:e3:4c:df:83:82:58:3a:c4:98:2d:31:f5:75:55:e3: e7:6d:73:84:0f:00:8b:c4:8e:34:cf:9c:78:dc:24:6b: 40:99:50:94:4b:c3:f8:8e:cb:f3:da:f1:c1:e4:a6:8e: cd:f1:e8:d2:b2:b8:5c:ad:2c:83:b7:72:c9:66:f0:b2: c7:fd:71:8e:7d:09:b5:3c:3d:67:d0:57:b4:84:14:9a: ad:c1:04:b8:8c:d6:15:b0:7e:48:94:f2:64:4c:dc:13: ac:b8:6d:d6:1e:5c:cf:a4:ef:2e:14:12:6e:d1:26:36: 8c:c8:8d:f1:4f:6a:21:3e:35:83:45:45:8f:ba:fc:ea: 57:8d:2f:bb:dc:53:38:4a:34:b4:cd:d1:8e:d9:c3:bf: ee:5b:e8:74:f9:1f:91:8b:7b:c1:e4:bc:0e:65:f3:c0 Fingerprint (SHA-256): FD:7B:50:84:D3:D5:C0:C9:0E:59:5C:EC:40:05:F1:7A:D6:79:6B:F5:C0:16:85:99:FD:4D:10:93:73:F2:9F:E3 Fingerprint (SHA1): 1A:AA:84:61:10:28:27:D2:93:91:B5:56:67:EC:82:34:01:1B:A3:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2856: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194760 (0x433ee2c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Fri Nov 28 11:50:18 2025 Not After : Thu Nov 28 11:50:18 2075 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:db:1e:cb:3b:66:04:c3:ed:b7:61:91:f2:d4:a0:93: 9e:6f:36:df:3e:56:01:3a:43:4d:6c:9c:f8:bc:71:7c: 52:b1:0c:49:b2:c0:71:83:26:a3:12:16:54:3d:67:f5: d7:4f:f7:86:39:a3:c3:b6:47:bf:b6:07:8f:46:b9:79: a0:1d:9b:e5:3c:58:65:46:73:03:5b:db:ba:1a:a1:c8: 90:ad:29:f5:42:24:00:c3:4b:1c:a7:f2:24:07:2d:a4: cd:44:6d:73:48:d0:3f:37:c2:85:4a:ad:39:54:0e:a2: 6a:53:ed:bb:1b:b4:62:1d:4a:22:1a:c9:0c:2b:12:a6: 62:86:40:ec:e1:95:4c:ae:a1:ea:b1:ca:1d:cd:2b:41: df:7a:e2:9c:05:0b:9e:d2:15:e7:81:9a:8c:ef:da:09: f5:e9:92:72:50:51:2c:19:59:13:c6:88:3c:d4:47:fc: 87:6c:9d:5c:5b:7f:4a:5a:9a:dd:d7:ba:66:dc:33:9b: 97:b7:d5:ad:45:ac:c6:af:4c:91:e7:7b:23:ba:3e:9a: c4:f7:9f:b3:dc:e6:3e:34:0b:96:fb:4b:76:a2:9d:4b: 8f:07:91:d8:0b:0b:8a:1e:58:27:f9:bd:50:25:74:e6: 21:4e:81:0c:09:44:04:cd:7c:27:5e:3e:ec:1b:9d:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:1f:2e:6f:fc:86:09:c2:20:31:2f:ec:74:37:37:90: ea:8d:8b:58:a7:5c:42:cd:ac:da:ce:7e:a5:92:2f:79: 54:da:7b:bf:27:ed:aa:90:06:7a:4d:02:07:2d:0d:8e: ce:10:78:de:0b:b9:b6:19:5b:92:8c:ca:0f:7b:07:b5: 5f:f5:78:cd:4e:96:59:20:c1:c3:2e:0f:63:54:65:c1: 1c:a7:23:b0:c4:89:07:8d:bf:bf:32:45:a8:50:60:68: de:ec:15:b3:c7:72:2d:8f:d6:77:bd:5c:0c:34:ce:88: 1c:59:76:a6:25:9f:f2:84:b7:ee:36:8e:c7:d9:1c:c5: a0:58:82:71:3e:53:51:7f:53:31:97:b0:38:69:c9:a4: fb:c2:82:ea:d4:63:fd:b1:dd:97:d4:89:24:6f:3f:0c: e7:69:f9:74:d3:46:26:d1:c7:d8:82:e6:ab:fc:b1:03: 10:be:ee:ec:6a:c9:f4:36:e5:8c:98:1e:08:c8:7e:54: 71:16:28:64:24:34:f6:53:7c:97:fb:f6:98:ab:e5:0d: 50:c2:ef:c7:b9:9d:6c:8f:4e:42:5b:94:9c:49:4d:af: 05:87:40:9f:c9:d0:00:4b:91:21:e5:50:90:fa:b8:2b: 7f:ec:fb:27:f1:bb:03:b4:c2:07:b2:de:35:0a:80:4b Fingerprint (SHA-256): 2E:1D:18:D1:10:0B:38:68:85:95:43:35:15:CA:F9:47:18:D7:B0:1B:6C:ED:00:66:B8:AC:9B:CB:AC:24:42:FD Fingerprint (SHA1): 1B:6E:6B:CD:16:C0:29:8B:5A:7B:B4:60:17:7E:79:C3:26:6E:75:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2857: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194761 (0x433ee2c9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Fri Nov 28 11:50:19 2025 Not After : Thu Nov 28 11:50:19 2075 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:64:2c:a1:21:b5:dc:3c:58:9d:49:2f:7c:43:cf:3e: c3:19:50:46:71:4a:4a:e5:59:5d:33:d0:3c:d7:62:22: 75:73:bc:79:7b:6b:e0:de:cc:66:2a:60:3f:5b:e1:a0: d4:4b:75:54:0b:9f:b3:db:9c:13:6b:f4:39:74:1f:2b: d8:ee:d6:62:89:29:5b:49:a3:6d:5d:0d:59:15:c0:5d: 8a:b5:ec:e9:ba:54:fa:d5:65:a0:59:3f:69:8b:3c:51: 53:7b:f0:46:97:59:d7:4e:a6:90:8e:c3:52:0e:05:cb: 3d:28:2d:e2:50:16:da:40:31:fd:f1:79:55:13:27:44: 4b:5b:61:89:14:76:67:88:b6:44:15:87:85:66:2b:d7: 84:e2:b8:52:52:ce:75:8f:82:6f:d3:0f:49:b1:9e:40: e3:5a:64:e4:49:6a:c8:3c:43:28:c0:1a:95:39:ad:8c: 72:68:65:23:59:70:14:1e:70:db:88:be:52:f2:49:47: e2:8b:65:6c:43:d5:7c:dc:a6:76:5c:71:cf:85:ba:96: 04:34:b3:c0:fd:e7:65:48:ab:31:82:70:f1:c1:0c:99: 84:c1:1b:d7:88:3d:e3:7a:6f:f0:b5:53:81:9f:56:7a: 58:0f:3e:53:ca:7f:d0:a2:55:b4:82:2a:46:d5:00:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:8d:e7:c7:2b:2c:64:ae:16:85:d3:88:13:23:33:28: a3:ba:3b:0a:96:24:01:a1:a3:d4:11:be:17:5e:68:83: a3:79:f3:01:1d:65:70:82:77:06:da:19:af:48:cb:77: 88:c3:f4:9a:e3:c8:e2:68:d6:b4:94:da:ef:46:1c:14: 59:8f:43:b6:87:54:7f:24:4b:4b:72:ec:e1:90:4b:60: 0b:a5:04:b8:a6:cb:56:c7:78:9a:bb:fa:90:96:38:4f: 5b:b8:7f:f2:c2:6e:13:46:bd:35:f9:6b:c3:aa:23:50: 16:ef:22:b1:48:a3:e8:3e:3a:22:72:88:b2:6c:67:ab: 0e:61:71:83:af:5f:e5:9a:13:6a:29:4e:e7:81:42:ff: 3f:02:39:f0:02:08:47:45:86:fc:1f:6a:98:e4:f8:81: 40:a5:65:43:a7:74:56:be:c3:c6:51:38:3e:81:86:91: aa:f2:74:85:1c:0d:f8:0b:b6:7b:4c:cd:a8:22:f9:de: de:bd:93:42:5e:86:83:43:06:e0:cc:e0:d1:cf:fb:96: e7:37:47:1b:73:d2:7d:83:31:13:5e:36:65:98:6b:32: 87:c0:b1:b1:80:72:ff:3b:be:c2:3b:f9:d8:ff:48:10: db:03:4c:92:2c:6c:08:d1:c4:36:6e:6f:f1:1f:62:c0 Fingerprint (SHA-256): 83:38:82:ED:AF:71:CA:C7:F4:E9:41:39:50:65:2E:D8:21:AD:F7:55:50:D3:B0:C4:DC:2F:B8:0E:BF:B5:C8:29 Fingerprint (SHA1): F0:2A:4C:53:56:A0:E3:52:9F:8B:FA:57:1D:7D:65:F8:F7:D0:23:3B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2858: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194762 (0x433ee2ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Fri Nov 28 11:50:20 2025 Not After : Thu Nov 28 11:50:20 2075 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:d3:e0:86:8f:9f:ae:f9:96:1e:4a:d9:58:5b:03:23: ff:d0:6b:6c:5b:1d:fa:cd:5a:fd:87:d3:6e:c4:e3:7b: e7:5f:94:8b:f2:44:8a:69:20:8f:42:e0:15:c2:49:f0: 6d:3d:41:c2:b9:86:82:d5:3a:2d:db:80:e6:1f:c3:a0: e0:0f:e8:91:dd:69:f4:87:d5:f1:d0:fc:f8:4a:1c:13: 53:0a:b8:c9:c9:5e:01:de:07:72:bd:1d:cb:f8:97:0b: 65:e5:da:27:fa:f1:9d:52:1a:ef:4e:3e:33:fd:67:11: a1:cc:24:49:f4:0b:b6:3e:65:50:4d:6a:4e:42:52:77: b0:d2:1a:3c:5e:dc:18:0d:01:ec:89:36:34:4f:42:20: 69:9a:a3:5a:19:c8:38:96:c4:aa:53:6c:ca:b6:ed:a2: 75:cd:6f:17:07:1c:72:a3:c4:92:aa:68:86:09:92:f3: 6d:fb:39:e6:7c:87:ed:ef:1d:d3:a2:ad:e0:90:67:61: ae:ba:ca:a9:a3:ac:69:42:a2:8b:e8:89:0e:52:47:f7: 41:d5:46:74:9f:c2:6d:28:42:ac:31:c0:cc:f7:aa:9c: 10:de:f8:c0:05:3c:10:97:c2:2a:bb:1c:51:16:6d:8b: 2a:42:30:63:c9:aa:42:08:1a:de:3c:30:c2:7a:77:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:95:aa:eb:83:89:8d:3d:85:05:29:8c:31:45:5d:e3: b6:17:bc:27:62:13:75:69:68:12:a4:93:89:d3:9e:2c: a9:16:9f:af:2c:b7:3c:49:8d:18:ef:67:5c:ba:e6:20: 83:70:6b:ab:19:60:e6:f7:5f:90:7f:48:e9:c1:e1:59: 60:7c:b4:ac:2e:16:e8:3c:93:aa:c2:61:79:06:43:31: 76:4b:66:ce:f5:ae:d5:99:12:38:87:20:d5:68:db:d2: ad:8b:79:33:30:3a:e9:f8:0e:e5:97:5a:fc:95:1f:82: 59:98:5c:3d:bc:da:55:ec:11:be:c4:5c:37:ea:6e:e6: 87:fa:b4:77:61:57:e4:f4:75:07:df:6a:0e:46:4f:2d: 84:a0:20:35:08:ba:5d:9d:58:82:f5:2b:21:4a:07:7c: a1:29:9a:65:b1:33:3b:39:0a:58:31:4a:3a:84:a2:c4: 8a:46:0b:47:10:a5:99:ce:4d:1e:c1:3f:93:4b:f5:b4: c4:44:5e:ac:ef:89:c8:58:99:0a:92:19:df:aa:64:2a: 68:b6:ae:b5:c9:4d:46:ac:83:20:cc:08:bc:55:0a:49: f4:7d:82:8b:f8:cd:30:3c:08:5e:59:11:a7:dd:85:d8: ff:a9:46:b3:c8:16:0d:23:80:31:2f:fa:bc:75:61:57 Fingerprint (SHA-256): 4E:25:B0:B1:A3:30:49:7B:8A:AB:99:87:9E:85:A4:F5:12:19:0D:D1:CD:55:1C:A3:0E:47:41:87:C6:6B:65:62 Fingerprint (SHA1): E3:96:9F:23:2F:D6:89:14:DA:F9:6D:67:6B:55:16:59:F6:F3:A4:5B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2859: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2860: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194777 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2861: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2862: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2863: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2864: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194778 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2865: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2866: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2867: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2868: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194779 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2869: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2870: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2871: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2872: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194780 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2873: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2874: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2875: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194777 (0x433ee2d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:28 2025 Not After : Thu Nov 28 11:50:28 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8d:56:29:09:05:68:d9:26:d7:05:09:61:8d:0b:44: 0c:a1:2c:ad:3d:ea:60:80:b1:a4:21:7e:c3:9f:eb:db: 91:d3:4b:41:07:f9:aa:6a:36:42:32:19:52:d0:b0:4f: 19:54:11:f1:84:29:16:48:40:bb:63:ae:85:90:be:0b: e1:19:4b:42:44:a4:cd:35:f1:4a:54:48:9f:c8:f0:2b: ab:ee:f2:3f:5b:6b:51:91:a3:7f:ac:0e:c9:d3:27:80: 9a:99:a6:92:1f:99:26:57:d6:7a:d9:db:fb:39:ad:4b: 5a:ce:d4:81:32:1b:db:71:bb:89:19:b0:5c:00:58:07: f9:a7:9c:8a:c4:dc:74:40:12:a9:4c:42:28:3a:80:37: 79:a3:48:8c:60:f0:6d:e8:03:a0:6d:4d:2d:39:3f:ea: 69:e3:0d:7b:e9:3d:72:d8:d1:24:67:2a:64:13:a3:bb: 1f:99:fc:cd:2b:1e:ff:06:9a:11:9c:c7:f5:8f:bc:ac: 10:89:87:f2:d1:07:a4:5b:7f:5a:db:39:5a:69:c6:b4: f6:b6:75:d8:f6:b0:cc:e2:7e:9a:11:6a:62:3c:04:2a: 08:79:e6:e7:6f:7a:a8:d5:06:f2:d4:6b:4c:bf:20:64: 9c:b1:e2:25:cc:55:d4:5e:3d:e3:ff:fb:e4:e2:be:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:47:df:ec:42:ca:bf:4f:98:79:69:f4:b8:5f:0c:e8: 0e:b0:b6:8d:04:e4:12:3f:19:90:68:d1:f5:b3:0b:97: e1:a0:92:f2:42:09:92:b9:a0:53:51:ec:53:56:9f:d4: fb:c6:85:c4:fe:02:40:96:8b:28:bd:86:22:6f:43:9f: 88:a6:d7:27:d2:1f:2a:05:57:87:12:f4:38:c1:a9:b8: 0a:5e:d8:34:32:ee:7f:9f:3f:25:46:7f:c9:9c:c5:9c: 04:f1:e7:a1:44:65:85:79:2c:38:42:78:06:f9:c4:34: aa:7b:66:f8:b9:fd:da:ce:7f:6f:c1:fe:b4:10:9e:e2: 10:f7:78:f8:d8:1d:3c:38:3f:81:4d:2d:58:d2:99:fa: 60:a3:c1:29:bf:0d:74:e1:9d:d6:a0:30:76:1f:a7:27: 6e:c1:92:9d:ae:a8:f5:bd:bc:06:36:af:af:76:75:71: 82:8a:3f:b7:4d:80:6f:7f:7b:ef:94:0f:cf:56:b3:cb: 92:14:a6:1a:16:53:e8:d7:19:a4:b7:80:c5:40:7f:e3: 17:1c:50:db:43:f2:cc:4b:ca:77:0a:6e:04:6e:b1:9b: 3e:d0:4b:4d:a6:d9:a9:87:9d:68:f0:73:30:18:e5:01: ff:4b:d1:36:8a:8d:bb:38:8c:76:61:c7:26:d3:1b:46 Fingerprint (SHA-256): 07:38:A7:95:7C:CC:7B:30:1A:3A:1B:D6:6A:CB:7B:76:5F:9C:93:2A:57:1F:0B:40:95:3C:C9:C5:88:4E:2A:75 Fingerprint (SHA1): B5:D3:13:20:4B:8F:3C:85:86:13:43:32:89:D2:E6:34:4B:F9:09:74 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2876: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2877: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194778 (0x433ee2da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:29 2025 Not After : Thu Nov 28 11:50:29 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:78:21:4e:3b:9a:e4:6b:f2:03:9c:b9:cd:94:07:60: f9:a9:11:93:78:93:ac:57:b3:73:71:69:5c:84:1c:48: 71:5a:9e:f5:3a:49:85:ca:58:41:d5:ef:38:da:5c:48: c5:a1:72:2e:86:1e:3b:54:13:b4:cf:ab:61:fd:e8:f2: d2:83:5b:6c:20:47:d2:f9:fc:6b:38:57:e0:3c:e8:6e: 98:5e:6a:1b:8e:09:2d:33:59:2f:5c:5f:48:ff:4e:1a: fc:69:d6:90:ba:bd:83:af:c4:59:72:48:99:89:cf:ca: 61:5d:80:67:a8:2f:6c:9a:8b:2a:5c:2c:ee:cf:33:03: bb:b9:59:ba:e9:8a:48:e2:19:ca:39:e4:73:02:a4:24: 84:4a:26:77:25:83:4f:a6:b0:a3:ff:8e:40:5d:ec:82: 43:ee:22:f4:77:28:03:c0:65:b7:d1:85:6e:7b:53:fd: ca:af:97:4c:16:ed:91:42:56:1d:f9:6f:76:3f:a0:34: e7:38:42:f9:7b:0c:33:0a:a4:13:20:19:ba:bb:5a:02: 51:13:7a:bc:2a:a4:0a:e7:07:55:a2:ea:c8:9d:81:fc: b7:fc:ff:bb:e7:21:97:3b:b6:6a:0c:ad:73:07:22:d7: 8e:85:ca:e1:e1:d0:91:c4:85:30:91:0e:f9:2c:07:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:83:72:ee:ba:01:75:ab:aa:12:b7:36:be:cb:d0:a6: ba:ad:7f:2e:90:6a:12:4d:ed:40:56:97:30:6f:ba:f7: 35:af:c4:b9:8f:9e:70:39:5e:ad:cc:65:a9:8d:7e:ca: 6f:49:79:20:3c:64:f9:dd:27:4e:51:27:ec:50:9c:78: 0e:46:55:92:b2:89:5a:99:7b:67:56:bf:bf:e3:49:ed: 90:34:ea:c2:da:c7:c4:6a:1c:bf:dc:ef:31:45:7b:74: b0:60:63:5f:c0:09:ab:a8:95:fd:f5:d5:27:f0:46:f7: 0b:91:ed:39:fe:a5:a4:d4:b0:a7:28:d5:d4:21:39:cc: b1:fa:a0:69:b3:72:c0:7e:1c:9f:3e:20:53:e3:2a:05: c1:4e:6b:5c:13:81:b0:bf:61:4b:33:c7:21:e6:a3:ca: 53:c4:7f:72:bd:c2:d1:75:62:63:a6:56:75:dc:1c:d7: a9:4e:9c:4f:44:b9:6b:14:4f:8a:45:59:89:9e:6f:90: 50:91:d9:9d:91:30:00:3b:a3:e4:08:07:47:ad:65:9f: b0:2e:c3:be:29:35:9c:89:32:15:00:f7:68:40:ff:b8: 91:72:d1:0e:e8:02:a0:99:35:0f:83:37:75:c5:dc:af: 20:80:bf:e5:c9:dd:fa:11:05:0b:16:49:91:99:a9:6f Fingerprint (SHA-256): 4A:EA:0B:9A:E5:24:3F:A1:17:29:80:2F:A8:57:65:DF:44:6F:13:C9:13:BC:90:5E:90:4B:7B:CF:86:3E:10:C7 Fingerprint (SHA1): 7A:45:49:7A:97:7E:19:7C:AA:92:04:D1:EC:2F:64:4F:71:A5:87:AA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2878: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2879: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194779 (0x433ee2db) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:29 2025 Not After : Thu Nov 28 11:50:29 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:66:1e:5e:90:76:63:dd:1e:a3:8a:c0:68:9c:41:15: be:51:6c:b9:c8:2b:09:1d:83:5e:58:26:a9:5d:15:4a: 70:50:84:c0:90:47:83:39:00:f0:bc:da:18:91:5e:cc: 94:54:ee:e1:07:18:59:68:10:30:02:d7:da:a0:78:cb: 15:fc:83:93:60:da:e8:b4:e4:90:4e:f9:9e:88:de:e4: b5:14:87:70:20:22:60:38:a0:b6:a6:33:47:7e:d1:ae: f2:c5:f9:e2:50:36:5f:f7:a5:c6:09:68:26:36:0c:f9: af:bf:d3:7f:2e:65:5a:27:06:61:59:89:bf:09:80:1e: 7b:8f:84:36:5e:41:49:f6:88:67:a3:42:cb:7e:1d:97: dd:2e:b5:fc:87:34:66:3d:15:0d:04:64:26:ad:f9:a5: 0b:8f:2c:b8:d5:34:1e:6a:2d:8a:c2:06:91:10:ec:0d: 79:9d:9c:a8:96:6a:ec:6a:fc:e3:8c:1c:60:10:aa:53: 71:09:5a:9d:9e:d2:4b:01:19:de:d1:09:f3:db:4c:7b: 4c:5b:50:c4:70:91:b6:00:af:26:5a:1c:e3:a8:80:e5: f6:b0:01:09:5d:e1:63:a8:15:f8:e2:9f:a5:97:20:4b: 83:c7:8a:c2:9e:44:aa:ed:7b:f7:eb:2a:aa:e1:da:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:68:a9:c5:1d:35:25:a7:01:3e:e2:52:dd:ca:04:07: 50:31:ce:2f:e5:cc:ab:ad:6f:d8:76:16:2c:47:ca:9a: 48:75:2b:c7:6a:69:ae:8e:05:b0:06:a1:4e:70:60:84: 63:2f:a7:e6:93:22:44:91:dc:d3:91:30:77:53:fd:47: d1:7b:85:c5:26:bf:fc:01:fa:09:ca:b0:7f:f1:a5:55: 64:b2:2d:28:ae:40:7a:d4:3f:3b:40:34:26:04:dd:56: 15:63:61:1f:30:23:7e:73:ce:e2:cc:0e:df:f1:3e:0a: 58:37:25:43:11:18:12:0a:c1:a2:bf:17:ec:a7:e2:c2: aa:ad:54:aa:ba:0e:d6:4f:c0:eb:ed:ca:6c:d6:b1:5c: 6b:37:85:4e:6e:43:29:4a:cb:22:dc:95:eb:76:75:5f: 74:9a:c1:c8:74:af:1e:f3:4d:d6:ca:c3:c3:f0:82:b8: 36:f6:fe:0a:dc:f9:90:73:4e:3e:3e:ed:d2:8f:4e:f8: 06:e3:df:77:28:7e:7f:a3:b9:bd:92:e0:7d:c7:6f:21: 1e:ac:ea:2a:37:af:ac:00:c3:77:56:b3:d2:fe:c1:2b: cb:a6:41:33:ec:15:a1:8b:e0:9b:fa:c0:93:14:0b:68: 2a:9c:c1:11:d5:91:25:c5:a8:d5:a4:be:5c:1d:7a:38 Fingerprint (SHA-256): C2:0F:E9:64:E5:1C:9D:D0:E5:6B:FC:9B:B7:64:84:EC:46:5B:90:AA:86:B6:DD:F5:CC:64:05:D5:28:64:E1:19 Fingerprint (SHA1): 22:D0:06:03:13:03:17:37:BB:52:BC:41:22:B0:CE:36:6E:21:20:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2880: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2881: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2882: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2883: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2884: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194777 (0x433ee2d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:28 2025 Not After : Thu Nov 28 11:50:28 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8d:56:29:09:05:68:d9:26:d7:05:09:61:8d:0b:44: 0c:a1:2c:ad:3d:ea:60:80:b1:a4:21:7e:c3:9f:eb:db: 91:d3:4b:41:07:f9:aa:6a:36:42:32:19:52:d0:b0:4f: 19:54:11:f1:84:29:16:48:40:bb:63:ae:85:90:be:0b: e1:19:4b:42:44:a4:cd:35:f1:4a:54:48:9f:c8:f0:2b: ab:ee:f2:3f:5b:6b:51:91:a3:7f:ac:0e:c9:d3:27:80: 9a:99:a6:92:1f:99:26:57:d6:7a:d9:db:fb:39:ad:4b: 5a:ce:d4:81:32:1b:db:71:bb:89:19:b0:5c:00:58:07: f9:a7:9c:8a:c4:dc:74:40:12:a9:4c:42:28:3a:80:37: 79:a3:48:8c:60:f0:6d:e8:03:a0:6d:4d:2d:39:3f:ea: 69:e3:0d:7b:e9:3d:72:d8:d1:24:67:2a:64:13:a3:bb: 1f:99:fc:cd:2b:1e:ff:06:9a:11:9c:c7:f5:8f:bc:ac: 10:89:87:f2:d1:07:a4:5b:7f:5a:db:39:5a:69:c6:b4: f6:b6:75:d8:f6:b0:cc:e2:7e:9a:11:6a:62:3c:04:2a: 08:79:e6:e7:6f:7a:a8:d5:06:f2:d4:6b:4c:bf:20:64: 9c:b1:e2:25:cc:55:d4:5e:3d:e3:ff:fb:e4:e2:be:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:47:df:ec:42:ca:bf:4f:98:79:69:f4:b8:5f:0c:e8: 0e:b0:b6:8d:04:e4:12:3f:19:90:68:d1:f5:b3:0b:97: e1:a0:92:f2:42:09:92:b9:a0:53:51:ec:53:56:9f:d4: fb:c6:85:c4:fe:02:40:96:8b:28:bd:86:22:6f:43:9f: 88:a6:d7:27:d2:1f:2a:05:57:87:12:f4:38:c1:a9:b8: 0a:5e:d8:34:32:ee:7f:9f:3f:25:46:7f:c9:9c:c5:9c: 04:f1:e7:a1:44:65:85:79:2c:38:42:78:06:f9:c4:34: aa:7b:66:f8:b9:fd:da:ce:7f:6f:c1:fe:b4:10:9e:e2: 10:f7:78:f8:d8:1d:3c:38:3f:81:4d:2d:58:d2:99:fa: 60:a3:c1:29:bf:0d:74:e1:9d:d6:a0:30:76:1f:a7:27: 6e:c1:92:9d:ae:a8:f5:bd:bc:06:36:af:af:76:75:71: 82:8a:3f:b7:4d:80:6f:7f:7b:ef:94:0f:cf:56:b3:cb: 92:14:a6:1a:16:53:e8:d7:19:a4:b7:80:c5:40:7f:e3: 17:1c:50:db:43:f2:cc:4b:ca:77:0a:6e:04:6e:b1:9b: 3e:d0:4b:4d:a6:d9:a9:87:9d:68:f0:73:30:18:e5:01: ff:4b:d1:36:8a:8d:bb:38:8c:76:61:c7:26:d3:1b:46 Fingerprint (SHA-256): 07:38:A7:95:7C:CC:7B:30:1A:3A:1B:D6:6A:CB:7B:76:5F:9C:93:2A:57:1F:0B:40:95:3C:C9:C5:88:4E:2A:75 Fingerprint (SHA1): B5:D3:13:20:4B:8F:3C:85:86:13:43:32:89:D2:E6:34:4B:F9:09:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2885: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2886: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194778 (0x433ee2da) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:29 2025 Not After : Thu Nov 28 11:50:29 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:78:21:4e:3b:9a:e4:6b:f2:03:9c:b9:cd:94:07:60: f9:a9:11:93:78:93:ac:57:b3:73:71:69:5c:84:1c:48: 71:5a:9e:f5:3a:49:85:ca:58:41:d5:ef:38:da:5c:48: c5:a1:72:2e:86:1e:3b:54:13:b4:cf:ab:61:fd:e8:f2: d2:83:5b:6c:20:47:d2:f9:fc:6b:38:57:e0:3c:e8:6e: 98:5e:6a:1b:8e:09:2d:33:59:2f:5c:5f:48:ff:4e:1a: fc:69:d6:90:ba:bd:83:af:c4:59:72:48:99:89:cf:ca: 61:5d:80:67:a8:2f:6c:9a:8b:2a:5c:2c:ee:cf:33:03: bb:b9:59:ba:e9:8a:48:e2:19:ca:39:e4:73:02:a4:24: 84:4a:26:77:25:83:4f:a6:b0:a3:ff:8e:40:5d:ec:82: 43:ee:22:f4:77:28:03:c0:65:b7:d1:85:6e:7b:53:fd: ca:af:97:4c:16:ed:91:42:56:1d:f9:6f:76:3f:a0:34: e7:38:42:f9:7b:0c:33:0a:a4:13:20:19:ba:bb:5a:02: 51:13:7a:bc:2a:a4:0a:e7:07:55:a2:ea:c8:9d:81:fc: b7:fc:ff:bb:e7:21:97:3b:b6:6a:0c:ad:73:07:22:d7: 8e:85:ca:e1:e1:d0:91:c4:85:30:91:0e:f9:2c:07:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:83:72:ee:ba:01:75:ab:aa:12:b7:36:be:cb:d0:a6: ba:ad:7f:2e:90:6a:12:4d:ed:40:56:97:30:6f:ba:f7: 35:af:c4:b9:8f:9e:70:39:5e:ad:cc:65:a9:8d:7e:ca: 6f:49:79:20:3c:64:f9:dd:27:4e:51:27:ec:50:9c:78: 0e:46:55:92:b2:89:5a:99:7b:67:56:bf:bf:e3:49:ed: 90:34:ea:c2:da:c7:c4:6a:1c:bf:dc:ef:31:45:7b:74: b0:60:63:5f:c0:09:ab:a8:95:fd:f5:d5:27:f0:46:f7: 0b:91:ed:39:fe:a5:a4:d4:b0:a7:28:d5:d4:21:39:cc: b1:fa:a0:69:b3:72:c0:7e:1c:9f:3e:20:53:e3:2a:05: c1:4e:6b:5c:13:81:b0:bf:61:4b:33:c7:21:e6:a3:ca: 53:c4:7f:72:bd:c2:d1:75:62:63:a6:56:75:dc:1c:d7: a9:4e:9c:4f:44:b9:6b:14:4f:8a:45:59:89:9e:6f:90: 50:91:d9:9d:91:30:00:3b:a3:e4:08:07:47:ad:65:9f: b0:2e:c3:be:29:35:9c:89:32:15:00:f7:68:40:ff:b8: 91:72:d1:0e:e8:02:a0:99:35:0f:83:37:75:c5:dc:af: 20:80:bf:e5:c9:dd:fa:11:05:0b:16:49:91:99:a9:6f Fingerprint (SHA-256): 4A:EA:0B:9A:E5:24:3F:A1:17:29:80:2F:A8:57:65:DF:44:6F:13:C9:13:BC:90:5E:90:4B:7B:CF:86:3E:10:C7 Fingerprint (SHA1): 7A:45:49:7A:97:7E:19:7C:AA:92:04:D1:EC:2F:64:4F:71:A5:87:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2887: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2888: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194779 (0x433ee2db) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:29 2025 Not After : Thu Nov 28 11:50:29 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:66:1e:5e:90:76:63:dd:1e:a3:8a:c0:68:9c:41:15: be:51:6c:b9:c8:2b:09:1d:83:5e:58:26:a9:5d:15:4a: 70:50:84:c0:90:47:83:39:00:f0:bc:da:18:91:5e:cc: 94:54:ee:e1:07:18:59:68:10:30:02:d7:da:a0:78:cb: 15:fc:83:93:60:da:e8:b4:e4:90:4e:f9:9e:88:de:e4: b5:14:87:70:20:22:60:38:a0:b6:a6:33:47:7e:d1:ae: f2:c5:f9:e2:50:36:5f:f7:a5:c6:09:68:26:36:0c:f9: af:bf:d3:7f:2e:65:5a:27:06:61:59:89:bf:09:80:1e: 7b:8f:84:36:5e:41:49:f6:88:67:a3:42:cb:7e:1d:97: dd:2e:b5:fc:87:34:66:3d:15:0d:04:64:26:ad:f9:a5: 0b:8f:2c:b8:d5:34:1e:6a:2d:8a:c2:06:91:10:ec:0d: 79:9d:9c:a8:96:6a:ec:6a:fc:e3:8c:1c:60:10:aa:53: 71:09:5a:9d:9e:d2:4b:01:19:de:d1:09:f3:db:4c:7b: 4c:5b:50:c4:70:91:b6:00:af:26:5a:1c:e3:a8:80:e5: f6:b0:01:09:5d:e1:63:a8:15:f8:e2:9f:a5:97:20:4b: 83:c7:8a:c2:9e:44:aa:ed:7b:f7:eb:2a:aa:e1:da:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:68:a9:c5:1d:35:25:a7:01:3e:e2:52:dd:ca:04:07: 50:31:ce:2f:e5:cc:ab:ad:6f:d8:76:16:2c:47:ca:9a: 48:75:2b:c7:6a:69:ae:8e:05:b0:06:a1:4e:70:60:84: 63:2f:a7:e6:93:22:44:91:dc:d3:91:30:77:53:fd:47: d1:7b:85:c5:26:bf:fc:01:fa:09:ca:b0:7f:f1:a5:55: 64:b2:2d:28:ae:40:7a:d4:3f:3b:40:34:26:04:dd:56: 15:63:61:1f:30:23:7e:73:ce:e2:cc:0e:df:f1:3e:0a: 58:37:25:43:11:18:12:0a:c1:a2:bf:17:ec:a7:e2:c2: aa:ad:54:aa:ba:0e:d6:4f:c0:eb:ed:ca:6c:d6:b1:5c: 6b:37:85:4e:6e:43:29:4a:cb:22:dc:95:eb:76:75:5f: 74:9a:c1:c8:74:af:1e:f3:4d:d6:ca:c3:c3:f0:82:b8: 36:f6:fe:0a:dc:f9:90:73:4e:3e:3e:ed:d2:8f:4e:f8: 06:e3:df:77:28:7e:7f:a3:b9:bd:92:e0:7d:c7:6f:21: 1e:ac:ea:2a:37:af:ac:00:c3:77:56:b3:d2:fe:c1:2b: cb:a6:41:33:ec:15:a1:8b:e0:9b:fa:c0:93:14:0b:68: 2a:9c:c1:11:d5:91:25:c5:a8:d5:a4:be:5c:1d:7a:38 Fingerprint (SHA-256): C2:0F:E9:64:E5:1C:9D:D0:E5:6B:FC:9B:B7:64:84:EC:46:5B:90:AA:86:B6:DD:F5:CC:64:05:D5:28:64:E1:19 Fingerprint (SHA1): 22:D0:06:03:13:03:17:37:BB:52:BC:41:22:B0:CE:36:6E:21:20:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2889: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2890: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2891: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194781 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2892: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2893: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2894: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2895: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194782 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2896: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2897: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2898: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2899: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194783 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2900: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2901: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2902: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2903: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194784 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2904: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2905: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2906: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2907: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194785 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2908: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2909: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2910: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194781 (0x433ee2dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:32 2025 Not After : Thu Nov 28 11:50:32 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:02:34:c5:ef:3f:5f:b2:31:bb:e1:d9:f1:28:25:b3: 2b:ac:61:94:33:a7:d3:3d:ac:c0:f8:c7:5a:bc:05:65: 2b:e7:0c:17:66:6e:91:a1:81:ea:d3:ee:ca:50:78:a1: f4:37:67:9f:e3:8d:8a:3f:7a:99:bc:6c:43:2a:2d:56: c4:a9:a7:aa:eb:8f:78:e8:1a:08:47:22:fd:e8:02:26: f3:86:1d:79:b9:f4:d8:56:26:9c:82:4b:d3:fa:58:0d: 47:9d:2c:4d:df:ff:ac:3a:8c:ee:2d:97:18:8c:b3:7f: fb:42:a8:90:fc:56:5d:7e:f7:bb:f7:08:59:cf:b6:65: 1d:ea:c0:04:eb:3b:e5:0a:5e:9c:b5:74:e3:99:78:d9: 33:8c:83:b2:16:18:77:6c:53:64:c9:c8:e6:62:c2:55: ec:ea:13:f4:79:fc:ef:06:da:de:3c:8d:20:d2:c5:a4: b3:04:50:13:9e:f2:7c:34:9b:0a:c1:b9:73:50:44:ef: bf:7e:ac:20:b4:ae:01:9e:d7:9c:6a:a1:ae:37:40:bb: 67:86:7c:9d:ef:d6:63:4b:85:a0:a8:a9:81:cb:37:72: 51:ac:be:c4:8e:30:0c:95:07:cb:a1:21:f3:70:1b:eb: 7f:73:18:92:b5:df:eb:d5:39:54:92:53:39:7a:61:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:e1:ea:19:3d:7e:ad:96:e8:49:7f:22:98:9c:2f:a2: 2c:b7:79:f6:b3:38:fe:29:f8:ce:48:91:4b:34:2e:12: 7c:ee:b5:52:7b:71:5d:81:3e:df:b7:e4:ff:c7:86:d9: b5:f0:95:9b:e1:ea:4e:09:7d:80:da:4f:1f:e7:10:da: 3a:18:01:f0:04:5a:a9:51:a8:01:fb:ec:f0:31:55:d9: 57:50:2b:f0:d6:57:6a:d7:95:48:c6:4d:3b:bb:5f:f3: b7:27:93:9e:e6:08:ba:70:a3:82:91:eb:df:03:8b:b6: cc:cc:bb:34:a4:ef:0c:0c:c4:ec:06:45:a9:c9:65:de: 3c:f0:18:f0:cb:16:d5:84:61:0e:cb:a6:5b:aa:52:a3: 13:82:30:34:78:22:87:12:31:7c:89:51:6c:5c:41:83: ab:b0:6c:76:b1:ff:e0:44:6f:51:13:a2:c6:a2:5d:93: 2d:6c:87:ce:74:75:d9:e9:46:fd:91:97:7f:4f:25:ef: a9:2c:74:fe:ac:1a:21:69:ca:e1:35:33:61:92:59:26: 7b:0f:b9:d4:53:23:94:d9:ef:0c:24:8c:c5:2d:ac:8a: 65:f4:05:b7:2d:7f:c4:b2:36:ab:b3:31:6a:0d:49:4a: 60:4c:dc:c2:db:98:65:69:0d:c3:b5:c9:00:81:23:2b Fingerprint (SHA-256): D3:C6:29:21:13:9E:06:B0:A5:F0:E8:6F:B4:E8:4D:C3:D9:68:10:69:FB:08:C9:88:5B:07:1C:E3:23:83:E0:3C Fingerprint (SHA1): F8:11:0D:6F:C3:7B:11:0F:F6:D2:B9:96:48:12:61:D3:F6:DC:DF:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2911: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2912: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194782 (0x433ee2de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:7f:05:1c:b3:97:7a:d5:0f:a4:49:3e:7a:89:ed:35: ec:76:38:68:d3:08:e0:93:be:bb:e4:98:f3:f2:6a:6b: 10:fc:52:fd:12:e6:58:cd:c7:05:5d:f9:b5:3e:a2:c4: 3a:f5:28:87:ba:ed:7f:b1:c5:6f:fc:7d:6f:7f:fc:56: 8d:f9:99:77:be:08:a7:d4:c7:c5:ed:b4:7a:7c:d2:a1: 6e:56:9c:2b:25:3e:14:46:93:ca:4e:7d:8f:c2:1e:44: 5d:85:4f:14:38:c1:c5:9b:c4:79:0c:ff:67:c8:b1:83: 64:c1:93:5e:fc:e0:ed:1e:9c:25:d3:37:97:97:79:71: 58:4e:21:2f:b2:17:18:1b:d0:8d:86:2a:35:6e:50:a2: 43:13:8a:83:98:8b:1a:e9:01:e4:f9:75:ed:f3:7a:e4: 2d:6e:db:af:25:a6:12:97:dc:0e:ec:64:6b:03:02:97: 95:f5:aa:16:f0:df:8c:f9:2f:65:2d:ae:aa:26:7b:bf: dc:f7:15:ad:bb:a5:78:44:de:24:61:5d:6e:80:a5:1d: 6b:0b:9c:be:97:70:26:f0:1b:4f:9f:e0:86:66:6c:bf: 91:23:e8:1d:54:57:b8:a4:c2:f5:ea:6e:33:1d:5b:41: 37:df:23:8d:ce:0d:e8:62:d7:56:46:72:d1:5c:c6:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:9c:43:43:5b:40:e8:98:7b:ff:48:93:cd:bd:46:58: 9f:e2:5a:d2:f3:8b:01:1b:30:16:8d:d0:cc:41:50:2a: 77:8b:e2:88:a7:d4:66:83:e0:8b:28:ea:f7:7b:fb:8e: 10:00:ee:49:7b:0b:51:e3:55:66:48:56:37:9c:63:96: a9:48:4c:71:c5:ac:a3:85:e3:11:b9:97:09:80:f6:3c: 31:dd:c8:44:2d:b1:22:0f:88:0a:33:10:3a:48:dc:24: 3e:7d:ff:59:35:dc:5a:32:11:50:1c:89:08:74:e8:33: 7f:9b:24:eb:c7:65:f5:e8:9e:39:59:d9:80:db:cf:d8: 43:cd:ff:80:61:c7:c6:70:61:cc:5f:b5:ca:f8:98:1e: 98:3c:05:7f:be:77:21:e9:bc:f1:b8:24:5f:18:0d:74: e0:22:26:64:1a:2a:26:91:ef:99:1f:6b:df:4a:b5:2f: a7:50:2d:55:ae:fa:35:29:b9:96:fd:24:d8:aa:64:c2: d2:c3:2a:49:f5:69:a9:22:25:f7:dc:0d:51:82:d1:1c: be:40:55:b7:fe:88:59:ac:81:35:af:77:60:c9:b8:4c: 37:e2:ef:6f:f5:5d:9d:77:9a:aa:b3:43:e9:ce:f1:18: ce:04:1c:e9:6e:7d:51:59:99:96:39:ec:0b:4b:02:eb Fingerprint (SHA-256): D6:47:EB:D3:95:DA:B2:23:5E:DC:70:11:71:FD:FF:9D:C1:1D:5E:B9:C0:E1:F2:44:38:34:4F:0F:94:E6:25:E5 Fingerprint (SHA1): 9F:ED:29:0D:FC:C3:D3:06:8C:25:38:95:EC:23:B2:B5:96:86:57:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2913: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2914: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194783 (0x433ee2df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:4d:7d:79:a9:d4:91:15:34:e0:31:a7:66:75:44:07: 07:5c:b5:3a:64:ea:d1:35:95:85:7b:63:1c:8f:0e:90: c8:29:8f:7e:af:49:51:82:97:75:c2:c9:fe:64:f6:f7: fd:b0:bb:a7:c6:fd:3e:b7:da:66:67:ba:26:b8:bf:c6: 08:b5:09:db:3d:a5:51:08:59:75:bc:43:8f:ac:2a:87: f1:ea:0d:b4:01:cb:7a:13:09:cb:98:16:39:d6:da:bb: fa:89:80:08:b1:4c:af:1f:72:7a:2f:9a:17:a9:e4:25: 1d:37:6a:9c:85:72:83:3d:fc:a6:ba:f4:66:14:ed:e8: 4c:47:b6:e2:5d:dc:b8:45:82:b2:cc:4a:0c:55:0a:e5: a3:70:c2:de:af:ef:1d:fe:a7:bc:ac:a8:14:9e:88:74: 91:24:6e:aa:cb:a5:56:e4:bd:11:c0:b3:84:cf:ff:a7: 3f:ed:6c:84:76:94:9d:3f:12:a7:63:6b:d0:9f:01:43: ec:6f:94:d7:6d:b7:1e:61:fc:7c:a9:e0:91:88:74:22: bf:ca:8a:9e:ff:ac:bd:2e:67:95:1b:05:32:ef:e6:c7: 66:30:ce:48:8e:da:ab:39:14:3a:a2:f7:1c:45:c5:06: 18:d7:62:ba:93:02:57:27:00:b3:14:d1:fd:a2:0a:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:cf:b1:d6:48:c8:66:78:a9:af:85:ba:b1:6e:d3:fe: a2:5f:71:fc:23:9f:82:dd:a0:f9:24:2b:25:83:c8:1f: d1:2c:1e:b9:41:ab:67:f8:d3:8b:6d:5c:94:bd:e0:55: 30:a7:0b:ea:d1:18:74:32:77:fa:28:9e:0a:6c:a9:3e: 6c:53:42:49:19:20:c0:aa:eb:e8:26:06:9b:e1:8a:8f: 1b:a6:8d:f5:20:08:6c:a0:47:4c:ec:6b:00:90:fc:b5: 81:b3:fa:47:e0:a2:c9:57:ad:2d:d5:95:24:f4:59:5d: 16:aa:87:62:77:04:2c:fc:f1:73:57:bc:bd:ec:8b:43: f9:a5:84:d8:da:57:f8:cc:b7:a7:62:4d:d0:d5:98:6b: 06:da:51:a8:38:bd:94:73:7c:54:e2:29:bf:7f:5c:6e: ee:13:ca:64:b7:ce:f7:30:84:02:12:82:77:bd:90:c1: 11:fe:10:f2:cd:9b:9b:c0:ff:5b:6d:37:db:2e:b5:92: b4:eb:f2:f7:01:a7:73:11:d6:6f:26:b8:20:f7:59:15: b3:b8:e9:ad:d2:fb:de:f9:c5:6f:46:b4:f1:ff:e7:93: 4d:4a:f7:bf:c4:30:b9:5b:c7:59:af:09:5d:3d:16:f4: b5:51:5b:6a:1c:10:94:e3:ae:53:27:6a:33:cc:e4:2d Fingerprint (SHA-256): F2:04:87:85:9C:A1:E2:47:D7:CB:ED:C9:23:5C:DF:F8:18:F1:E0:08:40:E7:71:0D:62:89:D7:46:2E:66:65:89 Fingerprint (SHA1): 6E:AA:38:C2:61:0E:EB:63:30:94:13:15:7B:80:21:2E:A0:A2:CB:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2915: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2916: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2917: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2918: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2919: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194781 (0x433ee2dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:32 2025 Not After : Thu Nov 28 11:50:32 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:02:34:c5:ef:3f:5f:b2:31:bb:e1:d9:f1:28:25:b3: 2b:ac:61:94:33:a7:d3:3d:ac:c0:f8:c7:5a:bc:05:65: 2b:e7:0c:17:66:6e:91:a1:81:ea:d3:ee:ca:50:78:a1: f4:37:67:9f:e3:8d:8a:3f:7a:99:bc:6c:43:2a:2d:56: c4:a9:a7:aa:eb:8f:78:e8:1a:08:47:22:fd:e8:02:26: f3:86:1d:79:b9:f4:d8:56:26:9c:82:4b:d3:fa:58:0d: 47:9d:2c:4d:df:ff:ac:3a:8c:ee:2d:97:18:8c:b3:7f: fb:42:a8:90:fc:56:5d:7e:f7:bb:f7:08:59:cf:b6:65: 1d:ea:c0:04:eb:3b:e5:0a:5e:9c:b5:74:e3:99:78:d9: 33:8c:83:b2:16:18:77:6c:53:64:c9:c8:e6:62:c2:55: ec:ea:13:f4:79:fc:ef:06:da:de:3c:8d:20:d2:c5:a4: b3:04:50:13:9e:f2:7c:34:9b:0a:c1:b9:73:50:44:ef: bf:7e:ac:20:b4:ae:01:9e:d7:9c:6a:a1:ae:37:40:bb: 67:86:7c:9d:ef:d6:63:4b:85:a0:a8:a9:81:cb:37:72: 51:ac:be:c4:8e:30:0c:95:07:cb:a1:21:f3:70:1b:eb: 7f:73:18:92:b5:df:eb:d5:39:54:92:53:39:7a:61:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:e1:ea:19:3d:7e:ad:96:e8:49:7f:22:98:9c:2f:a2: 2c:b7:79:f6:b3:38:fe:29:f8:ce:48:91:4b:34:2e:12: 7c:ee:b5:52:7b:71:5d:81:3e:df:b7:e4:ff:c7:86:d9: b5:f0:95:9b:e1:ea:4e:09:7d:80:da:4f:1f:e7:10:da: 3a:18:01:f0:04:5a:a9:51:a8:01:fb:ec:f0:31:55:d9: 57:50:2b:f0:d6:57:6a:d7:95:48:c6:4d:3b:bb:5f:f3: b7:27:93:9e:e6:08:ba:70:a3:82:91:eb:df:03:8b:b6: cc:cc:bb:34:a4:ef:0c:0c:c4:ec:06:45:a9:c9:65:de: 3c:f0:18:f0:cb:16:d5:84:61:0e:cb:a6:5b:aa:52:a3: 13:82:30:34:78:22:87:12:31:7c:89:51:6c:5c:41:83: ab:b0:6c:76:b1:ff:e0:44:6f:51:13:a2:c6:a2:5d:93: 2d:6c:87:ce:74:75:d9:e9:46:fd:91:97:7f:4f:25:ef: a9:2c:74:fe:ac:1a:21:69:ca:e1:35:33:61:92:59:26: 7b:0f:b9:d4:53:23:94:d9:ef:0c:24:8c:c5:2d:ac:8a: 65:f4:05:b7:2d:7f:c4:b2:36:ab:b3:31:6a:0d:49:4a: 60:4c:dc:c2:db:98:65:69:0d:c3:b5:c9:00:81:23:2b Fingerprint (SHA-256): D3:C6:29:21:13:9E:06:B0:A5:F0:E8:6F:B4:E8:4D:C3:D9:68:10:69:FB:08:C9:88:5B:07:1C:E3:23:83:E0:3C Fingerprint (SHA1): F8:11:0D:6F:C3:7B:11:0F:F6:D2:B9:96:48:12:61:D3:F6:DC:DF:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2920: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2921: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194782 (0x433ee2de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:7f:05:1c:b3:97:7a:d5:0f:a4:49:3e:7a:89:ed:35: ec:76:38:68:d3:08:e0:93:be:bb:e4:98:f3:f2:6a:6b: 10:fc:52:fd:12:e6:58:cd:c7:05:5d:f9:b5:3e:a2:c4: 3a:f5:28:87:ba:ed:7f:b1:c5:6f:fc:7d:6f:7f:fc:56: 8d:f9:99:77:be:08:a7:d4:c7:c5:ed:b4:7a:7c:d2:a1: 6e:56:9c:2b:25:3e:14:46:93:ca:4e:7d:8f:c2:1e:44: 5d:85:4f:14:38:c1:c5:9b:c4:79:0c:ff:67:c8:b1:83: 64:c1:93:5e:fc:e0:ed:1e:9c:25:d3:37:97:97:79:71: 58:4e:21:2f:b2:17:18:1b:d0:8d:86:2a:35:6e:50:a2: 43:13:8a:83:98:8b:1a:e9:01:e4:f9:75:ed:f3:7a:e4: 2d:6e:db:af:25:a6:12:97:dc:0e:ec:64:6b:03:02:97: 95:f5:aa:16:f0:df:8c:f9:2f:65:2d:ae:aa:26:7b:bf: dc:f7:15:ad:bb:a5:78:44:de:24:61:5d:6e:80:a5:1d: 6b:0b:9c:be:97:70:26:f0:1b:4f:9f:e0:86:66:6c:bf: 91:23:e8:1d:54:57:b8:a4:c2:f5:ea:6e:33:1d:5b:41: 37:df:23:8d:ce:0d:e8:62:d7:56:46:72:d1:5c:c6:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:9c:43:43:5b:40:e8:98:7b:ff:48:93:cd:bd:46:58: 9f:e2:5a:d2:f3:8b:01:1b:30:16:8d:d0:cc:41:50:2a: 77:8b:e2:88:a7:d4:66:83:e0:8b:28:ea:f7:7b:fb:8e: 10:00:ee:49:7b:0b:51:e3:55:66:48:56:37:9c:63:96: a9:48:4c:71:c5:ac:a3:85:e3:11:b9:97:09:80:f6:3c: 31:dd:c8:44:2d:b1:22:0f:88:0a:33:10:3a:48:dc:24: 3e:7d:ff:59:35:dc:5a:32:11:50:1c:89:08:74:e8:33: 7f:9b:24:eb:c7:65:f5:e8:9e:39:59:d9:80:db:cf:d8: 43:cd:ff:80:61:c7:c6:70:61:cc:5f:b5:ca:f8:98:1e: 98:3c:05:7f:be:77:21:e9:bc:f1:b8:24:5f:18:0d:74: e0:22:26:64:1a:2a:26:91:ef:99:1f:6b:df:4a:b5:2f: a7:50:2d:55:ae:fa:35:29:b9:96:fd:24:d8:aa:64:c2: d2:c3:2a:49:f5:69:a9:22:25:f7:dc:0d:51:82:d1:1c: be:40:55:b7:fe:88:59:ac:81:35:af:77:60:c9:b8:4c: 37:e2:ef:6f:f5:5d:9d:77:9a:aa:b3:43:e9:ce:f1:18: ce:04:1c:e9:6e:7d:51:59:99:96:39:ec:0b:4b:02:eb Fingerprint (SHA-256): D6:47:EB:D3:95:DA:B2:23:5E:DC:70:11:71:FD:FF:9D:C1:1D:5E:B9:C0:E1:F2:44:38:34:4F:0F:94:E6:25:E5 Fingerprint (SHA1): 9F:ED:29:0D:FC:C3:D3:06:8C:25:38:95:EC:23:B2:B5:96:86:57:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2922: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2923: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194783 (0x433ee2df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:4d:7d:79:a9:d4:91:15:34:e0:31:a7:66:75:44:07: 07:5c:b5:3a:64:ea:d1:35:95:85:7b:63:1c:8f:0e:90: c8:29:8f:7e:af:49:51:82:97:75:c2:c9:fe:64:f6:f7: fd:b0:bb:a7:c6:fd:3e:b7:da:66:67:ba:26:b8:bf:c6: 08:b5:09:db:3d:a5:51:08:59:75:bc:43:8f:ac:2a:87: f1:ea:0d:b4:01:cb:7a:13:09:cb:98:16:39:d6:da:bb: fa:89:80:08:b1:4c:af:1f:72:7a:2f:9a:17:a9:e4:25: 1d:37:6a:9c:85:72:83:3d:fc:a6:ba:f4:66:14:ed:e8: 4c:47:b6:e2:5d:dc:b8:45:82:b2:cc:4a:0c:55:0a:e5: a3:70:c2:de:af:ef:1d:fe:a7:bc:ac:a8:14:9e:88:74: 91:24:6e:aa:cb:a5:56:e4:bd:11:c0:b3:84:cf:ff:a7: 3f:ed:6c:84:76:94:9d:3f:12:a7:63:6b:d0:9f:01:43: ec:6f:94:d7:6d:b7:1e:61:fc:7c:a9:e0:91:88:74:22: bf:ca:8a:9e:ff:ac:bd:2e:67:95:1b:05:32:ef:e6:c7: 66:30:ce:48:8e:da:ab:39:14:3a:a2:f7:1c:45:c5:06: 18:d7:62:ba:93:02:57:27:00:b3:14:d1:fd:a2:0a:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:cf:b1:d6:48:c8:66:78:a9:af:85:ba:b1:6e:d3:fe: a2:5f:71:fc:23:9f:82:dd:a0:f9:24:2b:25:83:c8:1f: d1:2c:1e:b9:41:ab:67:f8:d3:8b:6d:5c:94:bd:e0:55: 30:a7:0b:ea:d1:18:74:32:77:fa:28:9e:0a:6c:a9:3e: 6c:53:42:49:19:20:c0:aa:eb:e8:26:06:9b:e1:8a:8f: 1b:a6:8d:f5:20:08:6c:a0:47:4c:ec:6b:00:90:fc:b5: 81:b3:fa:47:e0:a2:c9:57:ad:2d:d5:95:24:f4:59:5d: 16:aa:87:62:77:04:2c:fc:f1:73:57:bc:bd:ec:8b:43: f9:a5:84:d8:da:57:f8:cc:b7:a7:62:4d:d0:d5:98:6b: 06:da:51:a8:38:bd:94:73:7c:54:e2:29:bf:7f:5c:6e: ee:13:ca:64:b7:ce:f7:30:84:02:12:82:77:bd:90:c1: 11:fe:10:f2:cd:9b:9b:c0:ff:5b:6d:37:db:2e:b5:92: b4:eb:f2:f7:01:a7:73:11:d6:6f:26:b8:20:f7:59:15: b3:b8:e9:ad:d2:fb:de:f9:c5:6f:46:b4:f1:ff:e7:93: 4d:4a:f7:bf:c4:30:b9:5b:c7:59:af:09:5d:3d:16:f4: b5:51:5b:6a:1c:10:94:e3:ae:53:27:6a:33:cc:e4:2d Fingerprint (SHA-256): F2:04:87:85:9C:A1:E2:47:D7:CB:ED:C9:23:5C:DF:F8:18:F1:E0:08:40:E7:71:0D:62:89:D7:46:2E:66:65:89 Fingerprint (SHA1): 6E:AA:38:C2:61:0E:EB:63:30:94:13:15:7B:80:21:2E:A0:A2:CB:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2924: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2925: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194781 (0x433ee2dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:32 2025 Not After : Thu Nov 28 11:50:32 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:02:34:c5:ef:3f:5f:b2:31:bb:e1:d9:f1:28:25:b3: 2b:ac:61:94:33:a7:d3:3d:ac:c0:f8:c7:5a:bc:05:65: 2b:e7:0c:17:66:6e:91:a1:81:ea:d3:ee:ca:50:78:a1: f4:37:67:9f:e3:8d:8a:3f:7a:99:bc:6c:43:2a:2d:56: c4:a9:a7:aa:eb:8f:78:e8:1a:08:47:22:fd:e8:02:26: f3:86:1d:79:b9:f4:d8:56:26:9c:82:4b:d3:fa:58:0d: 47:9d:2c:4d:df:ff:ac:3a:8c:ee:2d:97:18:8c:b3:7f: fb:42:a8:90:fc:56:5d:7e:f7:bb:f7:08:59:cf:b6:65: 1d:ea:c0:04:eb:3b:e5:0a:5e:9c:b5:74:e3:99:78:d9: 33:8c:83:b2:16:18:77:6c:53:64:c9:c8:e6:62:c2:55: ec:ea:13:f4:79:fc:ef:06:da:de:3c:8d:20:d2:c5:a4: b3:04:50:13:9e:f2:7c:34:9b:0a:c1:b9:73:50:44:ef: bf:7e:ac:20:b4:ae:01:9e:d7:9c:6a:a1:ae:37:40:bb: 67:86:7c:9d:ef:d6:63:4b:85:a0:a8:a9:81:cb:37:72: 51:ac:be:c4:8e:30:0c:95:07:cb:a1:21:f3:70:1b:eb: 7f:73:18:92:b5:df:eb:d5:39:54:92:53:39:7a:61:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:e1:ea:19:3d:7e:ad:96:e8:49:7f:22:98:9c:2f:a2: 2c:b7:79:f6:b3:38:fe:29:f8:ce:48:91:4b:34:2e:12: 7c:ee:b5:52:7b:71:5d:81:3e:df:b7:e4:ff:c7:86:d9: b5:f0:95:9b:e1:ea:4e:09:7d:80:da:4f:1f:e7:10:da: 3a:18:01:f0:04:5a:a9:51:a8:01:fb:ec:f0:31:55:d9: 57:50:2b:f0:d6:57:6a:d7:95:48:c6:4d:3b:bb:5f:f3: b7:27:93:9e:e6:08:ba:70:a3:82:91:eb:df:03:8b:b6: cc:cc:bb:34:a4:ef:0c:0c:c4:ec:06:45:a9:c9:65:de: 3c:f0:18:f0:cb:16:d5:84:61:0e:cb:a6:5b:aa:52:a3: 13:82:30:34:78:22:87:12:31:7c:89:51:6c:5c:41:83: ab:b0:6c:76:b1:ff:e0:44:6f:51:13:a2:c6:a2:5d:93: 2d:6c:87:ce:74:75:d9:e9:46:fd:91:97:7f:4f:25:ef: a9:2c:74:fe:ac:1a:21:69:ca:e1:35:33:61:92:59:26: 7b:0f:b9:d4:53:23:94:d9:ef:0c:24:8c:c5:2d:ac:8a: 65:f4:05:b7:2d:7f:c4:b2:36:ab:b3:31:6a:0d:49:4a: 60:4c:dc:c2:db:98:65:69:0d:c3:b5:c9:00:81:23:2b Fingerprint (SHA-256): D3:C6:29:21:13:9E:06:B0:A5:F0:E8:6F:B4:E8:4D:C3:D9:68:10:69:FB:08:C9:88:5B:07:1C:E3:23:83:E0:3C Fingerprint (SHA1): F8:11:0D:6F:C3:7B:11:0F:F6:D2:B9:96:48:12:61:D3:F6:DC:DF:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2926: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194781 (0x433ee2dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:32 2025 Not After : Thu Nov 28 11:50:32 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:02:34:c5:ef:3f:5f:b2:31:bb:e1:d9:f1:28:25:b3: 2b:ac:61:94:33:a7:d3:3d:ac:c0:f8:c7:5a:bc:05:65: 2b:e7:0c:17:66:6e:91:a1:81:ea:d3:ee:ca:50:78:a1: f4:37:67:9f:e3:8d:8a:3f:7a:99:bc:6c:43:2a:2d:56: c4:a9:a7:aa:eb:8f:78:e8:1a:08:47:22:fd:e8:02:26: f3:86:1d:79:b9:f4:d8:56:26:9c:82:4b:d3:fa:58:0d: 47:9d:2c:4d:df:ff:ac:3a:8c:ee:2d:97:18:8c:b3:7f: fb:42:a8:90:fc:56:5d:7e:f7:bb:f7:08:59:cf:b6:65: 1d:ea:c0:04:eb:3b:e5:0a:5e:9c:b5:74:e3:99:78:d9: 33:8c:83:b2:16:18:77:6c:53:64:c9:c8:e6:62:c2:55: ec:ea:13:f4:79:fc:ef:06:da:de:3c:8d:20:d2:c5:a4: b3:04:50:13:9e:f2:7c:34:9b:0a:c1:b9:73:50:44:ef: bf:7e:ac:20:b4:ae:01:9e:d7:9c:6a:a1:ae:37:40:bb: 67:86:7c:9d:ef:d6:63:4b:85:a0:a8:a9:81:cb:37:72: 51:ac:be:c4:8e:30:0c:95:07:cb:a1:21:f3:70:1b:eb: 7f:73:18:92:b5:df:eb:d5:39:54:92:53:39:7a:61:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6e:e1:ea:19:3d:7e:ad:96:e8:49:7f:22:98:9c:2f:a2: 2c:b7:79:f6:b3:38:fe:29:f8:ce:48:91:4b:34:2e:12: 7c:ee:b5:52:7b:71:5d:81:3e:df:b7:e4:ff:c7:86:d9: b5:f0:95:9b:e1:ea:4e:09:7d:80:da:4f:1f:e7:10:da: 3a:18:01:f0:04:5a:a9:51:a8:01:fb:ec:f0:31:55:d9: 57:50:2b:f0:d6:57:6a:d7:95:48:c6:4d:3b:bb:5f:f3: b7:27:93:9e:e6:08:ba:70:a3:82:91:eb:df:03:8b:b6: cc:cc:bb:34:a4:ef:0c:0c:c4:ec:06:45:a9:c9:65:de: 3c:f0:18:f0:cb:16:d5:84:61:0e:cb:a6:5b:aa:52:a3: 13:82:30:34:78:22:87:12:31:7c:89:51:6c:5c:41:83: ab:b0:6c:76:b1:ff:e0:44:6f:51:13:a2:c6:a2:5d:93: 2d:6c:87:ce:74:75:d9:e9:46:fd:91:97:7f:4f:25:ef: a9:2c:74:fe:ac:1a:21:69:ca:e1:35:33:61:92:59:26: 7b:0f:b9:d4:53:23:94:d9:ef:0c:24:8c:c5:2d:ac:8a: 65:f4:05:b7:2d:7f:c4:b2:36:ab:b3:31:6a:0d:49:4a: 60:4c:dc:c2:db:98:65:69:0d:c3:b5:c9:00:81:23:2b Fingerprint (SHA-256): D3:C6:29:21:13:9E:06:B0:A5:F0:E8:6F:B4:E8:4D:C3:D9:68:10:69:FB:08:C9:88:5B:07:1C:E3:23:83:E0:3C Fingerprint (SHA1): F8:11:0D:6F:C3:7B:11:0F:F6:D2:B9:96:48:12:61:D3:F6:DC:DF:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2927: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194782 (0x433ee2de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:7f:05:1c:b3:97:7a:d5:0f:a4:49:3e:7a:89:ed:35: ec:76:38:68:d3:08:e0:93:be:bb:e4:98:f3:f2:6a:6b: 10:fc:52:fd:12:e6:58:cd:c7:05:5d:f9:b5:3e:a2:c4: 3a:f5:28:87:ba:ed:7f:b1:c5:6f:fc:7d:6f:7f:fc:56: 8d:f9:99:77:be:08:a7:d4:c7:c5:ed:b4:7a:7c:d2:a1: 6e:56:9c:2b:25:3e:14:46:93:ca:4e:7d:8f:c2:1e:44: 5d:85:4f:14:38:c1:c5:9b:c4:79:0c:ff:67:c8:b1:83: 64:c1:93:5e:fc:e0:ed:1e:9c:25:d3:37:97:97:79:71: 58:4e:21:2f:b2:17:18:1b:d0:8d:86:2a:35:6e:50:a2: 43:13:8a:83:98:8b:1a:e9:01:e4:f9:75:ed:f3:7a:e4: 2d:6e:db:af:25:a6:12:97:dc:0e:ec:64:6b:03:02:97: 95:f5:aa:16:f0:df:8c:f9:2f:65:2d:ae:aa:26:7b:bf: dc:f7:15:ad:bb:a5:78:44:de:24:61:5d:6e:80:a5:1d: 6b:0b:9c:be:97:70:26:f0:1b:4f:9f:e0:86:66:6c:bf: 91:23:e8:1d:54:57:b8:a4:c2:f5:ea:6e:33:1d:5b:41: 37:df:23:8d:ce:0d:e8:62:d7:56:46:72:d1:5c:c6:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:9c:43:43:5b:40:e8:98:7b:ff:48:93:cd:bd:46:58: 9f:e2:5a:d2:f3:8b:01:1b:30:16:8d:d0:cc:41:50:2a: 77:8b:e2:88:a7:d4:66:83:e0:8b:28:ea:f7:7b:fb:8e: 10:00:ee:49:7b:0b:51:e3:55:66:48:56:37:9c:63:96: a9:48:4c:71:c5:ac:a3:85:e3:11:b9:97:09:80:f6:3c: 31:dd:c8:44:2d:b1:22:0f:88:0a:33:10:3a:48:dc:24: 3e:7d:ff:59:35:dc:5a:32:11:50:1c:89:08:74:e8:33: 7f:9b:24:eb:c7:65:f5:e8:9e:39:59:d9:80:db:cf:d8: 43:cd:ff:80:61:c7:c6:70:61:cc:5f:b5:ca:f8:98:1e: 98:3c:05:7f:be:77:21:e9:bc:f1:b8:24:5f:18:0d:74: e0:22:26:64:1a:2a:26:91:ef:99:1f:6b:df:4a:b5:2f: a7:50:2d:55:ae:fa:35:29:b9:96:fd:24:d8:aa:64:c2: d2:c3:2a:49:f5:69:a9:22:25:f7:dc:0d:51:82:d1:1c: be:40:55:b7:fe:88:59:ac:81:35:af:77:60:c9:b8:4c: 37:e2:ef:6f:f5:5d:9d:77:9a:aa:b3:43:e9:ce:f1:18: ce:04:1c:e9:6e:7d:51:59:99:96:39:ec:0b:4b:02:eb Fingerprint (SHA-256): D6:47:EB:D3:95:DA:B2:23:5E:DC:70:11:71:FD:FF:9D:C1:1D:5E:B9:C0:E1:F2:44:38:34:4F:0F:94:E6:25:E5 Fingerprint (SHA1): 9F:ED:29:0D:FC:C3:D3:06:8C:25:38:95:EC:23:B2:B5:96:86:57:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2928: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194782 (0x433ee2de) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:7f:05:1c:b3:97:7a:d5:0f:a4:49:3e:7a:89:ed:35: ec:76:38:68:d3:08:e0:93:be:bb:e4:98:f3:f2:6a:6b: 10:fc:52:fd:12:e6:58:cd:c7:05:5d:f9:b5:3e:a2:c4: 3a:f5:28:87:ba:ed:7f:b1:c5:6f:fc:7d:6f:7f:fc:56: 8d:f9:99:77:be:08:a7:d4:c7:c5:ed:b4:7a:7c:d2:a1: 6e:56:9c:2b:25:3e:14:46:93:ca:4e:7d:8f:c2:1e:44: 5d:85:4f:14:38:c1:c5:9b:c4:79:0c:ff:67:c8:b1:83: 64:c1:93:5e:fc:e0:ed:1e:9c:25:d3:37:97:97:79:71: 58:4e:21:2f:b2:17:18:1b:d0:8d:86:2a:35:6e:50:a2: 43:13:8a:83:98:8b:1a:e9:01:e4:f9:75:ed:f3:7a:e4: 2d:6e:db:af:25:a6:12:97:dc:0e:ec:64:6b:03:02:97: 95:f5:aa:16:f0:df:8c:f9:2f:65:2d:ae:aa:26:7b:bf: dc:f7:15:ad:bb:a5:78:44:de:24:61:5d:6e:80:a5:1d: 6b:0b:9c:be:97:70:26:f0:1b:4f:9f:e0:86:66:6c:bf: 91:23:e8:1d:54:57:b8:a4:c2:f5:ea:6e:33:1d:5b:41: 37:df:23:8d:ce:0d:e8:62:d7:56:46:72:d1:5c:c6:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:9c:43:43:5b:40:e8:98:7b:ff:48:93:cd:bd:46:58: 9f:e2:5a:d2:f3:8b:01:1b:30:16:8d:d0:cc:41:50:2a: 77:8b:e2:88:a7:d4:66:83:e0:8b:28:ea:f7:7b:fb:8e: 10:00:ee:49:7b:0b:51:e3:55:66:48:56:37:9c:63:96: a9:48:4c:71:c5:ac:a3:85:e3:11:b9:97:09:80:f6:3c: 31:dd:c8:44:2d:b1:22:0f:88:0a:33:10:3a:48:dc:24: 3e:7d:ff:59:35:dc:5a:32:11:50:1c:89:08:74:e8:33: 7f:9b:24:eb:c7:65:f5:e8:9e:39:59:d9:80:db:cf:d8: 43:cd:ff:80:61:c7:c6:70:61:cc:5f:b5:ca:f8:98:1e: 98:3c:05:7f:be:77:21:e9:bc:f1:b8:24:5f:18:0d:74: e0:22:26:64:1a:2a:26:91:ef:99:1f:6b:df:4a:b5:2f: a7:50:2d:55:ae:fa:35:29:b9:96:fd:24:d8:aa:64:c2: d2:c3:2a:49:f5:69:a9:22:25:f7:dc:0d:51:82:d1:1c: be:40:55:b7:fe:88:59:ac:81:35:af:77:60:c9:b8:4c: 37:e2:ef:6f:f5:5d:9d:77:9a:aa:b3:43:e9:ce:f1:18: ce:04:1c:e9:6e:7d:51:59:99:96:39:ec:0b:4b:02:eb Fingerprint (SHA-256): D6:47:EB:D3:95:DA:B2:23:5E:DC:70:11:71:FD:FF:9D:C1:1D:5E:B9:C0:E1:F2:44:38:34:4F:0F:94:E6:25:E5 Fingerprint (SHA1): 9F:ED:29:0D:FC:C3:D3:06:8C:25:38:95:EC:23:B2:B5:96:86:57:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2929: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194783 (0x433ee2df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:4d:7d:79:a9:d4:91:15:34:e0:31:a7:66:75:44:07: 07:5c:b5:3a:64:ea:d1:35:95:85:7b:63:1c:8f:0e:90: c8:29:8f:7e:af:49:51:82:97:75:c2:c9:fe:64:f6:f7: fd:b0:bb:a7:c6:fd:3e:b7:da:66:67:ba:26:b8:bf:c6: 08:b5:09:db:3d:a5:51:08:59:75:bc:43:8f:ac:2a:87: f1:ea:0d:b4:01:cb:7a:13:09:cb:98:16:39:d6:da:bb: fa:89:80:08:b1:4c:af:1f:72:7a:2f:9a:17:a9:e4:25: 1d:37:6a:9c:85:72:83:3d:fc:a6:ba:f4:66:14:ed:e8: 4c:47:b6:e2:5d:dc:b8:45:82:b2:cc:4a:0c:55:0a:e5: a3:70:c2:de:af:ef:1d:fe:a7:bc:ac:a8:14:9e:88:74: 91:24:6e:aa:cb:a5:56:e4:bd:11:c0:b3:84:cf:ff:a7: 3f:ed:6c:84:76:94:9d:3f:12:a7:63:6b:d0:9f:01:43: ec:6f:94:d7:6d:b7:1e:61:fc:7c:a9:e0:91:88:74:22: bf:ca:8a:9e:ff:ac:bd:2e:67:95:1b:05:32:ef:e6:c7: 66:30:ce:48:8e:da:ab:39:14:3a:a2:f7:1c:45:c5:06: 18:d7:62:ba:93:02:57:27:00:b3:14:d1:fd:a2:0a:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:cf:b1:d6:48:c8:66:78:a9:af:85:ba:b1:6e:d3:fe: a2:5f:71:fc:23:9f:82:dd:a0:f9:24:2b:25:83:c8:1f: d1:2c:1e:b9:41:ab:67:f8:d3:8b:6d:5c:94:bd:e0:55: 30:a7:0b:ea:d1:18:74:32:77:fa:28:9e:0a:6c:a9:3e: 6c:53:42:49:19:20:c0:aa:eb:e8:26:06:9b:e1:8a:8f: 1b:a6:8d:f5:20:08:6c:a0:47:4c:ec:6b:00:90:fc:b5: 81:b3:fa:47:e0:a2:c9:57:ad:2d:d5:95:24:f4:59:5d: 16:aa:87:62:77:04:2c:fc:f1:73:57:bc:bd:ec:8b:43: f9:a5:84:d8:da:57:f8:cc:b7:a7:62:4d:d0:d5:98:6b: 06:da:51:a8:38:bd:94:73:7c:54:e2:29:bf:7f:5c:6e: ee:13:ca:64:b7:ce:f7:30:84:02:12:82:77:bd:90:c1: 11:fe:10:f2:cd:9b:9b:c0:ff:5b:6d:37:db:2e:b5:92: b4:eb:f2:f7:01:a7:73:11:d6:6f:26:b8:20:f7:59:15: b3:b8:e9:ad:d2:fb:de:f9:c5:6f:46:b4:f1:ff:e7:93: 4d:4a:f7:bf:c4:30:b9:5b:c7:59:af:09:5d:3d:16:f4: b5:51:5b:6a:1c:10:94:e3:ae:53:27:6a:33:cc:e4:2d Fingerprint (SHA-256): F2:04:87:85:9C:A1:E2:47:D7:CB:ED:C9:23:5C:DF:F8:18:F1:E0:08:40:E7:71:0D:62:89:D7:46:2E:66:65:89 Fingerprint (SHA1): 6E:AA:38:C2:61:0E:EB:63:30:94:13:15:7B:80:21:2E:A0:A2:CB:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2930: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194783 (0x433ee2df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:50:33 2025 Not After : Thu Nov 28 11:50:33 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:4d:7d:79:a9:d4:91:15:34:e0:31:a7:66:75:44:07: 07:5c:b5:3a:64:ea:d1:35:95:85:7b:63:1c:8f:0e:90: c8:29:8f:7e:af:49:51:82:97:75:c2:c9:fe:64:f6:f7: fd:b0:bb:a7:c6:fd:3e:b7:da:66:67:ba:26:b8:bf:c6: 08:b5:09:db:3d:a5:51:08:59:75:bc:43:8f:ac:2a:87: f1:ea:0d:b4:01:cb:7a:13:09:cb:98:16:39:d6:da:bb: fa:89:80:08:b1:4c:af:1f:72:7a:2f:9a:17:a9:e4:25: 1d:37:6a:9c:85:72:83:3d:fc:a6:ba:f4:66:14:ed:e8: 4c:47:b6:e2:5d:dc:b8:45:82:b2:cc:4a:0c:55:0a:e5: a3:70:c2:de:af:ef:1d:fe:a7:bc:ac:a8:14:9e:88:74: 91:24:6e:aa:cb:a5:56:e4:bd:11:c0:b3:84:cf:ff:a7: 3f:ed:6c:84:76:94:9d:3f:12:a7:63:6b:d0:9f:01:43: ec:6f:94:d7:6d:b7:1e:61:fc:7c:a9:e0:91:88:74:22: bf:ca:8a:9e:ff:ac:bd:2e:67:95:1b:05:32:ef:e6:c7: 66:30:ce:48:8e:da:ab:39:14:3a:a2:f7:1c:45:c5:06: 18:d7:62:ba:93:02:57:27:00:b3:14:d1:fd:a2:0a:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:cf:b1:d6:48:c8:66:78:a9:af:85:ba:b1:6e:d3:fe: a2:5f:71:fc:23:9f:82:dd:a0:f9:24:2b:25:83:c8:1f: d1:2c:1e:b9:41:ab:67:f8:d3:8b:6d:5c:94:bd:e0:55: 30:a7:0b:ea:d1:18:74:32:77:fa:28:9e:0a:6c:a9:3e: 6c:53:42:49:19:20:c0:aa:eb:e8:26:06:9b:e1:8a:8f: 1b:a6:8d:f5:20:08:6c:a0:47:4c:ec:6b:00:90:fc:b5: 81:b3:fa:47:e0:a2:c9:57:ad:2d:d5:95:24:f4:59:5d: 16:aa:87:62:77:04:2c:fc:f1:73:57:bc:bd:ec:8b:43: f9:a5:84:d8:da:57:f8:cc:b7:a7:62:4d:d0:d5:98:6b: 06:da:51:a8:38:bd:94:73:7c:54:e2:29:bf:7f:5c:6e: ee:13:ca:64:b7:ce:f7:30:84:02:12:82:77:bd:90:c1: 11:fe:10:f2:cd:9b:9b:c0:ff:5b:6d:37:db:2e:b5:92: b4:eb:f2:f7:01:a7:73:11:d6:6f:26:b8:20:f7:59:15: b3:b8:e9:ad:d2:fb:de:f9:c5:6f:46:b4:f1:ff:e7:93: 4d:4a:f7:bf:c4:30:b9:5b:c7:59:af:09:5d:3d:16:f4: b5:51:5b:6a:1c:10:94:e3:ae:53:27:6a:33:cc:e4:2d Fingerprint (SHA-256): F2:04:87:85:9C:A1:E2:47:D7:CB:ED:C9:23:5C:DF:F8:18:F1:E0:08:40:E7:71:0D:62:89:D7:46:2E:66:65:89 Fingerprint (SHA1): 6E:AA:38:C2:61:0E:EB:63:30:94:13:15:7B:80:21:2E:A0:A2:CB:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2931: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2932: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194786 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2933: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2934: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2935: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2936: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194787 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2937: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2938: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2939: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2940: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194788 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2941: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2942: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2943: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2944: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1128194789 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2945: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2946: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2947: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2948: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1128194790 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2949: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2950: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2951: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2952: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1128194791 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2953: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2954: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2955: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2956: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1128194792 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2957: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2958: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2959: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2960: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2961: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2962: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2963: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194786 (0x433ee2e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:37 2025 Not After : Thu Nov 28 11:50:37 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:86:7c:06:16:af:30:00:51:97:a8:b3:57:3e:86:b0: 19:f6:df:f3:1a:48:b8:78:d9:87:b8:ed:cc:20:ec:4e: d5:01:88:c8:e6:98:ea:23:3c:36:cf:ba:e2:b3:d9:43: 49:7a:39:47:2a:53:ee:5c:fd:8b:4a:39:22:c7:1d:7d: 4d:26:8c:5c:fb:a5:aa:02:66:aa:a4:3c:b3:9c:1a:07: a1:48:37:e6:82:6e:ec:9a:62:7c:a0:1f:51:f7:9e:54: 64:7d:de:7a:eb:81:20:3d:c9:2a:eb:3d:8a:01:35:b0: b3:95:aa:99:0d:0f:6d:c4:5b:83:1e:a7:eb:a8:92:67: 9a:40:4d:80:a2:c7:87:35:de:e2:e8:3d:19:55:e0:e4: 9c:0c:f1:6b:e6:71:b3:a6:7f:fc:a1:fd:44:bb:7c:f7: 42:7b:a1:4b:91:2a:1a:1a:44:83:4d:65:08:4c:fc:cd: 89:71:9f:7d:40:9d:4f:e1:1c:2c:c1:4b:d3:f5:dd:cd: d6:c1:87:f5:f6:2e:e5:d1:f5:5e:5b:35:bf:e8:ff:97: 40:b6:6e:81:78:59:b0:a6:ee:88:7d:88:43:59:24:6d: 7c:9b:75:e2:86:b0:04:8d:88:7c:4c:b0:18:f3:69:14: a2:0d:32:5f:87:a3:a1:51:43:e3:c7:e1:82:60:f8:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:05:99:cf:57:b3:77:2f:d1:43:3f:de:d3:45:3a:4b: 41:57:f8:27:c0:2b:74:bd:c4:1a:cf:03:f8:83:21:5d: a3:aa:90:b1:3a:78:cb:fc:43:6e:7c:8c:1e:a8:9a:5f: 35:5d:1c:44:32:5c:1b:de:61:1d:11:f8:33:2e:4e:f3: 0c:8c:6d:d2:8e:48:7c:c6:18:41:27:4c:5a:54:e4:01: 9d:61:9a:b0:38:88:e8:ed:b2:b9:21:66:51:46:e3:08: 03:62:be:bc:a0:72:65:27:c0:6f:ac:69:d8:c7:6d:ee: 6b:bc:91:d1:d2:3f:52:fc:ab:f8:3b:e4:34:b2:de:a7: a4:94:04:f1:6f:df:c2:f9:6b:d4:5d:f0:c3:a3:6b:1c: 7c:5b:3b:52:1e:d3:24:8b:df:ec:13:5d:e5:1d:51:39: db:b6:57:f4:b5:5f:e6:c9:a3:ef:71:06:3d:f3:5f:9b: 86:91:ee:78:d9:19:53:52:de:94:b8:58:4e:c4:1f:d8: a0:03:af:45:1d:af:81:70:09:c0:05:04:27:5b:84:a9: 9e:da:ad:7c:8f:22:76:8f:43:4c:34:ac:59:db:d7:28: c2:8f:91:61:56:66:98:1a:7e:de:90:9c:b3:b0:2a:dc: 83:e3:c0:ae:6f:3c:7e:95:db:76:51:64:39:ac:09:39 Fingerprint (SHA-256): 6C:91:42:2A:E1:0B:64:81:62:FA:75:7A:86:3C:CB:82:18:65:9B:21:41:06:96:A5:99:DB:A0:3B:1B:CA:7F:F5 Fingerprint (SHA1): 4C:68:B6:97:8F:64:19:24:4F:A7:1A:55:CD:9A:85:6F:E4:DB:FB:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2964: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2965: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2966: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2967: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194786 (0x433ee2e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:37 2025 Not After : Thu Nov 28 11:50:37 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:86:7c:06:16:af:30:00:51:97:a8:b3:57:3e:86:b0: 19:f6:df:f3:1a:48:b8:78:d9:87:b8:ed:cc:20:ec:4e: d5:01:88:c8:e6:98:ea:23:3c:36:cf:ba:e2:b3:d9:43: 49:7a:39:47:2a:53:ee:5c:fd:8b:4a:39:22:c7:1d:7d: 4d:26:8c:5c:fb:a5:aa:02:66:aa:a4:3c:b3:9c:1a:07: a1:48:37:e6:82:6e:ec:9a:62:7c:a0:1f:51:f7:9e:54: 64:7d:de:7a:eb:81:20:3d:c9:2a:eb:3d:8a:01:35:b0: b3:95:aa:99:0d:0f:6d:c4:5b:83:1e:a7:eb:a8:92:67: 9a:40:4d:80:a2:c7:87:35:de:e2:e8:3d:19:55:e0:e4: 9c:0c:f1:6b:e6:71:b3:a6:7f:fc:a1:fd:44:bb:7c:f7: 42:7b:a1:4b:91:2a:1a:1a:44:83:4d:65:08:4c:fc:cd: 89:71:9f:7d:40:9d:4f:e1:1c:2c:c1:4b:d3:f5:dd:cd: d6:c1:87:f5:f6:2e:e5:d1:f5:5e:5b:35:bf:e8:ff:97: 40:b6:6e:81:78:59:b0:a6:ee:88:7d:88:43:59:24:6d: 7c:9b:75:e2:86:b0:04:8d:88:7c:4c:b0:18:f3:69:14: a2:0d:32:5f:87:a3:a1:51:43:e3:c7:e1:82:60:f8:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:05:99:cf:57:b3:77:2f:d1:43:3f:de:d3:45:3a:4b: 41:57:f8:27:c0:2b:74:bd:c4:1a:cf:03:f8:83:21:5d: a3:aa:90:b1:3a:78:cb:fc:43:6e:7c:8c:1e:a8:9a:5f: 35:5d:1c:44:32:5c:1b:de:61:1d:11:f8:33:2e:4e:f3: 0c:8c:6d:d2:8e:48:7c:c6:18:41:27:4c:5a:54:e4:01: 9d:61:9a:b0:38:88:e8:ed:b2:b9:21:66:51:46:e3:08: 03:62:be:bc:a0:72:65:27:c0:6f:ac:69:d8:c7:6d:ee: 6b:bc:91:d1:d2:3f:52:fc:ab:f8:3b:e4:34:b2:de:a7: a4:94:04:f1:6f:df:c2:f9:6b:d4:5d:f0:c3:a3:6b:1c: 7c:5b:3b:52:1e:d3:24:8b:df:ec:13:5d:e5:1d:51:39: db:b6:57:f4:b5:5f:e6:c9:a3:ef:71:06:3d:f3:5f:9b: 86:91:ee:78:d9:19:53:52:de:94:b8:58:4e:c4:1f:d8: a0:03:af:45:1d:af:81:70:09:c0:05:04:27:5b:84:a9: 9e:da:ad:7c:8f:22:76:8f:43:4c:34:ac:59:db:d7:28: c2:8f:91:61:56:66:98:1a:7e:de:90:9c:b3:b0:2a:dc: 83:e3:c0:ae:6f:3c:7e:95:db:76:51:64:39:ac:09:39 Fingerprint (SHA-256): 6C:91:42:2A:E1:0B:64:81:62:FA:75:7A:86:3C:CB:82:18:65:9B:21:41:06:96:A5:99:DB:A0:3B:1B:CA:7F:F5 Fingerprint (SHA1): 4C:68:B6:97:8F:64:19:24:4F:A7:1A:55:CD:9A:85:6F:E4:DB:FB:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2968: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2969: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2970: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194793 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2971: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2972: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2973: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2974: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194794 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2975: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2976: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2977: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2978: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1128194795 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2979: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2980: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2981: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2982: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1128194796 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2983: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2984: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2985: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2986: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1128194797 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2987: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2988: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2989: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2990: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1128194798 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2991: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2992: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2993: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2994: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1128194799 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2995: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2996: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2997: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2998: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1128194800 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2999: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3000: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3001: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3002: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1128194801 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3003: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3004: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3005: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3006: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1128194802 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3007: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3008: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3009: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3010: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1128194803 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3011: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3012: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3013: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3014: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1128194804 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3015: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3016: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3017: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3018: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1128194805 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3019: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3020: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3021: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3022: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1128194806 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3023: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3024: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3025: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3026: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1128194807 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3027: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3028: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3029: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3030: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1128194808 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3031: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3032: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3033: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3034: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1128194809 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3035: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3036: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3037: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3038: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1128194810 --extCP --extIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3039: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3040: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3041: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3042: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1128194811 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3043: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3044: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3045: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3046: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1128194812 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3047: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3048: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3049: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3050: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1128194813 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3051: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3052: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3053: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3054: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1128194814 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3055: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3056: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3057: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3058: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1128194815 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3059: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3060: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3061: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3062: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1128194816 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3063: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3064: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3065: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3066: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1128194817 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3067: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3068: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3069: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3070: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1128194818 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3071: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3072: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3073: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3074: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1128194819 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3075: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3076: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3077: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3078: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1128194820 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3079: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3080: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3081: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3082: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1128194821 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3083: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3084: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3085: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3086: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1128194822 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3087: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3088: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3089: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3090: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3091: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3094: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3095: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3096: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3097: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3098: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3099: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3100: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3101: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3102: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3103: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3104: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3105: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3106: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3107: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3108: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3109: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3110: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3111: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194793 (0x433ee2e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:50:42 2025 Not After : Thu Nov 28 11:50:42 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:d1:03:1b:87:83:8a:15:dd:aa:e4:e6:fd:bb:2b:0a: 4f:7c:a1:0d:db:2d:35:4a:5c:2f:60:84:95:27:6b:d7: aa:72:8a:d2:c7:ad:71:46:59:eb:fc:6c:f4:4b:d7:89: 85:79:7c:78:a9:1a:32:5b:12:db:d9:29:2e:13:1d:1c: 15:1b:e0:f5:23:21:28:ca:78:5f:dc:7d:ac:56:02:58: d4:74:31:c3:d8:72:89:d9:ed:08:e9:79:57:ad:34:bf: 28:ea:76:8a:c1:22:92:c6:7a:a5:76:9b:9b:30:25:1d: 36:3a:68:59:38:7e:45:32:3b:c4:2a:2f:91:45:f5:0d: c5:76:57:fb:a5:1e:bc:d6:42:c9:8a:21:aa:1c:9c:f2: aa:9e:dc:a2:9f:a1:b3:27:57:b5:f1:b4:8c:df:d2:c8: 7e:53:9c:c0:c4:12:98:bc:42:66:ae:c9:ca:18:7a:e4: 04:ce:e1:ac:02:bc:6d:96:37:81:6e:5b:f2:b1:65:0b: 9b:87:f1:11:df:fb:bd:e6:a4:ca:ce:63:ed:33:88:c3: 9b:2e:bd:a6:1a:c8:7d:61:3e:e9:3c:ca:af:0d:f8:8c: 7b:1d:d0:20:7c:24:fe:3d:1b:75:a7:b4:5c:33:d3:f0: 69:40:e9:56:89:0a:f8:35:a3:9e:3e:3f:aa:11:38:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:d2:a5:a3:64:02:48:8a:3c:d2:95:98:d5:8a:d3:fb: 61:d5:82:3c:20:84:8c:19:40:24:84:04:54:fa:82:15: 7b:7d:3e:99:b2:13:04:d6:ef:a7:55:fb:ef:eb:a3:f2: 8a:d6:1e:02:0b:0a:e0:2b:ab:1c:73:fd:b0:a0:63:5d: f5:f2:41:90:d5:14:06:43:5a:f3:18:a6:e3:a4:8d:17: 67:16:31:65:00:1c:4d:45:34:0d:44:6d:f3:77:ec:e0: 1c:08:82:40:41:94:96:f7:47:5f:06:a1:03:11:a9:56: 98:7f:e4:7c:8b:0d:c2:0a:6d:28:ba:06:d3:c1:7c:a4: be:16:1b:c7:94:96:27:e6:96:47:37:c5:b4:38:5d:0a: 17:78:1d:52:c2:13:95:2f:d0:7c:ec:d0:fa:47:ea:21: c4:14:a8:82:bb:34:b5:92:06:a3:e9:a2:b2:f4:45:61: c8:b5:62:59:5f:e8:bb:df:d3:d9:da:b8:36:a0:ce:7b: a4:1b:2e:61:35:3b:ed:f6:46:4a:b3:8a:cc:1f:10:ce: be:9e:af:99:98:16:58:2d:ae:0f:db:2e:89:9b:85:98: 05:e7:d8:cd:0a:13:2f:cc:05:ce:f1:bf:8b:5f:c8:2a: ac:fc:dd:fc:1b:f9:2f:23:18:af:d4:54:58:31:ee:c6 Fingerprint (SHA-256): 14:84:78:4F:A7:95:56:2D:1F:76:CA:61:52:62:2B:F5:FF:AC:A8:F7:FF:27:BE:4E:97:27:EB:14:B2:7A:A4:C2 Fingerprint (SHA1): 7C:77:45:63:00:56:66:2A:64:3E:F2:0D:F3:5F:54:E9:98:3F:94:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3112: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3113: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3114: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194823 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3115: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3116: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3117: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3118: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1128194824 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3119: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3120: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3121: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3122: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1128194825 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3123: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3124: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3125: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3126: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1128194826 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3127: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3128: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3129: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3130: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1128194827 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3131: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3132: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3133: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3134: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1128194828 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3135: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3136: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3137: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3138: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1128194829 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3139: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3140: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3141: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194823 (0x433ee307) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:07 2025 Not After : Thu Nov 28 11:51:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:10:c6:cb:81:b2:6c:f8:cd:9b:6f:30:6f:ae:b2:17: 15:d7:54:43:e1:37:11:5c:08:68:4d:e4:b5:53:98:8d: 5b:f7:05:4e:40:1a:3d:14:27:fd:84:cb:b5:f0:5d:ce: 17:a3:b4:08:d2:19:1d:3a:00:b7:01:2a:58:66:9d:2a: 47:31:c3:12:8b:04:0b:d3:69:2a:18:b6:db:21:4d:ea: 99:83:77:18:9a:8f:6a:94:7a:f0:90:cb:e7:f3:d3:be: 4e:e9:20:05:c8:8e:d3:e9:22:62:e0:b1:88:0b:64:47: 5c:be:8d:3d:08:3b:97:0b:1e:c9:31:89:3b:1a:90:a6: 73:2b:f2:75:66:ff:db:55:eb:72:92:33:1e:0e:c2:bb: af:b6:2b:28:00:0a:78:ef:ea:d9:2e:de:1d:cc:dd:f6: 63:74:cb:1c:f0:1d:92:31:f3:ae:a5:57:5f:91:ee:1f: 12:c4:30:95:ee:01:dd:e6:73:61:04:a6:20:a1:a3:31: 92:84:c8:3a:09:1b:ca:9c:0f:70:ee:12:34:11:d7:a5: 1d:29:e6:11:bf:56:d2:a9:cc:44:0b:e3:ed:cb:ee:96: 26:f2:35:c5:a7:58:00:d2:d1:c5:71:f3:3f:7e:3e:1f: 2d:ec:8c:28:6a:86:be:f1:d1:f3:65:c7:6e:9e:24:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:ea:1e:08:99:4a:2e:a5:f6:78:a0:ed:0d:ae:b5:8f: 4b:bf:45:e2:77:c0:ad:d1:65:57:a1:66:5e:0c:f5:fb: 22:e0:9c:45:1f:82:e2:62:cd:95:6e:e5:59:d1:ff:e4: b2:0b:4c:f9:7d:a8:7e:85:6d:6a:31:e5:fb:64:59:8c: bd:d9:7d:7b:94:23:26:ab:c2:e8:5c:9f:a0:ca:50:e0: 5e:2e:2c:b5:6f:9d:0d:b2:e5:0d:d2:60:e6:72:34:34: 2c:ba:09:b3:3b:e0:71:33:a2:ae:c7:f5:db:0a:ea:90: f5:a1:3a:3d:89:94:17:6a:69:c4:bb:50:d8:53:cc:99: 9f:a4:7a:17:01:bb:e2:62:db:fa:d1:27:89:f3:9c:5c: ad:a7:ac:a5:8d:6e:01:3e:58:bb:7a:82:05:05:84:45: 06:b6:d1:fb:49:52:bb:82:b5:fa:66:7f:d5:26:d2:39: fd:42:98:2e:21:ae:cb:e8:c2:a9:bf:98:6b:88:77:e4: ce:1c:20:b7:f5:4b:cb:06:ac:e5:e0:64:0c:74:27:9f: 23:76:88:a1:5b:7d:52:ec:9e:d4:8e:39:eb:22:bb:98: e2:f5:d7:2e:72:40:97:6b:a8:dc:99:8d:5d:2a:ba:2c: 07:d8:67:be:47:59:fb:d3:5e:2c:74:15:09:8a:93:f3 Fingerprint (SHA-256): 3B:36:5D:8F:3C:52:61:CB:B7:37:F0:35:E7:DD:0C:E8:76:7C:03:5A:EC:33:EB:57:2E:CD:D2:2C:53:9F:39:AE Fingerprint (SHA1): 80:82:31:84:F4:EE:CC:C3:B2:4D:3E:8F:6E:5B:8F:9D:6B:80:50:B9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3142: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3143: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3144: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3145: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194823 (0x433ee307) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:07 2025 Not After : Thu Nov 28 11:51:07 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:10:c6:cb:81:b2:6c:f8:cd:9b:6f:30:6f:ae:b2:17: 15:d7:54:43:e1:37:11:5c:08:68:4d:e4:b5:53:98:8d: 5b:f7:05:4e:40:1a:3d:14:27:fd:84:cb:b5:f0:5d:ce: 17:a3:b4:08:d2:19:1d:3a:00:b7:01:2a:58:66:9d:2a: 47:31:c3:12:8b:04:0b:d3:69:2a:18:b6:db:21:4d:ea: 99:83:77:18:9a:8f:6a:94:7a:f0:90:cb:e7:f3:d3:be: 4e:e9:20:05:c8:8e:d3:e9:22:62:e0:b1:88:0b:64:47: 5c:be:8d:3d:08:3b:97:0b:1e:c9:31:89:3b:1a:90:a6: 73:2b:f2:75:66:ff:db:55:eb:72:92:33:1e:0e:c2:bb: af:b6:2b:28:00:0a:78:ef:ea:d9:2e:de:1d:cc:dd:f6: 63:74:cb:1c:f0:1d:92:31:f3:ae:a5:57:5f:91:ee:1f: 12:c4:30:95:ee:01:dd:e6:73:61:04:a6:20:a1:a3:31: 92:84:c8:3a:09:1b:ca:9c:0f:70:ee:12:34:11:d7:a5: 1d:29:e6:11:bf:56:d2:a9:cc:44:0b:e3:ed:cb:ee:96: 26:f2:35:c5:a7:58:00:d2:d1:c5:71:f3:3f:7e:3e:1f: 2d:ec:8c:28:6a:86:be:f1:d1:f3:65:c7:6e:9e:24:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:ea:1e:08:99:4a:2e:a5:f6:78:a0:ed:0d:ae:b5:8f: 4b:bf:45:e2:77:c0:ad:d1:65:57:a1:66:5e:0c:f5:fb: 22:e0:9c:45:1f:82:e2:62:cd:95:6e:e5:59:d1:ff:e4: b2:0b:4c:f9:7d:a8:7e:85:6d:6a:31:e5:fb:64:59:8c: bd:d9:7d:7b:94:23:26:ab:c2:e8:5c:9f:a0:ca:50:e0: 5e:2e:2c:b5:6f:9d:0d:b2:e5:0d:d2:60:e6:72:34:34: 2c:ba:09:b3:3b:e0:71:33:a2:ae:c7:f5:db:0a:ea:90: f5:a1:3a:3d:89:94:17:6a:69:c4:bb:50:d8:53:cc:99: 9f:a4:7a:17:01:bb:e2:62:db:fa:d1:27:89:f3:9c:5c: ad:a7:ac:a5:8d:6e:01:3e:58:bb:7a:82:05:05:84:45: 06:b6:d1:fb:49:52:bb:82:b5:fa:66:7f:d5:26:d2:39: fd:42:98:2e:21:ae:cb:e8:c2:a9:bf:98:6b:88:77:e4: ce:1c:20:b7:f5:4b:cb:06:ac:e5:e0:64:0c:74:27:9f: 23:76:88:a1:5b:7d:52:ec:9e:d4:8e:39:eb:22:bb:98: e2:f5:d7:2e:72:40:97:6b:a8:dc:99:8d:5d:2a:ba:2c: 07:d8:67:be:47:59:fb:d3:5e:2c:74:15:09:8a:93:f3 Fingerprint (SHA-256): 3B:36:5D:8F:3C:52:61:CB:B7:37:F0:35:E7:DD:0C:E8:76:7C:03:5A:EC:33:EB:57:2E:CD:D2:2C:53:9F:39:AE Fingerprint (SHA1): 80:82:31:84:F4:EE:CC:C3:B2:4D:3E:8F:6E:5B:8F:9D:6B:80:50:B9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3146: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3147: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3148: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3149: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194830 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3150: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3151: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3152: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3153: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194831 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3154: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3155: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3156: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3157: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194832 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3158: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3159: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3160: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3161: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194833 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3162: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3163: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3164: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3165: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3166: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3167: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194830 (0x433ee30e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:12 2025 Not After : Thu Nov 28 11:51:12 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:33:3e:94:05:3e:d1:b5:c5:ec:1d:dd:9f:a5:1d:6f: 5f:8f:5c:71:59:f4:2e:2d:25:29:b6:b5:42:cc:69:9b: 79:78:6d:56:8d:87:4b:22:ce:f3:4b:3f:c8:af:74:d7: 43:2e:02:05:c1:8d:b5:f7:72:98:36:cc:e7:c6:84:2a: 59:17:cc:84:17:f9:8d:3c:2e:47:2a:d0:95:bb:fc:37: 03:d0:46:10:aa:ed:21:b6:8f:ed:19:64:c3:39:33:db: 17:86:d6:62:8f:04:bc:f4:ce:f4:e9:99:0b:0a:4b:79: de:06:87:7e:7f:ec:9b:0b:60:ec:be:98:a8:fb:b9:1f: ba:25:28:bb:62:5b:a0:53:1e:6c:c4:c4:12:03:02:74: f2:f6:5b:31:41:f6:9c:6d:dd:74:26:61:e5:62:3d:34: 70:ee:f5:94:99:92:6f:af:e7:56:bc:4a:eb:e9:3c:8d: 56:ef:f3:c6:41:a9:dc:41:3b:48:77:c1:69:13:be:7f: 57:3c:20:c9:8e:24:39:93:d7:3d:51:87:1f:e0:83:91: b1:d9:00:ca:1c:c5:7f:ba:dc:89:bd:0d:6b:aa:42:10: d7:45:49:71:df:6f:82:0d:1b:3b:c3:31:c0:53:a6:a3: a5:ae:d4:53:dd:bb:1e:f1:16:fa:20:a6:50:b3:b2:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:c8:52:bd:df:26:aa:65:e4:00:47:a3:ef:a7:c5:f1: 6e:43:b7:b2:bb:3f:c8:51:7c:3e:57:99:33:b9:67:75: d2:70:a6:f4:d8:59:6c:6a:da:06:1c:3d:fd:4b:44:62: 22:09:71:0e:5f:16:e6:ac:e6:a7:0a:18:82:1c:7d:ce: 03:f2:7f:01:9c:dd:e1:39:7a:ec:95:05:83:08:f8:89: 54:8c:6e:39:ce:cf:07:36:4a:7e:4f:d7:05:8f:4b:e0: 1c:07:18:dd:ed:c3:71:a4:21:d3:b8:72:fe:27:aa:c2: 78:bd:4c:bf:17:01:34:57:a7:70:00:52:5a:ae:78:9b: 85:55:c0:94:6a:69:f7:e2:1e:fc:bc:8a:b7:a8:0a:84: b4:94:0a:25:92:3e:f9:9f:7a:fc:37:5d:36:95:cc:12: 40:b8:99:6d:3d:cf:1a:94:35:46:16:16:a5:3d:89:cc: 05:12:4c:a7:c7:aa:ea:59:a1:81:ac:ab:bf:dd:91:15: ed:90:7a:68:19:9e:73:99:06:dc:90:ec:d7:16:22:2c: f8:0a:be:78:e8:83:69:2e:75:09:df:35:08:fb:a2:43: e1:b7:7d:29:cc:d0:cf:98:ac:33:e7:2d:4a:cc:62:eb: 1b:bf:8a:f0:29:49:1d:90:82:6e:62:b1:c2:88:a4:8d Fingerprint (SHA-256): 3B:39:09:20:5A:04:53:62:AD:91:8F:08:76:9E:1C:E8:5C:EE:E5:80:D5:8B:50:EB:99:EE:37:26:47:D4:45:D0 Fingerprint (SHA1): DE:21:D7:0D:4A:13:45:56:90:D1:1D:E1:5C:A5:92:A7:D8:B7:09:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3168: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3169: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3170: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194831 (0x433ee30f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:12 2025 Not After : Thu Nov 28 11:51:12 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:46:13:d6:1b:cd:f3:2e:18:93:23:f5:a4:37:68:1a: 49:d5:ab:82:c5:64:92:17:38:b9:47:ad:32:66:c4:44: ee:ca:23:c5:4a:a7:1b:62:28:e8:26:4d:7c:93:ed:77: 23:e2:a2:da:0d:07:d9:a3:b5:f2:b0:e2:54:08:1a:63: ee:f6:2f:38:90:dc:58:63:56:f0:64:1f:e9:21:2c:9e: 29:f8:a4:90:2a:17:86:4d:8e:0f:02:54:a5:bd:5f:f2: a8:6a:6c:89:a3:7e:c3:ce:bc:b0:72:f6:38:cc:1e:61: 2d:3d:a7:ca:87:e7:92:eb:10:ee:10:bb:c5:95:b2:7a: 09:56:a2:5b:3b:e5:ca:a1:24:21:78:28:86:2a:5b:ee: 73:cc:37:5b:76:1a:75:9d:75:ac:af:aa:51:38:92:aa: 1c:d2:f2:3e:00:11:4f:37:8e:68:e9:c4:e1:33:5d:11: ee:be:21:27:f5:64:b9:54:b0:d9:fb:19:a6:04:28:c9: 2d:2a:ab:a5:af:db:25:18:65:7b:4b:23:f4:fc:b5:f5: 60:4b:25:ed:07:9c:f3:d8:50:29:63:0b:af:71:7b:4a: e4:7a:15:70:ee:74:ce:77:af:60:1d:3f:73:cc:72:b4: 87:07:77:c8:04:9c:44:32:96:02:7f:3e:1d:54:7f:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:01:ce:33:88:9d:a3:d3:4f:e3:b6:39:d5:24:fd:ce: dd:75:a8:b3:e8:23:08:d1:d1:55:4a:f0:5d:ec:bc:eb: 15:b3:74:f1:b4:cd:9f:65:fc:cc:f7:66:b5:da:83:61: 62:4b:f8:70:1f:05:06:92:dc:f2:58:ae:8c:80:89:fc: ba:79:ef:84:63:62:5a:b2:c6:81:29:3c:54:df:f4:ae: 49:8c:6f:14:3b:ea:5c:be:a0:31:20:be:a2:ac:92:79: dc:e4:4b:3d:90:06:0d:48:dd:14:1b:3d:8c:0a:76:8c: 55:39:d6:3a:68:49:68:db:60:e3:79:d0:ce:ad:1f:77: d1:cf:0a:f8:29:00:4e:f6:f2:52:70:d3:ff:4e:bc:8e: 1e:1a:97:68:08:7e:7c:78:1b:8d:b8:7d:fe:8f:b8:80: 47:01:89:fd:68:a6:6c:5e:ce:ea:b3:d7:f6:52:ce:f8: 68:2b:10:ae:62:f9:d6:ab:6c:03:14:8b:a5:a5:c9:75: 53:d7:37:48:8e:99:01:72:03:84:32:92:d6:b5:5b:10: 05:a2:51:dd:89:7a:43:bb:6b:c8:fe:fb:2a:61:6b:e8: 39:0e:a0:e6:8a:49:11:53:b6:dd:3a:a0:f5:1c:f5:e4: 80:62:9b:03:b3:0a:49:76:69:1e:cf:59:da:bd:f6:6c Fingerprint (SHA-256): 81:AE:05:2F:3F:5A:7E:0E:BD:FA:3A:D0:C0:B7:F0:6A:A5:8B:03:2D:B3:26:01:86:01:1E:FF:3A:B5:BA:6B:70 Fingerprint (SHA1): 58:94:8D:85:83:E7:5B:52:E1:BF:AE:2C:52:D6:BB:54:28:A3:FB:15 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3171: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3172: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194832 (0x433ee310) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:51:13 2025 Not After : Thu Nov 28 11:51:13 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:65:9b:e2:cd:04:51:7a:3c:40:c7:32:cb:66:d7: f4:3b:c2:8a:b9:1e:f2:ed:8f:53:03:db:2d:c3:8a:38: 42:95:c4:24:95:b6:7e:08:a7:1d:22:de:ae:36:01:05: b6:5f:6e:4d:70:a0:fd:2d:f8:7f:72:d8:86:bf:ce:36: 91:1a:b2:61:f8:d9:46:d3:fe:be:48:76:e1:6b:99:b4: f3:64:95:40:01:17:d3:42:c6:30:4e:9a:af:5b:61:96: a9:83:ad:85:d7:cf:61:00:32:5e:8d:ba:85:2c:7c:ad: d2:bf:3f:c1:81:ab:d7:05:04:52:89:c8:55:92:ce:16: 63:92:50:ec:e1:53:b8:39:2b:03:ca:b5:0e:38:6b:12: 18:b0:27:3c:77:36:fa:6f:77:f8:5e:15:aa:35:7f:8e: 20:98:97:8d:f9:4b:c6:4f:7b:e1:5c:22:c3:05:b1:46: 49:90:f6:11:86:f9:a3:20:60:03:6a:b4:a0:aa:f1:c3: 8b:44:bd:87:2c:c7:88:d4:da:ad:a7:bb:31:fa:87:18: 27:a4:01:53:43:04:d2:6c:95:c4:f8:c9:8e:b3:1d:4b: 49:fd:b8:cd:8f:72:90:6d:88:67:66:a6:95:fc:37:89: 4c:9d:8d:30:bd:d0:45:f9:d7:be:52:eb:2f:62:7b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:51:8d:1f:cc:48:20:a0:ae:e6:a7:eb:a9:91:73:f9: ca:aa:85:9c:02:14:54:85:e5:25:51:5d:ba:7e:38:4a: 06:9b:03:28:fd:22:f3:6f:90:c0:ae:05:4a:f6:55:19: c6:57:37:c7:de:df:c5:90:c0:f8:db:0f:ee:0e:f8:0d: 3d:63:72:f2:51:fd:ba:1a:95:bc:22:5f:65:66:75:a2: a8:b5:11:59:11:82:9e:2f:05:91:e0:22:70:3d:3a:a5: 4a:5d:28:a2:c5:70:98:46:d3:1c:74:b5:52:87:06:91: 88:4a:c5:61:b8:e2:e3:a0:1a:08:ac:15:d3:bc:e0:23: 75:d9:d5:8b:6c:de:8e:7a:18:87:6d:9c:20:0f:10:2b: c3:71:24:c6:a9:4c:99:64:57:96:de:f0:1a:e4:58:ed: 28:87:5f:db:b1:f2:44:ba:66:2f:a9:2e:94:b4:58:a1: a7:77:e3:d9:0e:10:3a:df:09:bc:ef:8d:c8:5e:c3:65: 43:64:0f:cc:13:3c:50:d9:47:83:5f:d7:c2:34:68:1c: 52:ae:77:38:71:20:da:0f:ee:a0:91:4e:d3:97:cb:93: fb:da:3d:21:b1:ee:f5:9f:a5:96:59:cb:b8:90:59:73: 34:c2:18:12:23:a7:19:2b:b9:2b:06:84:ac:8f:16:7b Fingerprint (SHA-256): F6:1B:8B:DE:F0:6D:89:3F:39:96:E5:16:42:AD:39:E4:86:EC:3E:04:DB:E8:25:8D:68:69:A7:B1:C2:F6:EB:A5 Fingerprint (SHA1): 7B:9E:D8:AF:D5:00:C7:7E:D0:A5:D0:1A:7C:2F:29:CC:1D:D8:20:85 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3173: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3174: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194834 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3175: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3176: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3177: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3178: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194835 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3179: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3180: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3181: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3182: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194836 --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3183: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3184: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3185: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3186: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1128194837 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3187: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3188: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3189: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3190: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1128194838 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3191: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3192: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3193: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3194: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3195: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3196: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3197: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194834 (0x433ee312) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:15 2025 Not After : Thu Nov 28 11:51:15 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:0d:7d:a7:32:dc:a9:2a:e9:21:b2:4f:60:77:89:22: 8c:ea:c5:75:2f:b3:e0:3f:ce:ee:a9:51:85:2d:f6:a1: 71:9a:4d:fe:5a:7d:84:de:52:46:3f:84:0c:5e:bd:40: 9f:a4:2a:8c:a8:14:4f:7d:de:f0:87:09:0d:1d:85:8d: 00:3a:c2:8f:65:f4:7d:80:bb:ff:9f:15:08:bc:43:cc: 6e:c9:e1:b8:11:a1:c5:e8:b6:f3:76:32:bb:f0:b6:70: c5:86:8b:7e:68:dc:b5:f3:1c:a1:a3:b3:33:1f:04:47: af:ae:b2:05:36:7c:bf:78:6a:71:31:6e:2e:33:9d:62: 38:4f:3b:8e:61:d0:f0:2d:48:18:f6:8c:ee:3c:11:eb: 96:1a:8e:96:65:0f:59:f8:3c:9a:49:a7:2d:aa:4e:e4: 68:54:20:6e:26:ce:7f:04:10:82:99:0f:80:21:e4:c6: 4b:69:8a:14:00:49:62:d7:aa:9d:74:31:84:04:47:29: 49:81:40:82:e2:e3:ad:c3:ee:58:cf:5c:2c:8c:8c:ee: 14:73:93:66:ce:a3:4e:a6:9f:8c:e1:55:74:8c:98:83: 21:1f:77:c1:27:fa:42:29:a1:f6:cb:48:5c:a1:b3:c3: f0:f7:c6:83:16:e8:66:81:83:f7:45:8b:0d:85:d5:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:1e:c3:a1:af:50:55:3a:05:be:ff:80:be:c5:fc:3a: 9c:ca:86:cb:a6:9b:c3:47:33:cb:b8:3b:f2:e1:79:4f: e5:ec:9f:23:a8:73:7e:e3:11:50:e4:6a:51:4e:40:19: 14:2f:47:22:7d:54:69:ef:9a:92:9d:fb:2d:c7:d0:9c: 11:01:5a:ee:4b:2c:b8:21:6d:6c:55:db:6d:ed:02:3b: b1:0a:07:a3:7a:a6:17:e6:26:4b:b4:2b:55:4d:ed:09: 4e:06:ec:5b:3a:58:0d:ef:a7:84:9b:00:70:d1:ff:56: a8:0f:d5:e7:62:02:37:f3:c6:27:7e:07:ba:9c:36:90: d2:83:ef:3c:32:cd:a0:19:0c:5d:18:25:ae:1d:87:27: 25:b7:08:ce:eb:77:ad:3a:5b:6c:f6:b8:92:91:d5:04: d4:7f:3c:27:fc:bc:77:3e:4b:2f:e8:51:ed:7b:e0:e2: 0e:df:53:ca:b2:ed:89:a5:d6:ce:d1:60:dd:05:b1:45: e3:93:1e:d9:37:e1:db:2a:91:f2:da:0f:d6:cc:6e:01: fa:e9:62:97:e4:28:64:d9:22:b0:14:83:c3:5c:06:4a: ee:32:7e:b0:df:48:7f:65:db:94:fe:4c:9b:38:19:37: 2c:f3:f8:53:76:da:9c:6a:65:6f:f1:62:29:ed:db:c6 Fingerprint (SHA-256): 28:47:C3:73:30:29:B8:F7:A2:CE:34:50:15:5F:8B:0F:C7:6E:16:F8:19:75:6B:B0:2C:DC:84:06:FA:4F:4F:5F Fingerprint (SHA1): D8:90:C7:23:5A:34:31:FD:95:31:ED:4A:4A:5E:C8:5E:EC:E7:19:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3198: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3199: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194835 (0x433ee313) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:15 2025 Not After : Thu Nov 28 11:51:15 2030 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:42:39:61:11:d1:1d:82:db:3c:a4:20:46:f3:ca:98: 7c:41:fb:51:44:2d:fa:4c:a0:9e:72:29:de:81:2a:ba: 55:3b:16:7a:1a:e9:9b:91:fa:12:05:cf:ad:93:d8:94: 73:04:bf:34:a5:5e:57:7c:98:bd:22:bb:b7:fc:4f:4e: 9a:96:7a:b6:93:03:29:c8:c1:31:66:2c:09:5c:41:af: 68:d5:9f:64:d6:22:d5:2c:c9:b8:b6:75:9f:09:f2:01: 96:59:1a:21:84:15:ee:36:10:a3:53:91:df:3a:90:19: 1c:2e:e5:06:8b:23:fd:74:f0:34:d8:f1:fd:4b:13:12: be:15:ff:af:b4:a3:c8:28:f4:ed:ac:8e:b3:fe:3b:57: cb:14:99:25:65:45:60:11:c5:c3:ea:cd:00:d1:de:bf: b2:71:f3:a9:ce:5d:bf:a2:aa:39:c3:fe:74:cc:ef:11: 8d:3b:c5:f9:31:10:7f:e0:cc:1c:3f:b5:90:ec:c1:2d: c6:54:23:75:55:83:5e:0a:ac:86:13:f4:07:a2:67:7b: 06:2e:f9:b8:3e:a8:95:83:0e:61:92:bb:27:ad:f4:a7: 8f:b1:c3:ff:ce:f8:7d:d7:ce:d5:98:3f:4c:77:25:11: 05:86:13:c7:40:e9:9b:d6:51:0a:2b:af:fa:a7:87:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:5e:f5:19:75:c1:7c:09:d8:ea:4d:19:10:8d:98:ec: b7:4f:b0:50:39:4c:98:fc:5a:b3:12:1f:66:ae:84:f9: 3a:54:15:11:cd:5b:17:ab:37:83:70:53:a3:fa:9a:f7: 8f:0c:5d:ed:f9:a8:e8:d7:3e:9e:d5:19:e9:ba:15:64: d8:b0:c7:12:a7:c4:07:a7:0d:fe:f9:19:14:e0:ae:17: 0a:f0:50:94:6c:90:39:eb:71:8d:68:fd:e9:b8:d4:2b: 6d:2e:7d:67:be:95:5d:91:93:5e:7b:25:0c:92:42:03: 5b:60:f4:02:23:02:e8:62:c5:88:88:6b:32:33:9f:a6: c5:ca:1f:6b:83:b8:93:f6:23:2e:b3:d4:da:a1:dd:d6: 34:f2:86:7d:35:ce:8c:ee:22:2d:07:b8:d5:d1:da:b3: 2a:fb:21:82:ee:0b:da:8a:87:5b:71:d3:4e:a4:90:e4: 76:70:51:bb:4d:c8:04:43:86:ef:06:b6:8b:0c:77:e1: 3e:ed:18:cc:4d:bb:83:3f:4f:54:9c:32:ef:46:59:d4: 70:09:1f:a7:d2:2c:c1:62:39:41:2d:b5:86:bf:9d:5e: 6d:3f:4a:ce:91:5e:8d:78:19:89:94:1d:75:f3:e3:7f: 7f:9e:eb:72:16:48:bc:58:bd:54:a5:f0:39:01:d8:3c Fingerprint (SHA-256): B7:18:2E:7D:9D:53:17:AF:AF:AC:72:C9:02:3B:7A:21:C3:07:41:85:5E:58:CB:29:36:94:FF:18:83:D5:05:14 Fingerprint (SHA1): 09:AB:09:D5:28:0C:03:2C:54:13:0C:20:F4:E4:89:A3:82:5E:3C:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3200: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3201: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3202: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194836 (0x433ee314) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:51:16 2025 Not After : Thu Nov 28 11:51:16 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:33:32:a4:b0:14:09:76:77:9d:1b:f4:f0:2f:f2:eb: 4a:6e:a8:a1:fd:08:31:0d:93:bf:dd:22:1a:4d:8c:70: 5f:2b:6d:59:c7:49:a1:08:5e:e9:59:8c:46:c9:a2:a4: 8d:7e:91:fb:b6:51:1a:63:a6:cb:db:d1:25:c4:c9:98: d7:e9:66:e5:ab:3c:68:b1:dc:ac:de:1e:fb:3b:ac:b3: 4a:20:b9:c8:bb:14:20:c7:7b:af:18:e1:a3:4d:13:4f: e8:90:f3:37:71:7a:7b:eb:79:8a:1b:fd:21:74:df:5a: 98:90:ed:12:c2:a1:8a:29:d7:03:df:e9:83:07:a7:f8: 2a:b1:e5:ca:40:9c:43:1e:fa:ca:e9:ac:49:b1:12:a5: 60:96:29:ca:a6:56:d9:33:58:c4:e5:1e:a5:c1:bb:0c: 3e:a2:cd:3d:1a:21:5b:c0:a2:3a:9a:86:40:01:bc:7b: 32:e4:97:f4:5e:05:c0:20:f6:2a:bc:ed:d6:be:9e:e8: 54:e0:41:7e:22:bc:d2:b1:50:84:fb:50:28:0e:c7:b4: 51:22:f6:1b:1b:90:06:c9:21:50:8d:dd:39:82:5c:f4: 08:be:48:ec:ce:1a:68:a7:2d:c9:f5:13:14:2a:a9:31: 0d:b4:82:9f:3a:84:3e:00:65:25:de:26:95:9d:d7:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:22:7e:ff:cb:50:2c:db:4f:c5:f7:05:cb:1d:ee:c2: fc:d6:2c:b0:00:4e:04:3f:1d:fb:37:1b:63:3b:0c:e1: a5:19:89:19:27:27:b7:44:fa:00:a9:b3:10:eb:bb:00: cf:81:db:1e:d1:4a:4d:c5:5e:30:9d:aa:b2:e4:03:cd: 51:bd:bf:85:cb:67:40:1c:91:43:83:a8:b0:ef:95:20: 89:a4:18:e9:dd:23:88:4e:a4:83:3b:5e:54:2a:0c:73: b5:a0:e3:1a:95:ce:c9:50:29:41:b7:0e:99:c6:45:59: 77:70:4c:4b:7d:04:08:90:ea:c5:1c:3c:29:68:d3:8f: b3:77:38:fc:94:dc:d8:29:a3:0f:7c:55:68:cf:52:42: 14:2a:6c:39:34:3b:e5:16:63:2a:5a:05:70:82:a7:f1: b7:8f:46:88:9e:48:b2:1e:c4:31:56:d3:30:59:7f:61: e9:f9:04:f3:c6:12:87:2a:58:f4:0f:a1:66:c9:d8:50: e4:cc:dd:9a:7c:cd:19:fa:6b:dd:10:7e:f7:f6:80:37: 59:ad:04:c6:c1:ac:2d:52:60:a7:b1:75:28:9f:f8:16: 0a:94:ea:b0:db:c3:8d:38:3a:41:b4:46:64:82:3f:53: 91:b0:04:84:67:97:04:ee:e4:2a:dc:86:84:78:f5:fa Fingerprint (SHA-256): 8A:B6:98:36:66:D5:58:C7:D5:DB:37:8D:BF:0C:64:B1:84:8E:43:1D:A6:B8:E4:93:22:A0:7E:00:F0:39:A2:58 Fingerprint (SHA1): 58:74:CD:CC:B6:5B:F1:53:4C:5A:D1:E0:DF:57:79:DE:CB:8D:95:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3203: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3204: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194839 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3205: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3206: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3207: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3208: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194840 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3209: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3210: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3211: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3212: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194841 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA1Root-1128194342.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3213: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3214: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3215: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3216: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1128194842 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3217: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3218: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3219: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194839 (0x433ee317) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:19 2025 Not After : Thu Nov 28 11:51:19 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:3f:1d:75:2b:6c:1d:60:7a:b2:ac:66:b5:a3:f3:12: 65:a2:04:94:72:32:3e:f2:9d:73:9c:c6:2a:05:06:18: 33:90:97:bc:54:6a:9e:68:75:ca:d2:fe:1a:16:65:fa: a4:2c:60:0c:11:6d:65:1b:c8:26:25:f5:4c:42:b3:ef: f7:33:bc:f0:88:78:bc:38:3b:50:bd:21:a5:3c:35:b0: 86:dc:73:27:fc:0a:d6:a3:b0:22:40:ab:e1:4c:b1:3c: 55:e7:8d:12:19:82:03:06:99:0d:00:de:76:38:44:1e: fc:06:1e:3b:34:8f:cd:4f:ab:12:4b:a7:86:c4:a4:59: ca:a9:6a:49:a0:c7:eb:94:7f:36:76:47:6a:e8:6e:3c: 4a:2e:5a:f3:d4:53:3e:41:14:5f:06:af:2f:a3:f0:6f: b9:ed:90:a5:85:e2:04:3b:5a:35:97:52:01:e1:18:33: 58:b0:00:a2:97:83:60:06:06:71:c9:38:b1:5a:b1:be: 78:56:54:17:0d:2a:e6:8d:ac:9d:a6:9c:e2:ed:da:bb: f0:07:7a:d9:31:1e:cf:4f:28:62:d2:39:dc:a6:cb:f5: 6e:50:50:02:85:71:30:67:02:b7:63:7b:68:3c:ae:5e: 31:f2:53:1d:0b:75:ab:b9:74:a1:b5:9e:04:7a:b0:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:b8:e2:2b:2f:73:01:56:4e:87:b6:3e:fd:91:36:93: ae:c4:99:ba:bb:91:a1:69:0a:e9:04:de:a7:46:f2:41: ca:7e:44:56:fb:10:e9:b5:96:ff:aa:ee:ea:9d:f0:af: 51:88:4c:90:13:b7:b3:79:c0:36:50:b2:98:e1:a7:9e: 14:f4:11:62:a7:0a:e4:30:5d:4c:25:18:e5:0b:b8:77: 2e:c8:32:cb:69:1b:16:93:81:6f:b5:79:1c:b8:96:d4: a6:02:f4:95:57:2c:a3:19:2e:a0:32:3f:02:12:4b:4e: c8:c3:4d:49:ff:86:53:de:42:0f:b3:ea:9c:5c:af:b9: 5d:5e:91:81:56:ed:25:aa:a2:35:98:3f:9a:9d:72:74: 4f:ef:6b:3c:c4:e0:97:ce:ab:d6:73:be:94:51:bd:2d: 46:ea:4f:b2:b6:17:2a:d6:1c:27:13:82:62:36:f6:08: 2b:e5:ae:2b:78:38:bf:5f:dd:de:c9:74:88:30:97:31: 02:66:28:65:9f:f8:64:8a:f3:33:37:9a:86:de:2d:a5: 73:f9:fa:5c:99:70:17:a7:b3:ec:c7:e0:7a:1f:00:e6: a7:40:cd:9f:2e:9a:0e:3a:cf:dd:f4:10:9e:a9:31:09: b4:af:b6:06:bf:8c:67:2f:70:8f:08:ef:40:2a:4a:6a Fingerprint (SHA-256): 81:32:6C:A2:3C:71:9E:54:7B:0D:35:02:21:B7:25:CC:03:EB:84:53:88:17:DA:76:88:E8:82:D6:EF:5F:C8:D9 Fingerprint (SHA1): FE:6B:81:3C:F7:87:82:EE:4C:3C:09:C1:B2:D8:71:38:CF:FA:8C:FB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3220: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3221: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194843 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3222: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3223: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3224: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194844 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3225: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3226: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3227: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3228: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194845 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3229: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3230: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194846 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3231: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3232: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3233: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3234: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3235: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194847 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194343.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3236: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3237: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3238: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3239: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194848 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3240: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3241: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3242: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194843 (0x433ee31b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:51:23 2025 Not After : Thu Nov 28 11:51:23 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7f:05:9e:16:23:67:ae:80:df:89:3c:b1:20:6d:aa: 43:79:a3:86:0a:e0:a0:7e:db:3c:cd:bf:a4:46:d0:e3: 6b:bf:8f:ac:76:fd:10:09:62:c9:12:ce:ef:2e:9b:f8: 6b:81:36:ac:ba:93:8e:5f:6f:97:40:7e:85:75:ba:a6: 1d:a8:d5:ed:db:96:4b:bc:d3:02:ae:5f:f8:6d:cd:06: b8:10:cd:20:f1:98:0d:29:15:97:71:3d:80:22:ef:55: c7:6a:ef:b4:7f:35:fb:96:9f:2e:63:03:b5:47:96:ba: 01:19:cf:cf:2f:dd:3f:c3:34:08:12:df:4a:71:08:ad: cf:01:b5:ea:fa:bf:c3:c7:90:21:43:c0:7d:d9:63:c1: 4c:55:57:6a:6f:f2:f9:09:5f:db:42:8d:40:28:b1:25: 0c:15:f0:69:5d:3e:dc:ef:65:b7:a0:9c:a2:55:e2:f3: 1d:b3:b1:6c:6a:11:6d:65:bc:39:11:26:7f:a0:b8:3b: 34:91:98:b5:b4:76:a1:11:c6:93:2d:ad:da:13:ac:bb: c0:fd:c4:0c:c7:49:f3:47:00:93:54:8a:2e:49:18:87: c0:eb:0d:46:a3:bc:61:34:34:c0:6b:55:ca:50:a7:60: 46:0e:59:75:ed:1d:6b:0a:1e:9e:31:32:21:75:80:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:6c:0e:05:2b:0c:16:19:46:c2:46:60:41:4a:b3:04: fe:03:fa:55:8c:c7:5e:fb:95:0f:43:0c:c1:88:62:ce: b8:3b:4e:c5:84:12:cd:25:c1:4a:e1:87:a4:24:2f:18: 38:8d:25:90:7d:72:62:5b:14:6c:b9:9c:a1:c7:20:93: 8c:90:c0:9d:bd:01:79:02:23:ee:37:84:e8:14:09:79: 6b:82:c6:ef:6f:7c:70:d1:bb:06:c6:9c:9a:90:cf:88: f7:6b:fb:84:fd:74:11:c3:f3:b9:15:d0:c1:55:16:65: 43:a2:71:5d:57:a7:9b:04:c8:36:f6:b4:f0:54:76:0f: b2:f8:07:06:4e:c8:c6:ee:28:92:d3:da:2e:da:a6:6e: 14:e9:c2:96:e4:b3:0a:ff:64:a0:ca:ea:ed:d0:42:38: ca:e6:79:39:a8:2e:c2:75:bc:22:d7:b8:08:46:0c:70: 16:9e:e3:db:13:db:f1:a6:51:22:52:84:d4:f4:85:91: 53:76:d7:fb:47:7b:2d:70:05:24:91:70:35:0b:76:66: 57:48:d5:8c:91:4b:96:af:9d:fb:35:b2:d6:bb:d4:0d: 25:f0:d9:d7:cd:28:ee:ec:3e:8f:1c:ee:9b:ed:07:83: ca:09:e7:04:6c:64:73:86:6d:5f:c9:11:c6:67:89:54 Fingerprint (SHA-256): F8:99:8E:37:C6:20:94:FA:88:20:C8:5D:BA:6E:5C:EE:D0:C9:6E:CC:BC:6A:F2:29:69:BA:BD:F2:E5:62:D9:BB Fingerprint (SHA1): 1D:BD:56:14:59:B9:36:9A:CB:0A:DF:5B:06:8A:89:F0:39:C0:63:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3243: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194844 (0x433ee31c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:23 2025 Not After : Thu Nov 28 11:51:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:b8:b9:30:55:f9:ca:57:1b:e7:8a:06:37:f7:2b:c4: 04:6e:52:4b:4f:7f:50:c1:52:e7:cd:5a:42:76:36:07: 45:c0:d3:67:8f:5e:57:74:d0:7d:69:75:d6:df:fa:0e: 7f:a2:25:c8:b4:53:dd:29:a2:ca:f5:dd:d3:5a:d1:64: 1e:06:f9:0d:5e:85:0c:9e:db:0f:9c:56:e4:fd:2e:7e: 05:ba:b8:1f:40:f0:d9:e6:69:aa:93:df:35:f7:65:95: 65:95:0c:9e:de:21:19:9d:ae:a0:0f:e1:e1:f1:b7:2f: 20:9a:9f:aa:41:0e:ae:fc:ce:42:02:fa:fd:4e:56:66: b6:25:20:f4:27:72:09:66:f6:92:a6:34:33:e1:fc:fb: e9:4a:ab:53:68:b0:2b:6e:06:b2:91:0a:08:37:41:03: d1:7b:9e:eb:9b:fb:5a:83:1f:ed:59:f0:8e:7c:7e:f7: a1:73:22:8c:4b:e3:80:83:80:1b:6a:3c:3f:c5:3d:3d: e6:31:5f:66:e2:a0:20:82:3b:7f:43:ad:74:a5:41:9a: 59:bc:0b:dc:20:7e:8b:a9:fd:d7:ac:12:02:77:ee:b0: c7:4c:41:80:ad:60:62:49:f6:77:13:6a:14:a7:3b:0b: 3b:15:83:1d:5e:82:7c:a5:e3:8d:a1:f1:96:21:f3:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:88:b6:aa:4d:58:a7:51:42:b8:70:10:aa:19:a4:57: fb:22:12:06:9c:a8:34:22:3d:45:32:81:92:5b:e9:24: f4:fd:3e:45:89:62:89:41:1b:3c:3b:2a:1c:82:56:57: 35:17:1c:6f:ff:23:e7:3e:de:c3:ea:9c:95:d0:dc:da: a3:f7:da:d4:88:bc:88:8c:f7:5c:f1:27:ba:41:71:5d: 21:c8:3a:9c:df:91:72:fa:6c:9b:dd:67:a2:d7:99:86: 94:52:ff:e8:96:a1:52:07:13:e1:f3:b0:10:3d:35:b7: 64:cd:3d:04:7c:82:2f:bd:42:1a:2c:ec:df:f8:ea:3b: 5f:ff:f5:57:23:5a:30:9a:96:6a:e8:46:f1:c3:d5:45: ac:00:de:9c:e7:78:e7:fe:d6:46:30:16:ca:c8:cc:ee: 9e:04:e8:1e:6a:18:99:ed:3d:b1:93:4f:79:52:e5:ce: 15:e5:eb:a1:3c:2e:b6:0b:14:b0:99:62:4b:08:c0:2a: 95:1d:a8:d6:d4:14:5f:aa:18:e9:d9:72:d1:bc:73:91: 26:cf:d7:91:8b:f8:83:06:2a:bb:e7:68:94:2b:c6:6e: 39:64:95:64:3b:29:05:7a:d9:66:e7:7c:da:52:1f:f7: 70:f8:12:41:b1:16:7f:3c:b3:c1:0c:56:a6:16:97:46 Fingerprint (SHA-256): A4:7F:D8:6D:B5:54:0E:F5:D9:FF:B5:02:0A:5F:8A:4D:7B:F6:B5:81:D8:34:0B:8A:26:A5:55:18:66:82:7C:3F Fingerprint (SHA1): C9:15:BE:A0:08:2C:CC:51:FF:4E:B6:FE:72:CE:B6:A3:82:67:2D:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3244: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194844 (0x433ee31c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:23 2025 Not After : Thu Nov 28 11:51:23 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:b8:b9:30:55:f9:ca:57:1b:e7:8a:06:37:f7:2b:c4: 04:6e:52:4b:4f:7f:50:c1:52:e7:cd:5a:42:76:36:07: 45:c0:d3:67:8f:5e:57:74:d0:7d:69:75:d6:df:fa:0e: 7f:a2:25:c8:b4:53:dd:29:a2:ca:f5:dd:d3:5a:d1:64: 1e:06:f9:0d:5e:85:0c:9e:db:0f:9c:56:e4:fd:2e:7e: 05:ba:b8:1f:40:f0:d9:e6:69:aa:93:df:35:f7:65:95: 65:95:0c:9e:de:21:19:9d:ae:a0:0f:e1:e1:f1:b7:2f: 20:9a:9f:aa:41:0e:ae:fc:ce:42:02:fa:fd:4e:56:66: b6:25:20:f4:27:72:09:66:f6:92:a6:34:33:e1:fc:fb: e9:4a:ab:53:68:b0:2b:6e:06:b2:91:0a:08:37:41:03: d1:7b:9e:eb:9b:fb:5a:83:1f:ed:59:f0:8e:7c:7e:f7: a1:73:22:8c:4b:e3:80:83:80:1b:6a:3c:3f:c5:3d:3d: e6:31:5f:66:e2:a0:20:82:3b:7f:43:ad:74:a5:41:9a: 59:bc:0b:dc:20:7e:8b:a9:fd:d7:ac:12:02:77:ee:b0: c7:4c:41:80:ad:60:62:49:f6:77:13:6a:14:a7:3b:0b: 3b:15:83:1d:5e:82:7c:a5:e3:8d:a1:f1:96:21:f3:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:88:b6:aa:4d:58:a7:51:42:b8:70:10:aa:19:a4:57: fb:22:12:06:9c:a8:34:22:3d:45:32:81:92:5b:e9:24: f4:fd:3e:45:89:62:89:41:1b:3c:3b:2a:1c:82:56:57: 35:17:1c:6f:ff:23:e7:3e:de:c3:ea:9c:95:d0:dc:da: a3:f7:da:d4:88:bc:88:8c:f7:5c:f1:27:ba:41:71:5d: 21:c8:3a:9c:df:91:72:fa:6c:9b:dd:67:a2:d7:99:86: 94:52:ff:e8:96:a1:52:07:13:e1:f3:b0:10:3d:35:b7: 64:cd:3d:04:7c:82:2f:bd:42:1a:2c:ec:df:f8:ea:3b: 5f:ff:f5:57:23:5a:30:9a:96:6a:e8:46:f1:c3:d5:45: ac:00:de:9c:e7:78:e7:fe:d6:46:30:16:ca:c8:cc:ee: 9e:04:e8:1e:6a:18:99:ed:3d:b1:93:4f:79:52:e5:ce: 15:e5:eb:a1:3c:2e:b6:0b:14:b0:99:62:4b:08:c0:2a: 95:1d:a8:d6:d4:14:5f:aa:18:e9:d9:72:d1:bc:73:91: 26:cf:d7:91:8b:f8:83:06:2a:bb:e7:68:94:2b:c6:6e: 39:64:95:64:3b:29:05:7a:d9:66:e7:7c:da:52:1f:f7: 70:f8:12:41:b1:16:7f:3c:b3:c1:0c:56:a6:16:97:46 Fingerprint (SHA-256): A4:7F:D8:6D:B5:54:0E:F5:D9:FF:B5:02:0A:5F:8A:4D:7B:F6:B5:81:D8:34:0B:8A:26:A5:55:18:66:82:7C:3F Fingerprint (SHA1): C9:15:BE:A0:08:2C:CC:51:FF:4E:B6:FE:72:CE:B6:A3:82:67:2D:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3245: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3246: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194849 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3247: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3248: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3249: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194850 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3250: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3251: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3252: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3253: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1128194851 -7 Bridge@Army < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3254: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3255: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1128194852 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3256: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3257: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3258: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3259: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3260: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194853 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-Bridge-1128194344.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3261: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3262: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3263: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3264: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194854 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3265: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3266: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3267: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3268: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194855 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-BridgeNavy-1128194345.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3269: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3270: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3271: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3272: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194856 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3273: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3274: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3275: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194849 (0x433ee321) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:51:27 2025 Not After : Thu Nov 28 11:51:27 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:05:0d:7e:56:eb:a6:46:0d:f4:b4:d6:ae:25:14:5f: de:e0:18:c7:ff:36:f8:03:0a:c7:06:40:7c:6a:0d:53: d6:a6:a4:7c:36:e0:fd:a5:9a:b5:26:64:a5:3d:97:97: 8e:9c:5a:5f:b3:79:e8:7a:70:c1:7b:b1:6b:40:e7:de: 20:04:e3:1f:3c:8d:4f:b2:d7:03:bf:af:56:28:ab:1c: 1c:c8:51:6e:7c:e8:50:3b:7b:db:cc:95:80:f6:df:40: 23:02:83:ea:65:07:73:eb:51:cb:1d:43:59:1b:b0:ce: 53:86:8c:10:21:e3:c1:15:2e:19:5c:c6:5e:e1:7a:14: cc:de:80:60:d2:29:b5:fe:8e:69:0e:a9:f2:e7:2b:88: 44:c0:7a:fb:8b:e5:59:6d:43:5b:c3:ea:21:70:0c:59: f2:6c:ad:3e:fd:40:d9:68:c0:ef:63:20:52:89:b6:81: 12:8c:ee:74:df:08:3e:82:50:e4:12:42:2b:33:49:29: c8:0b:f0:47:67:ce:54:fe:8c:db:ca:15:1c:98:d8:3e: 6f:fc:f5:13:ef:3b:9b:57:72:ad:a3:10:a8:69:ee:4f: 66:b8:7d:c4:59:98:93:b6:16:31:fb:f8:2e:24:d5:99: 91:2b:50:3d:98:91:62:e4:a1:fe:07:94:35:49:80:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:c3:ea:e8:41:40:59:71:73:8a:ce:4f:a6:14:04:c3: 27:aa:e0:23:3f:47:cb:a7:46:5f:76:29:3c:c9:ab:dc: 47:d2:48:20:d8:c9:9f:ed:f2:ad:41:da:c8:08:82:4b: 52:ec:11:51:92:0e:9d:08:60:0b:0a:89:a2:8b:34:6b: 01:75:87:25:2c:e9:16:38:1f:61:08:29:4d:7f:ea:5f: 4f:06:5a:5c:89:98:29:db:00:69:62:92:90:68:d0:83: 38:1f:13:f9:9d:9d:b7:3b:c6:15:cf:43:31:65:43:cb: bf:ce:43:d6:ff:e9:40:78:91:9b:9d:13:72:b4:cb:b5: a1:c6:d5:44:b8:55:b2:bf:a1:04:a9:c9:fe:f2:58:e8: c9:af:5f:ea:17:51:85:af:f6:ce:ae:ba:d8:67:d4:76: 37:27:2b:9b:7d:fb:c5:99:5a:3d:1f:da:fb:7d:6c:96: 83:1f:5a:9c:fa:8f:d2:e2:6b:47:f0:d1:b0:21:bd:87: 83:4a:71:0a:d5:a0:22:51:e4:73:6f:60:d8:b2:7a:3f: ae:20:ed:72:46:c4:92:f8:c1:64:35:ea:e8:da:53:ae: d1:ff:2b:70:62:50:42:d7:4c:76:00:b5:35:57:1c:33: 6d:9b:50:7c:05:ba:e8:fb:84:f9:16:ec:bc:5b:9b:17 Fingerprint (SHA-256): 69:A3:FE:9A:DB:A7:80:61:82:D4:29:9D:45:71:63:D9:BF:D9:2C:CB:9D:FB:B6:01:CE:BF:6D:5F:20:86:21:EB Fingerprint (SHA1): 02:B5:2B:9F:52:E9:C0:E4:5F:06:D6:30:83:94:F6:FD:39:24:50:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3276: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194850 (0x433ee322) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:27 2025 Not After : Thu Nov 28 11:51:27 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:3f:c0:63:09:63:0d:25:4a:90:75:8c:8b:1f:a3:c0: 27:1d:39:c3:83:13:1c:80:28:2c:1c:3e:ce:0d:23:e9: 26:d7:1b:ff:b4:96:3f:9f:59:6c:25:90:60:98:84:5b: 06:25:b4:64:7f:88:fd:cd:65:bb:e1:f1:0d:9b:aa:a2: af:10:c9:0a:fb:bc:55:ca:71:6a:5f:e8:f0:fd:85:15: 3f:11:c7:9c:9d:0d:4f:5c:36:ae:cb:81:52:2f:67:f2: c3:23:5a:d7:f3:51:e7:f6:b4:05:58:3c:ce:7c:ca:54: 85:b5:00:ff:ba:71:57:b6:db:42:c5:34:d4:72:bd:ee: d3:ac:7a:09:2f:59:05:ad:07:c8:f0:f3:5f:43:84:07: c3:55:8e:e4:1b:6c:1d:24:c6:91:5e:9c:62:e8:92:35: 56:52:d9:b4:a9:79:e9:c9:38:e3:85:b7:c8:e7:b8:af: b7:96:a0:24:42:51:66:e2:df:c3:86:ad:57:99:f6:fb: 48:c6:25:70:e1:e6:6f:fb:73:8f:ef:f2:37:7e:28:8a: 48:c7:2c:ef:a2:6f:fa:1c:77:33:66:10:80:60:d1:2a: 5b:03:d6:d5:99:56:a0:ab:4c:46:7d:62:9f:3f:14:c9: 7e:8c:a2:36:a8:3e:0a:59:5f:d9:ed:14:1f:f8:9d:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:19:45:0a:58:dc:eb:96:9b:d3:b5:53:b5:47:99:e4: 04:bd:54:07:1e:c9:38:1e:c5:bb:7f:bf:e7:74:b3:6f: 6e:90:be:cd:c5:fb:00:d8:49:03:3c:4c:81:2e:d7:3f: ce:b3:45:3b:3e:38:44:b6:aa:c9:55:49:17:15:4f:ae: d0:ce:ab:53:25:48:07:48:49:52:0b:7a:70:00:97:e0: 81:bc:1a:c3:42:82:a1:29:13:f6:83:b8:97:a0:49:bf: fa:54:e0:16:78:9d:78:ef:5c:fd:87:6a:62:ba:7e:ec: f8:cd:24:21:1e:79:ab:29:11:8d:d5:6c:85:9a:c1:34: c5:51:43:b7:d8:b7:56:48:14:82:0d:4b:a6:63:67:9f: fa:a0:3b:99:35:db:6f:0b:04:81:f7:5f:09:b7:4e:60: b1:ad:9e:e9:f7:d7:4f:96:80:d5:b3:05:79:08:56:bf: 6a:c9:d3:22:d0:cd:90:e1:06:c1:24:ec:b3:f8:dc:25: 80:e2:ed:11:ee:de:b3:27:66:3d:37:87:fd:b4:51:d1: 99:08:ac:bf:d5:c1:4b:01:9b:63:d6:2a:1a:9d:42:bd: da:74:7b:2c:9f:fc:52:47:80:47:bd:6b:ca:4d:c6:fd: 12:57:15:a9:ed:50:72:8b:b6:a3:49:0f:35:69:cc:c3 Fingerprint (SHA-256): 43:0A:41:F3:10:C9:BC:B7:C0:F1:3F:4C:40:F9:2B:4B:F3:E7:0D:D7:09:69:63:E1:C4:ED:90:F6:61:B8:A2:72 Fingerprint (SHA1): 05:38:62:47:D8:23:92:45:EF:40:FE:48:D2:75:D0:79:4B:A5:CF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3277: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194850 (0x433ee322) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:27 2025 Not After : Thu Nov 28 11:51:27 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:3f:c0:63:09:63:0d:25:4a:90:75:8c:8b:1f:a3:c0: 27:1d:39:c3:83:13:1c:80:28:2c:1c:3e:ce:0d:23:e9: 26:d7:1b:ff:b4:96:3f:9f:59:6c:25:90:60:98:84:5b: 06:25:b4:64:7f:88:fd:cd:65:bb:e1:f1:0d:9b:aa:a2: af:10:c9:0a:fb:bc:55:ca:71:6a:5f:e8:f0:fd:85:15: 3f:11:c7:9c:9d:0d:4f:5c:36:ae:cb:81:52:2f:67:f2: c3:23:5a:d7:f3:51:e7:f6:b4:05:58:3c:ce:7c:ca:54: 85:b5:00:ff:ba:71:57:b6:db:42:c5:34:d4:72:bd:ee: d3:ac:7a:09:2f:59:05:ad:07:c8:f0:f3:5f:43:84:07: c3:55:8e:e4:1b:6c:1d:24:c6:91:5e:9c:62:e8:92:35: 56:52:d9:b4:a9:79:e9:c9:38:e3:85:b7:c8:e7:b8:af: b7:96:a0:24:42:51:66:e2:df:c3:86:ad:57:99:f6:fb: 48:c6:25:70:e1:e6:6f:fb:73:8f:ef:f2:37:7e:28:8a: 48:c7:2c:ef:a2:6f:fa:1c:77:33:66:10:80:60:d1:2a: 5b:03:d6:d5:99:56:a0:ab:4c:46:7d:62:9f:3f:14:c9: 7e:8c:a2:36:a8:3e:0a:59:5f:d9:ed:14:1f:f8:9d:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:19:45:0a:58:dc:eb:96:9b:d3:b5:53:b5:47:99:e4: 04:bd:54:07:1e:c9:38:1e:c5:bb:7f:bf:e7:74:b3:6f: 6e:90:be:cd:c5:fb:00:d8:49:03:3c:4c:81:2e:d7:3f: ce:b3:45:3b:3e:38:44:b6:aa:c9:55:49:17:15:4f:ae: d0:ce:ab:53:25:48:07:48:49:52:0b:7a:70:00:97:e0: 81:bc:1a:c3:42:82:a1:29:13:f6:83:b8:97:a0:49:bf: fa:54:e0:16:78:9d:78:ef:5c:fd:87:6a:62:ba:7e:ec: f8:cd:24:21:1e:79:ab:29:11:8d:d5:6c:85:9a:c1:34: c5:51:43:b7:d8:b7:56:48:14:82:0d:4b:a6:63:67:9f: fa:a0:3b:99:35:db:6f:0b:04:81:f7:5f:09:b7:4e:60: b1:ad:9e:e9:f7:d7:4f:96:80:d5:b3:05:79:08:56:bf: 6a:c9:d3:22:d0:cd:90:e1:06:c1:24:ec:b3:f8:dc:25: 80:e2:ed:11:ee:de:b3:27:66:3d:37:87:fd:b4:51:d1: 99:08:ac:bf:d5:c1:4b:01:9b:63:d6:2a:1a:9d:42:bd: da:74:7b:2c:9f:fc:52:47:80:47:bd:6b:ca:4d:c6:fd: 12:57:15:a9:ed:50:72:8b:b6:a3:49:0f:35:69:cc:c3 Fingerprint (SHA-256): 43:0A:41:F3:10:C9:BC:B7:C0:F1:3F:4C:40:F9:2B:4B:F3:E7:0D:D7:09:69:63:E1:C4:ED:90:F6:61:B8:A2:72 Fingerprint (SHA1): 05:38:62:47:D8:23:92:45:EF:40:FE:48:D2:75:D0:79:4B:A5:CF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3278: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #3279: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194849 (0x433ee321) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:51:27 2025 Not After : Thu Nov 28 11:51:27 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:05:0d:7e:56:eb:a6:46:0d:f4:b4:d6:ae:25:14:5f: de:e0:18:c7:ff:36:f8:03:0a:c7:06:40:7c:6a:0d:53: d6:a6:a4:7c:36:e0:fd:a5:9a:b5:26:64:a5:3d:97:97: 8e:9c:5a:5f:b3:79:e8:7a:70:c1:7b:b1:6b:40:e7:de: 20:04:e3:1f:3c:8d:4f:b2:d7:03:bf:af:56:28:ab:1c: 1c:c8:51:6e:7c:e8:50:3b:7b:db:cc:95:80:f6:df:40: 23:02:83:ea:65:07:73:eb:51:cb:1d:43:59:1b:b0:ce: 53:86:8c:10:21:e3:c1:15:2e:19:5c:c6:5e:e1:7a:14: cc:de:80:60:d2:29:b5:fe:8e:69:0e:a9:f2:e7:2b:88: 44:c0:7a:fb:8b:e5:59:6d:43:5b:c3:ea:21:70:0c:59: f2:6c:ad:3e:fd:40:d9:68:c0:ef:63:20:52:89:b6:81: 12:8c:ee:74:df:08:3e:82:50:e4:12:42:2b:33:49:29: c8:0b:f0:47:67:ce:54:fe:8c:db:ca:15:1c:98:d8:3e: 6f:fc:f5:13:ef:3b:9b:57:72:ad:a3:10:a8:69:ee:4f: 66:b8:7d:c4:59:98:93:b6:16:31:fb:f8:2e:24:d5:99: 91:2b:50:3d:98:91:62:e4:a1:fe:07:94:35:49:80:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:c3:ea:e8:41:40:59:71:73:8a:ce:4f:a6:14:04:c3: 27:aa:e0:23:3f:47:cb:a7:46:5f:76:29:3c:c9:ab:dc: 47:d2:48:20:d8:c9:9f:ed:f2:ad:41:da:c8:08:82:4b: 52:ec:11:51:92:0e:9d:08:60:0b:0a:89:a2:8b:34:6b: 01:75:87:25:2c:e9:16:38:1f:61:08:29:4d:7f:ea:5f: 4f:06:5a:5c:89:98:29:db:00:69:62:92:90:68:d0:83: 38:1f:13:f9:9d:9d:b7:3b:c6:15:cf:43:31:65:43:cb: bf:ce:43:d6:ff:e9:40:78:91:9b:9d:13:72:b4:cb:b5: a1:c6:d5:44:b8:55:b2:bf:a1:04:a9:c9:fe:f2:58:e8: c9:af:5f:ea:17:51:85:af:f6:ce:ae:ba:d8:67:d4:76: 37:27:2b:9b:7d:fb:c5:99:5a:3d:1f:da:fb:7d:6c:96: 83:1f:5a:9c:fa:8f:d2:e2:6b:47:f0:d1:b0:21:bd:87: 83:4a:71:0a:d5:a0:22:51:e4:73:6f:60:d8:b2:7a:3f: ae:20:ed:72:46:c4:92:f8:c1:64:35:ea:e8:da:53:ae: d1:ff:2b:70:62:50:42:d7:4c:76:00:b5:35:57:1c:33: 6d:9b:50:7c:05:ba:e8:fb:84:f9:16:ec:bc:5b:9b:17 Fingerprint (SHA-256): 69:A3:FE:9A:DB:A7:80:61:82:D4:29:9D:45:71:63:D9:BF:D9:2C:CB:9D:FB:B6:01:CE:BF:6D:5F:20:86:21:EB Fingerprint (SHA1): 02:B5:2B:9F:52:E9:C0:E4:5F:06:D6:30:83:94:F6:FD:39:24:50:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3280: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194850 (0x433ee322) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:27 2025 Not After : Thu Nov 28 11:51:27 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:3f:c0:63:09:63:0d:25:4a:90:75:8c:8b:1f:a3:c0: 27:1d:39:c3:83:13:1c:80:28:2c:1c:3e:ce:0d:23:e9: 26:d7:1b:ff:b4:96:3f:9f:59:6c:25:90:60:98:84:5b: 06:25:b4:64:7f:88:fd:cd:65:bb:e1:f1:0d:9b:aa:a2: af:10:c9:0a:fb:bc:55:ca:71:6a:5f:e8:f0:fd:85:15: 3f:11:c7:9c:9d:0d:4f:5c:36:ae:cb:81:52:2f:67:f2: c3:23:5a:d7:f3:51:e7:f6:b4:05:58:3c:ce:7c:ca:54: 85:b5:00:ff:ba:71:57:b6:db:42:c5:34:d4:72:bd:ee: d3:ac:7a:09:2f:59:05:ad:07:c8:f0:f3:5f:43:84:07: c3:55:8e:e4:1b:6c:1d:24:c6:91:5e:9c:62:e8:92:35: 56:52:d9:b4:a9:79:e9:c9:38:e3:85:b7:c8:e7:b8:af: b7:96:a0:24:42:51:66:e2:df:c3:86:ad:57:99:f6:fb: 48:c6:25:70:e1:e6:6f:fb:73:8f:ef:f2:37:7e:28:8a: 48:c7:2c:ef:a2:6f:fa:1c:77:33:66:10:80:60:d1:2a: 5b:03:d6:d5:99:56:a0:ab:4c:46:7d:62:9f:3f:14:c9: 7e:8c:a2:36:a8:3e:0a:59:5f:d9:ed:14:1f:f8:9d:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:19:45:0a:58:dc:eb:96:9b:d3:b5:53:b5:47:99:e4: 04:bd:54:07:1e:c9:38:1e:c5:bb:7f:bf:e7:74:b3:6f: 6e:90:be:cd:c5:fb:00:d8:49:03:3c:4c:81:2e:d7:3f: ce:b3:45:3b:3e:38:44:b6:aa:c9:55:49:17:15:4f:ae: d0:ce:ab:53:25:48:07:48:49:52:0b:7a:70:00:97:e0: 81:bc:1a:c3:42:82:a1:29:13:f6:83:b8:97:a0:49:bf: fa:54:e0:16:78:9d:78:ef:5c:fd:87:6a:62:ba:7e:ec: f8:cd:24:21:1e:79:ab:29:11:8d:d5:6c:85:9a:c1:34: c5:51:43:b7:d8:b7:56:48:14:82:0d:4b:a6:63:67:9f: fa:a0:3b:99:35:db:6f:0b:04:81:f7:5f:09:b7:4e:60: b1:ad:9e:e9:f7:d7:4f:96:80:d5:b3:05:79:08:56:bf: 6a:c9:d3:22:d0:cd:90:e1:06:c1:24:ec:b3:f8:dc:25: 80:e2:ed:11:ee:de:b3:27:66:3d:37:87:fd:b4:51:d1: 99:08:ac:bf:d5:c1:4b:01:9b:63:d6:2a:1a:9d:42:bd: da:74:7b:2c:9f:fc:52:47:80:47:bd:6b:ca:4d:c6:fd: 12:57:15:a9:ed:50:72:8b:b6:a3:49:0f:35:69:cc:c3 Fingerprint (SHA-256): 43:0A:41:F3:10:C9:BC:B7:C0:F1:3F:4C:40:F9:2B:4B:F3:E7:0D:D7:09:69:63:E1:C4:ED:90:F6:61:B8:A2:72 Fingerprint (SHA1): 05:38:62:47:D8:23:92:45:EF:40:FE:48:D2:75:D0:79:4B:A5:CF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3281: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194850 (0x433ee322) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:27 2025 Not After : Thu Nov 28 11:51:27 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:3f:c0:63:09:63:0d:25:4a:90:75:8c:8b:1f:a3:c0: 27:1d:39:c3:83:13:1c:80:28:2c:1c:3e:ce:0d:23:e9: 26:d7:1b:ff:b4:96:3f:9f:59:6c:25:90:60:98:84:5b: 06:25:b4:64:7f:88:fd:cd:65:bb:e1:f1:0d:9b:aa:a2: af:10:c9:0a:fb:bc:55:ca:71:6a:5f:e8:f0:fd:85:15: 3f:11:c7:9c:9d:0d:4f:5c:36:ae:cb:81:52:2f:67:f2: c3:23:5a:d7:f3:51:e7:f6:b4:05:58:3c:ce:7c:ca:54: 85:b5:00:ff:ba:71:57:b6:db:42:c5:34:d4:72:bd:ee: d3:ac:7a:09:2f:59:05:ad:07:c8:f0:f3:5f:43:84:07: c3:55:8e:e4:1b:6c:1d:24:c6:91:5e:9c:62:e8:92:35: 56:52:d9:b4:a9:79:e9:c9:38:e3:85:b7:c8:e7:b8:af: b7:96:a0:24:42:51:66:e2:df:c3:86:ad:57:99:f6:fb: 48:c6:25:70:e1:e6:6f:fb:73:8f:ef:f2:37:7e:28:8a: 48:c7:2c:ef:a2:6f:fa:1c:77:33:66:10:80:60:d1:2a: 5b:03:d6:d5:99:56:a0:ab:4c:46:7d:62:9f:3f:14:c9: 7e:8c:a2:36:a8:3e:0a:59:5f:d9:ed:14:1f:f8:9d:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:19:45:0a:58:dc:eb:96:9b:d3:b5:53:b5:47:99:e4: 04:bd:54:07:1e:c9:38:1e:c5:bb:7f:bf:e7:74:b3:6f: 6e:90:be:cd:c5:fb:00:d8:49:03:3c:4c:81:2e:d7:3f: ce:b3:45:3b:3e:38:44:b6:aa:c9:55:49:17:15:4f:ae: d0:ce:ab:53:25:48:07:48:49:52:0b:7a:70:00:97:e0: 81:bc:1a:c3:42:82:a1:29:13:f6:83:b8:97:a0:49:bf: fa:54:e0:16:78:9d:78:ef:5c:fd:87:6a:62:ba:7e:ec: f8:cd:24:21:1e:79:ab:29:11:8d:d5:6c:85:9a:c1:34: c5:51:43:b7:d8:b7:56:48:14:82:0d:4b:a6:63:67:9f: fa:a0:3b:99:35:db:6f:0b:04:81:f7:5f:09:b7:4e:60: b1:ad:9e:e9:f7:d7:4f:96:80:d5:b3:05:79:08:56:bf: 6a:c9:d3:22:d0:cd:90:e1:06:c1:24:ec:b3:f8:dc:25: 80:e2:ed:11:ee:de:b3:27:66:3d:37:87:fd:b4:51:d1: 99:08:ac:bf:d5:c1:4b:01:9b:63:d6:2a:1a:9d:42:bd: da:74:7b:2c:9f:fc:52:47:80:47:bd:6b:ca:4d:c6:fd: 12:57:15:a9:ed:50:72:8b:b6:a3:49:0f:35:69:cc:c3 Fingerprint (SHA-256): 43:0A:41:F3:10:C9:BC:B7:C0:F1:3F:4C:40:F9:2B:4B:F3:E7:0D:D7:09:69:63:E1:C4:ED:90:F6:61:B8:A2:72 Fingerprint (SHA1): 05:38:62:47:D8:23:92:45:EF:40:FE:48:D2:75:D0:79:4B:A5:CF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3282: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3283: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194857 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3284: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3285: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3286: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194858 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3287: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3288: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3289: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3290: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1128194859 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3291: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3292: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3293: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3294: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1128194860 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3295: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3296: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3297: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3298: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1128194861 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3299: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3300: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1128194862 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3301: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3302: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3303: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3304: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3305: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1128194863 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3306: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3307: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3308: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3309: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1128194864 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3310: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3311: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3312: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3313: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194865 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3314: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3315: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3316: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3317: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194866 --extCP < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3318: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3319: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3320: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194857 (0x433ee329) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Fri Nov 28 11:51:32 2025 Not After : Thu Nov 28 11:51:32 2075 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:80:55:11:86:22:dd:33:bd:a1:0e:fd:0f:92:49:e0: 9f:66:9d:ee:d1:ad:29:29:12:07:ed:e4:e1:df:d5:20: 9c:b9:63:ca:69:00:19:68:3a:38:54:0c:2a:33:36:57: 6d:ef:10:10:e1:ca:cd:22:31:df:7a:12:3c:76:0e:b4: 7c:75:7b:75:cf:87:d1:07:d1:63:76:c3:de:c5:a9:3c: cb:d6:2f:b4:36:4d:b0:f4:1b:ae:73:39:fa:29:6f:2d: fc:0a:57:3e:4f:70:d1:7b:0e:8f:47:d9:cb:b4:a2:de: 28:70:88:21:ea:46:06:b0:e5:74:7b:16:d9:17:c6:7d: ae:72:d5:d5:b0:2a:85:77:16:07:a5:51:f1:71:3d:59: 71:58:3e:8e:05:b8:5c:1c:68:9f:f3:bb:83:cf:d6:f4: 6a:4e:65:90:61:27:f6:58:29:dc:48:e2:ac:3e:10:c0: 3d:5a:06:c5:16:10:70:9c:9d:fd:bf:7c:e8:96:31:a5: d4:3b:99:9a:b9:b2:1d:95:39:90:c6:a1:ed:b4:ce:6e: cf:1e:6f:1a:9c:3e:3a:99:e0:e7:cb:28:d0:76:3a:59: fb:89:e4:4d:f4:8f:2e:94:74:2f:8e:8c:ab:be:3c:1a: a0:d3:84:d1:d9:58:b7:3b:4e:94:73:b8:41:57:2c:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bb:e0:00:66:ed:cc:9f:60:52:56:3e:0f:b5:4f:9d:d7: 02:48:4c:25:c9:23:97:5f:a6:82:a6:10:5b:da:d5:9e: d6:2e:f6:dc:9a:04:d6:50:bf:6f:0b:c0:a8:3c:b1:eb: f8:05:39:98:e6:4a:c8:e8:14:25:89:fc:d8:77:de:81: 57:65:5a:c8:57:10:0c:4b:2d:da:0d:7d:33:a0:6c:64: dc:7c:59:81:5b:9a:bb:4c:9a:d7:20:62:bb:7d:07:c7: 71:99:5a:22:18:68:fc:81:eb:2f:35:50:dc:6e:82:7f: 03:b0:ae:6a:84:f7:27:6f:04:3d:24:5f:85:a1:d2:c3: d9:de:0a:d2:f9:d4:1c:fa:25:c1:11:5e:f4:b8:ef:4e: 63:37:b1:b0:a0:f1:69:d5:87:f3:db:78:8e:d5:86:50: b2:a3:c6:02:97:a6:80:c7:d4:85:9b:cb:45:fc:70:a4: 02:0e:58:33:11:03:e9:0f:14:8b:32:24:59:c2:bf:be: 6f:72:d7:50:9a:7b:1b:27:1c:7d:ec:c9:29:7f:49:f5: 05:24:f9:5b:a8:da:e0:72:dc:16:6c:b0:91:c0:06:93: 34:5d:b0:66:ea:b3:08:b5:80:34:5f:46:ad:41:de:1d: 80:c0:a6:93:d9:78:c2:e1:5f:a9:3a:85:e0:78:41:6c Fingerprint (SHA-256): CF:49:83:F5:56:05:B4:E7:43:10:C9:3D:36:55:68:95:61:1E:47:C4:FF:CA:7F:BC:45:96:9B:8B:13:35:B3:5E Fingerprint (SHA1): A4:0F:84:98:D5:41:06:E8:7E:C7:EF:D9:31:97:DB:C6:FA:FD:E8:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3321: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3322: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3323: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3324: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3325: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3326: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3327: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3328: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3329: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194858 (0x433ee32a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Fri Nov 28 11:51:33 2025 Not After : Thu Nov 28 11:51:33 2075 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:81:b9:32:6d:82:3a:9c:34:92:89:b3:f9:b6:f8:4d: 7f:cd:e4:a0:da:f4:c9:fb:57:cb:13:40:65:15:de:06: 72:f4:07:81:8e:80:83:7e:76:8a:a9:92:97:13:89:78: 3f:45:1e:ef:10:ab:c5:57:9c:c2:12:5e:02:fe:ae:59: ce:2e:da:c7:c2:03:c2:22:24:3d:f3:a7:50:cd:e5:47: 19:b9:c7:98:1a:b4:42:7e:8a:9a:6b:79:c8:70:44:7a: 27:69:20:ae:25:56:f5:fa:83:79:bf:12:6f:1e:6e:a2: b3:4d:93:4a:af:06:f8:a1:7b:2a:9b:52:10:76:a3:bc: 77:34:cd:ac:bd:d9:ad:06:77:1b:00:2a:36:23:65:28: 24:eb:63:a7:25:91:6d:fb:2a:df:ae:3f:b6:a6:be:62: 87:93:d2:2a:e9:b1:b9:12:39:3a:00:31:2a:55:3c:65: ba:69:48:24:f4:95:4b:51:d0:8e:9b:e6:e4:45:cd:d0: 67:9c:9f:da:5e:90:b9:52:35:af:0a:19:a3:f3:b2:e3: be:42:8a:60:18:45:4f:a2:d0:83:d4:55:10:7f:23:1b: 7b:eb:9f:1b:ec:41:da:43:04:b7:cc:63:d4:d2:25:1f: 46:54:84:c8:55:b8:46:67:27:1d:79:99:ff:d7:55:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:e1:d1:7a:8c:60:8b:78:ab:0a:da:76:ee:d1:45:ae: 56:74:c5:0e:bc:70:5a:09:2b:1d:98:54:7d:e3:8d:a4: ef:10:b2:4f:1f:22:28:7a:d1:06:80:4c:09:53:ae:00: 9a:3c:a8:95:e6:bb:f1:2f:c6:b7:a9:b5:9d:bb:17:6e: 3a:cb:fb:ce:e2:fd:9b:2a:5e:9c:29:dd:ab:41:f8:79: 3c:c2:ab:06:6b:d6:0b:a0:97:d5:5f:74:fc:4d:e7:e9: 4d:e8:4e:38:bf:87:e0:c8:88:ed:7e:41:99:ba:39:ab: c0:13:fb:4e:93:1a:7c:26:95:8a:3e:d2:66:8a:cf:dd: a9:4f:ef:59:ad:0b:95:f8:15:28:fe:04:36:f5:ac:64: b5:cc:ab:01:6b:22:52:63:40:36:cd:f8:b6:fe:7b:1a: 7c:1e:c4:60:41:a8:7f:ef:be:75:08:c1:aa:d7:56:79: 4e:67:bb:a3:56:3d:cf:1e:ff:2f:3c:a2:72:ba:a5:c6: 70:f0:ff:fe:42:44:25:0a:25:1f:7d:b6:87:1f:2a:70: 26:ff:ca:73:a1:1d:47:1a:cd:30:4c:12:c5:45:16:ba: 83:aa:66:68:11:87:c8:47:ec:0b:c9:8c:f1:fd:d0:43: 5c:45:80:ca:cf:ee:26:0c:65:09:43:b7:a5:4c:c9:19 Fingerprint (SHA-256): AE:3E:9B:E7:65:8F:BE:2C:0B:57:88:EA:F6:0E:D4:67:A8:86:B1:2D:39:48:74:30:E2:46:83:67:5E:92:44:CD Fingerprint (SHA1): 60:AD:F6:EC:4E:3E:51:61:AA:FE:2A:07:A4:56:EB:2D:59:12:86:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3330: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3331: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3332: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3333: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3334: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3335: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3336: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3337: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3338: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3339: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3340: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3341: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3342: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3343: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3344: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3345: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #3346: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3347: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3348: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194867 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3349: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3350: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3351: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3352: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1128194868 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3353: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3354: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3355: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3356: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1128194869 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3357: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3358: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3359: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3360: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1128194870 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3361: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3362: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3363: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3364: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1128194871 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3365: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3366: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3367: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3368: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1128194872 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3369: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3370: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3371: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3372: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1128194873 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3373: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3374: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3375: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3376: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1128194874 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3377: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3378: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3379: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3380: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1128194875 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3381: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3382: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3383: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194867 (0x433ee333) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:39 2025 Not After : Thu Nov 28 11:51:39 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3b:c5:1b:d8:68:17:65:80:44:12:9a:a6:01:e1:01:f6: 3d:7a:74:33:b1:29:6d:d3:51:19:31:fb:6b:af:3d:46: 60:d8:64:d9:04:e0:c2:48:cd:cf:3d:81:8d:05:e9:c7: 71:b9:0d:98:c2:9e:bf:77:19:85:4c:c8:c5:22:bf:75: d0:77:c0:12:a6:ea:b3:75:6f:1e:26:18:65:0d:6e:6e: d7:42:c3:fe:b6:0d:41:38:22:1e:8a:77:38:29:6a:1b: e3:70:05:17:16:85:98:84:f7:c5:72:c3:70:bc:da:c4: e9:39:1a:cd:86:6b:99:a8:73:39:be:1f:01:85:cf:a9: 77:c4:94:75:26:f9:d4:e6:73:ee:ac:c5:e3:10:43:1a: 6d:16:32:65:a6:31:01:f6:77:fb:52:da:94:2e:9a:53: 7e:03:17:bd:2b:5c:f6:2e:ee:4d:bc:6f:30:0c:cb:ce: 15:17:36:78:e1:ab:90:f8:2f:00:9a:4c:9c:75:d9:7d: 61:4c:85:6a:8a:f1:ee:fc:86:7d:8a:60:a8:d7:93:f3: be:2e:f8:26:ef:36:11:45:9e:7e:13:a0:ff:d9:f3:62: 40:f2:62:94:2e:1d:8c:9c:ea:a6:77:2b:f3:96:4c:94: 0a:e1:1b:51:6a:fe:c5:58:af:cc:5f:43:42:2f:47:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:d2:49:f7:4c:c9:f9:35:27:93:44:8e: 1e:df:38:1a:5d:0a:34:a1:60:c4:87:17:1d:51:50:07: 02:1c:4e:52:a0:82:24:71:b6:fa:b4:e2:13:51:f8:35: 92:e8:94:de:b9:bd:ad:a8:43:c9:fd:0f:a7:2d Fingerprint (SHA-256): F4:55:0E:A3:DF:07:19:80:14:8B:91:E4:53:7F:D1:97:19:0F:1B:98:23:05:13:D8:7F:E5:BA:81:AC:7D:02:E6 Fingerprint (SHA1): 7C:AE:7A:2F:BC:42:17:A1:40:3A:4F:47:AE:7B:F1:73:28:4F:89:36 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3384: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194867 (0x433ee333) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:39 2025 Not After : Thu Nov 28 11:51:39 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3b:c5:1b:d8:68:17:65:80:44:12:9a:a6:01:e1:01:f6: 3d:7a:74:33:b1:29:6d:d3:51:19:31:fb:6b:af:3d:46: 60:d8:64:d9:04:e0:c2:48:cd:cf:3d:81:8d:05:e9:c7: 71:b9:0d:98:c2:9e:bf:77:19:85:4c:c8:c5:22:bf:75: d0:77:c0:12:a6:ea:b3:75:6f:1e:26:18:65:0d:6e:6e: d7:42:c3:fe:b6:0d:41:38:22:1e:8a:77:38:29:6a:1b: e3:70:05:17:16:85:98:84:f7:c5:72:c3:70:bc:da:c4: e9:39:1a:cd:86:6b:99:a8:73:39:be:1f:01:85:cf:a9: 77:c4:94:75:26:f9:d4:e6:73:ee:ac:c5:e3:10:43:1a: 6d:16:32:65:a6:31:01:f6:77:fb:52:da:94:2e:9a:53: 7e:03:17:bd:2b:5c:f6:2e:ee:4d:bc:6f:30:0c:cb:ce: 15:17:36:78:e1:ab:90:f8:2f:00:9a:4c:9c:75:d9:7d: 61:4c:85:6a:8a:f1:ee:fc:86:7d:8a:60:a8:d7:93:f3: be:2e:f8:26:ef:36:11:45:9e:7e:13:a0:ff:d9:f3:62: 40:f2:62:94:2e:1d:8c:9c:ea:a6:77:2b:f3:96:4c:94: 0a:e1:1b:51:6a:fe:c5:58:af:cc:5f:43:42:2f:47:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:d2:49:f7:4c:c9:f9:35:27:93:44:8e: 1e:df:38:1a:5d:0a:34:a1:60:c4:87:17:1d:51:50:07: 02:1c:4e:52:a0:82:24:71:b6:fa:b4:e2:13:51:f8:35: 92:e8:94:de:b9:bd:ad:a8:43:c9:fd:0f:a7:2d Fingerprint (SHA-256): F4:55:0E:A3:DF:07:19:80:14:8B:91:E4:53:7F:D1:97:19:0F:1B:98:23:05:13:D8:7F:E5:BA:81:AC:7D:02:E6 Fingerprint (SHA1): 7C:AE:7A:2F:BC:42:17:A1:40:3A:4F:47:AE:7B:F1:73:28:4F:89:36 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3385: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194867 (0x433ee333) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:39 2025 Not After : Thu Nov 28 11:51:39 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3b:c5:1b:d8:68:17:65:80:44:12:9a:a6:01:e1:01:f6: 3d:7a:74:33:b1:29:6d:d3:51:19:31:fb:6b:af:3d:46: 60:d8:64:d9:04:e0:c2:48:cd:cf:3d:81:8d:05:e9:c7: 71:b9:0d:98:c2:9e:bf:77:19:85:4c:c8:c5:22:bf:75: d0:77:c0:12:a6:ea:b3:75:6f:1e:26:18:65:0d:6e:6e: d7:42:c3:fe:b6:0d:41:38:22:1e:8a:77:38:29:6a:1b: e3:70:05:17:16:85:98:84:f7:c5:72:c3:70:bc:da:c4: e9:39:1a:cd:86:6b:99:a8:73:39:be:1f:01:85:cf:a9: 77:c4:94:75:26:f9:d4:e6:73:ee:ac:c5:e3:10:43:1a: 6d:16:32:65:a6:31:01:f6:77:fb:52:da:94:2e:9a:53: 7e:03:17:bd:2b:5c:f6:2e:ee:4d:bc:6f:30:0c:cb:ce: 15:17:36:78:e1:ab:90:f8:2f:00:9a:4c:9c:75:d9:7d: 61:4c:85:6a:8a:f1:ee:fc:86:7d:8a:60:a8:d7:93:f3: be:2e:f8:26:ef:36:11:45:9e:7e:13:a0:ff:d9:f3:62: 40:f2:62:94:2e:1d:8c:9c:ea:a6:77:2b:f3:96:4c:94: 0a:e1:1b:51:6a:fe:c5:58:af:cc:5f:43:42:2f:47:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:d2:49:f7:4c:c9:f9:35:27:93:44:8e: 1e:df:38:1a:5d:0a:34:a1:60:c4:87:17:1d:51:50:07: 02:1c:4e:52:a0:82:24:71:b6:fa:b4:e2:13:51:f8:35: 92:e8:94:de:b9:bd:ad:a8:43:c9:fd:0f:a7:2d Fingerprint (SHA-256): F4:55:0E:A3:DF:07:19:80:14:8B:91:E4:53:7F:D1:97:19:0F:1B:98:23:05:13:D8:7F:E5:BA:81:AC:7D:02:E6 Fingerprint (SHA1): 7C:AE:7A:2F:BC:42:17:A1:40:3A:4F:47:AE:7B:F1:73:28:4F:89:36 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3386: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194867 (0x433ee333) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:39 2025 Not After : Thu Nov 28 11:51:39 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 3b:c5:1b:d8:68:17:65:80:44:12:9a:a6:01:e1:01:f6: 3d:7a:74:33:b1:29:6d:d3:51:19:31:fb:6b:af:3d:46: 60:d8:64:d9:04:e0:c2:48:cd:cf:3d:81:8d:05:e9:c7: 71:b9:0d:98:c2:9e:bf:77:19:85:4c:c8:c5:22:bf:75: d0:77:c0:12:a6:ea:b3:75:6f:1e:26:18:65:0d:6e:6e: d7:42:c3:fe:b6:0d:41:38:22:1e:8a:77:38:29:6a:1b: e3:70:05:17:16:85:98:84:f7:c5:72:c3:70:bc:da:c4: e9:39:1a:cd:86:6b:99:a8:73:39:be:1f:01:85:cf:a9: 77:c4:94:75:26:f9:d4:e6:73:ee:ac:c5:e3:10:43:1a: 6d:16:32:65:a6:31:01:f6:77:fb:52:da:94:2e:9a:53: 7e:03:17:bd:2b:5c:f6:2e:ee:4d:bc:6f:30:0c:cb:ce: 15:17:36:78:e1:ab:90:f8:2f:00:9a:4c:9c:75:d9:7d: 61:4c:85:6a:8a:f1:ee:fc:86:7d:8a:60:a8:d7:93:f3: be:2e:f8:26:ef:36:11:45:9e:7e:13:a0:ff:d9:f3:62: 40:f2:62:94:2e:1d:8c:9c:ea:a6:77:2b:f3:96:4c:94: 0a:e1:1b:51:6a:fe:c5:58:af:cc:5f:43:42:2f:47:03 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:59:d2:49:f7:4c:c9:f9:35:27:93:44:8e: 1e:df:38:1a:5d:0a:34:a1:60:c4:87:17:1d:51:50:07: 02:1c:4e:52:a0:82:24:71:b6:fa:b4:e2:13:51:f8:35: 92:e8:94:de:b9:bd:ad:a8:43:c9:fd:0f:a7:2d Fingerprint (SHA-256): F4:55:0E:A3:DF:07:19:80:14:8B:91:E4:53:7F:D1:97:19:0F:1B:98:23:05:13:D8:7F:E5:BA:81:AC:7D:02:E6 Fingerprint (SHA1): 7C:AE:7A:2F:BC:42:17:A1:40:3A:4F:47:AE:7B:F1:73:28:4F:89:36 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3387: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3388: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3389: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3390: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3391: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3392: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3393: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3394: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3395: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3396: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3397: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3398: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3399: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3400: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3401: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3402: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3403: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3404: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3405: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3406: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3407: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3408: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3409: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3410: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3411: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3412: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3413: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3414: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128115149Z nextupdate=20261128115149Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:51:49 2025 Next Update: Sat Nov 28 11:51:49 2026 CRL Extensions: chains.sh: #3415: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115149Z nextupdate=20261128115149Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:51:49 2025 Next Update: Sat Nov 28 11:51:49 2026 CRL Extensions: chains.sh: #3416: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128115149Z nextupdate=20261128115149Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:51:49 2025 Next Update: Sat Nov 28 11:51:49 2026 CRL Extensions: chains.sh: #3417: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128115149Z nextupdate=20261128115149Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:51:49 2025 Next Update: Sat Nov 28 11:51:49 2026 CRL Extensions: chains.sh: #3418: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128115150Z addcert 14 20251128115150Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:51:50 2025 Next Update: Sat Nov 28 11:51:49 2026 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Fri Nov 28 11:51:50 2025 CRL Extensions: chains.sh: #3419: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115151Z addcert 15 20251128115151Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:51:51 2025 Next Update: Sat Nov 28 11:51:49 2026 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Fri Nov 28 11:51:51 2025 CRL Extensions: chains.sh: #3420: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3421: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3422: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3423: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3424: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3425: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3426: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3427: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3428: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3429: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:45 2025 Not After : Thu Nov 28 11:51:45 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:46:f4:d5:b5:9c:33:a6:67:4a:c5:7a:42:8f:cd:c9: f5:88:6e:30:fc:e7:c2:fc:78:0e:c4:80:33:77:ee:47: 38:c0:8d:e3:fa:2f:ed:e8:87:57:74:25:20:2b:2a:01: 9c:d9:5c:e7:6c:80:7b:d4:73:df:67:12:63:d9:5d:f7: 31:92:47:7f:c2:77:b0:f8:2e:15:41:82:ad:58:c4:24: 64:93:6b:98:08:65:eb:0c:0c:18:5d:3e:79:d2:80:a5: ad:e8:24:86:64:dd:40:df:dd:79:96:d0:41:69:3a:15: b9:ff:d8:55:60:04:ef:ba:b7:39:73:1c:25:69:00:90: 65:74:d5:14:ec:67:ba:62:02:26:0c:27:e8:40:03:2d: 17:4b:8a:46:46:96:4d:7b:c7:96:f2:f6:69:c8:3e:88: 0b:aa:8b:79:ad:3b:48:96:81:2f:f4:55:1e:31:7f:f0: c0:08:57:af:f7:9d:8c:50:56:57:d7:ff:12:4d:33:ff: 5c:0e:6c:04:4f:f5:0e:f2:71:2d:65:cb:f5:e6:5f:28: 9d:95:e9:23:2b:2d:43:b0:45:bc:ce:f8:0c:b5:fa:05: 6e:23:3a:8e:0b:8d:f1:06:26:da:08:d9:84:1c:4c:6e: 4a:83:46:9b:0b:19:cb:de:45:74:d4:7e:62:a7:13:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:78:bf:ce:38:ea:0e:31:57:7f:6b:c8:e1:14:bb:ed: ab:96:6b:2f:a3:3b:b1:82:b5:ec:99:6b:07:97:df:f5: 1e:28:99:eb:cf:15:4e:6a:a8:6d:f5:f2:e9:5f:37:68: dd:8b:f6:5d:89:43:34:0e:77:87:60:5d:53:8f:15:64: fb:ad:bb:f1:8f:de:9c:53:f8:82:9e:ba:f8:f6:7d:c1: cc:44:3c:bf:c6:e0:17:80:ba:57:aa:49:31:1e:2f:15: 12:97:37:08:81:ea:4f:9e:0d:69:ad:c2:fa:33:28:a7: 3e:76:09:41:d9:73:4c:8c:4a:ec:fa:8a:d6:24:55:c3: 18:7c:22:cd:ae:27:46:7b:a2:36:02:64:cf:17:7e:d9: fc:ad:15:e9:6a:71:fc:39:52:f2:fa:92:92:02:b1:07: ae:1b:c4:b3:27:4e:dd:9e:bb:46:1f:74:8c:7b:45:1f: 59:bd:c6:77:03:77:b9:bb:ea:48:4a:d6:f4:fe:4d:89: 33:a1:a1:de:4f:38:a5:47:1a:e1:e9:0d:26:0a:aa:82: d3:80:0e:95:c2:37:01:82:4a:5a:de:08:9e:ac:d9:7f: 27:52:74:89:59:3e:42:45:9c:5a:8b:57:d0:03:47:bd: 8d:2b:91:5f:5c:f2:31:f7:a5:29:05:f5:33:61:77:82 Fingerprint (SHA-256): 12:4F:AF:9C:51:00:9E:E2:D1:73:EF:D1:7A:AA:EA:35:10:4E:E2:B0:95:D7:59:AC:34:E0:1F:B1:86:B6:CD:C2 Fingerprint (SHA1): AF:BB:96:00:FF:94:DB:6D:09:40:0A:71:08:2B:23:E7:99:DA:C6:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3430: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3431: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:45 2025 Not After : Thu Nov 28 11:51:45 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:46:f4:d5:b5:9c:33:a6:67:4a:c5:7a:42:8f:cd:c9: f5:88:6e:30:fc:e7:c2:fc:78:0e:c4:80:33:77:ee:47: 38:c0:8d:e3:fa:2f:ed:e8:87:57:74:25:20:2b:2a:01: 9c:d9:5c:e7:6c:80:7b:d4:73:df:67:12:63:d9:5d:f7: 31:92:47:7f:c2:77:b0:f8:2e:15:41:82:ad:58:c4:24: 64:93:6b:98:08:65:eb:0c:0c:18:5d:3e:79:d2:80:a5: ad:e8:24:86:64:dd:40:df:dd:79:96:d0:41:69:3a:15: b9:ff:d8:55:60:04:ef:ba:b7:39:73:1c:25:69:00:90: 65:74:d5:14:ec:67:ba:62:02:26:0c:27:e8:40:03:2d: 17:4b:8a:46:46:96:4d:7b:c7:96:f2:f6:69:c8:3e:88: 0b:aa:8b:79:ad:3b:48:96:81:2f:f4:55:1e:31:7f:f0: c0:08:57:af:f7:9d:8c:50:56:57:d7:ff:12:4d:33:ff: 5c:0e:6c:04:4f:f5:0e:f2:71:2d:65:cb:f5:e6:5f:28: 9d:95:e9:23:2b:2d:43:b0:45:bc:ce:f8:0c:b5:fa:05: 6e:23:3a:8e:0b:8d:f1:06:26:da:08:d9:84:1c:4c:6e: 4a:83:46:9b:0b:19:cb:de:45:74:d4:7e:62:a7:13:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:78:bf:ce:38:ea:0e:31:57:7f:6b:c8:e1:14:bb:ed: ab:96:6b:2f:a3:3b:b1:82:b5:ec:99:6b:07:97:df:f5: 1e:28:99:eb:cf:15:4e:6a:a8:6d:f5:f2:e9:5f:37:68: dd:8b:f6:5d:89:43:34:0e:77:87:60:5d:53:8f:15:64: fb:ad:bb:f1:8f:de:9c:53:f8:82:9e:ba:f8:f6:7d:c1: cc:44:3c:bf:c6:e0:17:80:ba:57:aa:49:31:1e:2f:15: 12:97:37:08:81:ea:4f:9e:0d:69:ad:c2:fa:33:28:a7: 3e:76:09:41:d9:73:4c:8c:4a:ec:fa:8a:d6:24:55:c3: 18:7c:22:cd:ae:27:46:7b:a2:36:02:64:cf:17:7e:d9: fc:ad:15:e9:6a:71:fc:39:52:f2:fa:92:92:02:b1:07: ae:1b:c4:b3:27:4e:dd:9e:bb:46:1f:74:8c:7b:45:1f: 59:bd:c6:77:03:77:b9:bb:ea:48:4a:d6:f4:fe:4d:89: 33:a1:a1:de:4f:38:a5:47:1a:e1:e9:0d:26:0a:aa:82: d3:80:0e:95:c2:37:01:82:4a:5a:de:08:9e:ac:d9:7f: 27:52:74:89:59:3e:42:45:9c:5a:8b:57:d0:03:47:bd: 8d:2b:91:5f:5c:f2:31:f7:a5:29:05:f5:33:61:77:82 Fingerprint (SHA-256): 12:4F:AF:9C:51:00:9E:E2:D1:73:EF:D1:7A:AA:EA:35:10:4E:E2:B0:95:D7:59:AC:34:E0:1F:B1:86:B6:CD:C2 Fingerprint (SHA1): AF:BB:96:00:FF:94:DB:6D:09:40:0A:71:08:2B:23:E7:99:DA:C6:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3432: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3433: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9361 -q -t 20 chains.sh: #3434: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #3435: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3436: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #3437: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3438: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128115152Z nextupdate=20261128115152Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:51:52 2025 Next Update: Sat Nov 28 11:51:52 2026 CRL Extensions: chains.sh: #3439: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128115153Z addcert 3 20251128115153Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:51:53 2025 Next Update: Sat Nov 28 11:51:52 2026 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:51:53 2025 CRL Extensions: chains.sh: #3440: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20251128115154Z addcert 4 20251128115154Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Fri Nov 28 11:51:54 2025 Next Update: Sat Nov 28 11:51:52 2026 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Fri Nov 28 11:51:54 2025 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Fri Nov 28 11:51:53 2025 CRL Extensions: chains.sh: #3441: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3442: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3443: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3444: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3445: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #3446: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3447: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3448: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #3449: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3450: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3451: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3452: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #3453: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3454: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:19 2025 Not After : Thu Nov 28 11:43:19 2030 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:d6:f1:0b:25:22:d3:c2:d4:cf:0c:fb:e3:e2:c5:49: d8:b0:f4:46:9b:88:03:6c:64:b1:ea:9b:93:b0:09:04: f1:10:d4:65:75:de:86:ee:4b:e7:2d:85:22:cd:2e:1c: 93:2e:f3:de:f8:d2:8f:ca:3f:1c:2a:ef:d8:85:0d:71: 2b:91:c9:81:80:02:16:42:72:69:23:a7:f7:7d:6d:76: ef:b8:1a:d9:e2:4b:74:7d:95:ef:a1:97:4f:83:47:7f: 7d:9d:87:ec:58:74:10:ed:3e:ea:06:1e:fc:dc:97:d4: dc:35:65:4d:db:01:df:ba:10:7e:36:82:85:be:1e:f5: ee:b3:35:be:5e:f1:2f:1e:a0:05:32:ef:57:42:26:4f: 26:01:14:84:ac:c9:28:80:89:34:57:65:31:4b:15:02: b0:ef:89:e8:e9:52:ee:db:58:21:45:39:fa:d7:9d:8a: 0d:40:69:54:8d:b3:b4:2c:f5:de:93:1b:c4:9b:38:4d: 67:84:1a:f6:08:66:1a:05:ef:0f:04:cb:b2:db:67:9f: 67:4f:c3:15:61:a3:d3:f6:c6:12:83:b1:41:f7:41:ce: 68:fd:32:10:72:1b:f5:95:7e:be:41:cc:b6:95:a9:9b: 1d:c6:82:2e:d5:e0:1b:18:af:95:1f:2b:b3:14:bd:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9361/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:8c:b0:32:75:bd:a8:10:ca:5c:cc:23:6a:22:f6:38: 4a:a3:8e:41:36:5a:9f:98:fd:d9:f4:66:30:90:71:71: 11:44:58:ec:56:7d:56:5f:d3:a1:26:b1:a4:56:54:68: 62:a0:61:6d:c5:37:bc:03:82:95:c0:ad:d1:4b:b4:10: 9b:10:87:91:ce:45:c8:25:a1:af:84:bc:21:47:98:8a: 42:11:36:30:f2:01:7e:72:ee:3c:ea:dd:4b:8c:56:b9: 28:25:1f:1d:01:5f:4d:66:6d:ef:c8:b1:88:1d:ab:d7: 5e:df:ef:04:0e:85:ee:fa:7d:45:75:ef:74:da:3f:27: f8:9b:63:e7:e2:72:cd:5a:cd:4c:52:77:45:60:78:99: b2:8b:2a:96:e9:79:0b:7d:d7:2b:1a:84:64:e3:93:6e: 26:fa:82:5e:dc:97:92:3d:3d:bb:ea:d3:72:6e:98:08: 15:2f:1b:24:38:a8:0c:6a:60:e3:e8:07:79:6c:ac:7c: 96:57:b3:ce:5d:d7:4e:5e:63:ff:78:0d:3b:1d:82:b1: 21:ef:63:9d:87:cc:05:6d:af:dc:55:fb:14:e1:4d:03: 36:30:7d:cb:4e:ff:e3:0e:82:19:62:13:67:0d:59:71: af:6c:36:53:95:1f:99:48:07:a3:f8:11:02:9d:5f:0c Fingerprint (SHA-256): 57:EA:58:A2:4D:27:1D:9D:E7:D4:FE:10:EA:06:CC:2B:CC:E8:84:A0:17:40:0A:20:4F:F1:4D:FA:66:7E:87:FE Fingerprint (SHA1): 39:4C:AF:9B:41:9E:A2:BC:8C:F9:B1:11:D9:2E:35:E0:3D:A8:5C:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #3455: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #3456: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3457: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3458: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #3459: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3460: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194318 (0x433ee10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Fri Nov 28 11:43:18 2025 Not After : Thu Nov 28 11:43:18 2075 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:12:74:74:f0:8f:f8:f1:79:19:5e:aa:cd:4b:a0:de: 22:5c:b6:b6:e1:1a:ba:13:a9:a6:af:9d:ba:88:b2:34: e1:5b:c1:92:ca:59:de:f2:1e:43:c4:55:d5:a1:1e:67: 3e:e7:e1:54:be:d1:28:5a:a6:54:23:3c:fc:30:6d:15: 44:37:74:d3:b1:bd:c7:26:1e:48:2a:af:6f:07:0a:7c: 1f:0a:6d:a4:3e:0d:3e:0e:b6:59:ff:87:d4:1c:08:af: 25:6b:e4:37:92:54:04:f7:4c:7f:fd:8d:fa:d2:80:3c: 7c:42:39:2e:6b:53:15:a6:b9:9e:c0:b9:3b:48:0d:f6: c8:c8:31:77:50:86:99:79:c3:3b:5c:cf:b7:13:db:2f: 10:76:ee:9a:d1:a6:57:a5:3d:b8:b2:2d:72:04:d9:ce: cf:42:7b:30:9c:60:88:5d:0d:0e:5c:8d:3a:57:3f:cf: ce:f9:4f:c1:ed:9d:53:b9:cb:8d:13:3e:32:14:49:48: 1e:96:d4:42:e4:5b:7f:f0:67:57:cf:2d:d6:87:fd:74: 2a:17:1d:54:d7:76:75:d8:c8:04:ef:b5:8d:ab:9b:58: 0f:1b:af:78:b9:4e:ca:e7:82:13:f5:69:f7:e0:e7:5b: e4:ef:16:ea:0a:fe:c0:82:2b:b4:5a:18:1c:fe:d2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:b0:a3:ed:55:ee:46:1d:e8:85:eb:b8:2f:6b:46:b5: 7b:07:ee:66:c1:67:d9:b6:ce:b3:ec:17:d5:04:6d:8c: a6:b2:91:55:2c:2d:86:90:07:7b:f5:9c:3b:5a:5e:9d: df:e9:15:f9:dd:f2:ad:d7:d7:4e:98:57:6b:00:e3:77: 1a:94:62:9d:40:ba:ad:ad:da:0e:d8:2d:99:f7:17:7d: 4f:0a:eb:fc:e7:c7:b6:94:38:7d:ad:6c:98:cd:74:c2: 6b:40:11:28:60:92:9d:31:57:47:df:a8:4e:65:cd:42: 44:d9:88:49:6b:28:1a:5e:19:40:47:b9:c9:b4:78:c9: ad:fe:ec:c6:65:3f:77:41:12:a7:da:48:fd:80:9e:f9: 2e:41:5a:05:e1:f4:a0:f6:20:2a:25:10:08:3b:39:ec: a6:f9:e9:d2:dc:d6:c9:17:85:65:ea:c8:95:a6:fa:65: cb:22:cf:0f:46:5d:5a:be:10:43:0c:b1:6e:fe:67:3d: 01:0e:74:db:c7:a1:7f:79:ce:8a:30:04:ee:d2:f4:ee: cf:44:ce:6e:89:c3:f3:4b:ff:c1:a4:87:cb:ce:ca:23: 35:5b:3d:ca:91:3b:51:5a:48:b8:09:b2:17:b8:aa:cd: 53:07:08:0b:13:b0:85:fd:5f:7b:fe:e9:0d:cd:e3:ca Fingerprint (SHA-256): 78:4B:C9:76:BE:70:EF:DE:D0:10:F1:07:B0:02:DB:E8:09:28:BD:DE:51:FC:7E:C6:F3:34:AC:CB:DE:6C:17:E2 Fingerprint (SHA1): BB:F6:CC:D7:9D:35:35:56:74:69:9C:1C:0C:28:CD:8D:CC:94:AA:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #3461: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3462: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194876 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3463: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3464: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3465: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3466: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1128194877 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3467: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3468: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3469: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194399.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3470: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194346.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3471: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3472: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3473: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194399.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3474: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1128194878 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3475: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3476: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3477: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194399.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3478: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194347.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3479: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3480: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3481: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3482: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1128194879 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3483: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3484: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3485: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194399.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3486: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194348.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3487: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3488: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3489: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0-1128194399.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3490: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9361/localhost-2120400-CA0Root-1128194349.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3491: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3492: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20251128115201Z nextupdate=20261128115201Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Fri Nov 28 11:52:01 2025 Next Update: Sat Nov 28 11:52:01 2026 CRL Extensions: chains.sh: #3493: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115201Z nextupdate=20261128115201Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:52:01 2025 Next Update: Sat Nov 28 11:52:01 2026 CRL Extensions: chains.sh: #3494: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20251128115201Z nextupdate=20261128115201Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Fri Nov 28 11:52:01 2025 Next Update: Sat Nov 28 11:52:01 2026 CRL Extensions: chains.sh: #3495: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20251128115201Z nextupdate=20261128115201Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Fri Nov 28 11:52:01 2025 Next Update: Sat Nov 28 11:52:01 2026 CRL Extensions: chains.sh: #3496: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115202Z addcert 20 20251128115202Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:52:02 2025 Next Update: Sat Nov 28 11:52:01 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:52:02 2025 CRL Extensions: chains.sh: #3497: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20251128115203Z addcert 40 20251128115203Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Fri Nov 28 11:52:03 2025 Next Update: Sat Nov 28 11:52:01 2026 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Fri Nov 28 11:52:02 2025 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Fri Nov 28 11:52:03 2025 CRL Extensions: chains.sh: #3498: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3499: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3500: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3501: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194876 (0x433ee33c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:56 2025 Not After : Thu Nov 28 11:51:56 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:51:f0:b7:00:79:8b:b2:90:3c:e2:21:c9:70:9b:b6: 8d:e7:67:e6:87:56:e5:6f:67:c7:fe:e8:27:49:41:45: f6:60:0a:d9:ce:2f:c5:e6:af:f7:5a:5b:4c:dc:c5:84: f2:a7:21:ed:c1:a6:b9:e9:ef:ee:d1:c3:94:85:b5:38: 73:bc:14:bb:8e:4e:de:15:c4:0e:cc:d4:8b:43:cf:c3: 42:70:01:d9:2f:43:06:c4:60:0b:a8:66:60:1b:b1:f5: cf:c7:2c:5d:a0:95:0e:59:1c:54:28:c7:c3:7f:1f:4f: f0:9c:da:09:6e:ac:7d:8c:e9:70:43:f7:ae:2d:cb:2e: 48:df:a7:cc:a2:8c:5b:01:54:3c:3e:17:37:1b:80:a4: 1d:de:af:15:83:0b:da:93:b0:cd:8f:63:c7:c1:9e:12: 24:b8:74:0e:ea:49:fc:d6:7a:bc:39:1f:3b:73:8c:5a: 49:4e:db:cf:4b:af:90:ea:e0:3a:3e:59:e0:90:ba:ff: 0a:64:44:4f:42:df:76:1e:75:d9:c6:ea:46:34:63:35: 26:10:51:42:4a:0d:d7:46:3d:e9:fe:b0:58:07:a6:c5: 90:a4:7c:63:49:0a:c2:2e:91:dd:0b:e2:d0:74:c0:77: a7:0e:e6:97:53:4c:37:8b:ad:3c:3a:1d:be:d3:3c:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:8c:f8:49:e2:5e:d2:df:2f:cf:04:2a:c2:3f:c4:1e: f7:be:85:f5:9e:a6:e9:6d:b1:63:19:44:a1:11:90:77: 18:b1:a4:ec:c6:10:c9:8a:67:7f:f7:5d:e7:03:38:06: af:82:79:3a:9e:1e:98:a0:35:40:db:eb:73:bf:0e:8f: 1f:0b:03:d0:e6:6f:50:87:55:30:0c:b1:01:ab:63:15: fc:88:40:56:af:74:ab:c2:a0:bd:c5:e5:db:aa:a8:3c: 49:0f:0f:8d:05:35:33:43:93:0b:5b:f7:a9:b4:37:de: 35:9b:d0:60:74:9b:6e:b8:6f:a4:51:3d:6d:90:f8:09: 95:52:76:d7:31:92:77:94:a1:88:17:78:2a:5c:32:03: 5f:3a:08:3b:7b:71:5c:8a:b3:07:c0:68:c7:24:30:08: ca:02:85:40:95:70:b4:6a:a0:b3:18:e9:1b:ca:b1:3f: bd:57:e7:6b:c9:92:ae:32:4e:cc:7b:96:c1:9a:aa:5b: 50:c0:f6:0d:d1:3a:92:26:e4:80:5b:b4:46:02:2f:ed: 8f:90:af:6e:5f:d0:cf:bd:b3:04:98:37:b1:b1:36:81: de:06:79:2c:e5:8d:f3:72:32:e6:66:b8:98:fa:af:b9: 25:61:35:17:fe:9b:db:93:f7:4e:12:00:7e:d1:2c:d4 Fingerprint (SHA-256): C5:43:1D:EC:80:C6:F0:D5:29:BA:AB:93:63:99:54:9F:01:1E:10:FD:44:2A:74:C6:F7:E9:64:45:7A:98:20:A3 Fingerprint (SHA1): 20:03:30:B5:98:03:F2:CF:06:05:59:5C:1B:2A:43:2F:73:39:3C:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3502: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3503: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194876 (0x433ee33c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Fri Nov 28 11:51:56 2025 Not After : Thu Nov 28 11:51:56 2075 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:51:f0:b7:00:79:8b:b2:90:3c:e2:21:c9:70:9b:b6: 8d:e7:67:e6:87:56:e5:6f:67:c7:fe:e8:27:49:41:45: f6:60:0a:d9:ce:2f:c5:e6:af:f7:5a:5b:4c:dc:c5:84: f2:a7:21:ed:c1:a6:b9:e9:ef:ee:d1:c3:94:85:b5:38: 73:bc:14:bb:8e:4e:de:15:c4:0e:cc:d4:8b:43:cf:c3: 42:70:01:d9:2f:43:06:c4:60:0b:a8:66:60:1b:b1:f5: cf:c7:2c:5d:a0:95:0e:59:1c:54:28:c7:c3:7f:1f:4f: f0:9c:da:09:6e:ac:7d:8c:e9:70:43:f7:ae:2d:cb:2e: 48:df:a7:cc:a2:8c:5b:01:54:3c:3e:17:37:1b:80:a4: 1d:de:af:15:83:0b:da:93:b0:cd:8f:63:c7:c1:9e:12: 24:b8:74:0e:ea:49:fc:d6:7a:bc:39:1f:3b:73:8c:5a: 49:4e:db:cf:4b:af:90:ea:e0:3a:3e:59:e0:90:ba:ff: 0a:64:44:4f:42:df:76:1e:75:d9:c6:ea:46:34:63:35: 26:10:51:42:4a:0d:d7:46:3d:e9:fe:b0:58:07:a6:c5: 90:a4:7c:63:49:0a:c2:2e:91:dd:0b:e2:d0:74:c0:77: a7:0e:e6:97:53:4c:37:8b:ad:3c:3a:1d:be:d3:3c:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:8c:f8:49:e2:5e:d2:df:2f:cf:04:2a:c2:3f:c4:1e: f7:be:85:f5:9e:a6:e9:6d:b1:63:19:44:a1:11:90:77: 18:b1:a4:ec:c6:10:c9:8a:67:7f:f7:5d:e7:03:38:06: af:82:79:3a:9e:1e:98:a0:35:40:db:eb:73:bf:0e:8f: 1f:0b:03:d0:e6:6f:50:87:55:30:0c:b1:01:ab:63:15: fc:88:40:56:af:74:ab:c2:a0:bd:c5:e5:db:aa:a8:3c: 49:0f:0f:8d:05:35:33:43:93:0b:5b:f7:a9:b4:37:de: 35:9b:d0:60:74:9b:6e:b8:6f:a4:51:3d:6d:90:f8:09: 95:52:76:d7:31:92:77:94:a1:88:17:78:2a:5c:32:03: 5f:3a:08:3b:7b:71:5c:8a:b3:07:c0:68:c7:24:30:08: ca:02:85:40:95:70:b4:6a:a0:b3:18:e9:1b:ca:b1:3f: bd:57:e7:6b:c9:92:ae:32:4e:cc:7b:96:c1:9a:aa:5b: 50:c0:f6:0d:d1:3a:92:26:e4:80:5b:b4:46:02:2f:ed: 8f:90:af:6e:5f:d0:cf:bd:b3:04:98:37:b1:b1:36:81: de:06:79:2c:e5:8d:f3:72:32:e6:66:b8:98:fa:af:b9: 25:61:35:17:fe:9b:db:93:f7:4e:12:00:7e:d1:2c:d4 Fingerprint (SHA-256): C5:43:1D:EC:80:C6:F0:D5:29:BA:AB:93:63:99:54:9F:01:1E:10:FD:44:2A:74:C6:F7:E9:64:45:7A:98:20:A3 Fingerprint (SHA1): 20:03:30:B5:98:03:F2:CF:06:05:59:5C:1B:2A:43:2F:73:39:3C:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3504: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3505: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3506: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194880 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3507: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3508: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3509: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3510: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1128194881 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3511: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3512: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3513: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3514: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1128194882 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3515: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3516: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3517: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3518: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1128194883 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3519: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3520: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #3521: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -m 1128194884 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3522: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #3523: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #3524: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3525: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1128194885 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3526: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3527: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3528: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3529: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1128194886 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3530: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3531: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #3532: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #3533: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #3534: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194880 (0x433ee340) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:52:05 2025 Not After : Thu Nov 28 11:52:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:c0:65:27:8c:ad:f2:83:79:b3:22:3b:d0:69:1c:b5: 0a:e8:52:51:b2:4b:c7:69:d7:40:47:0e:df:a2:d0:7c: 1d:1b:e3:6b:3d:99:a1:0e:c7:a5:5e:a2:1c:10:ad:9a: 8c:b0:21:20:0f:80:ef:39:11:d0:22:a0:1c:2d:73:fa: d2:04:ff:de:2c:60:29:8a:c4:7e:f6:54:71:d1:60:a2: a0:59:27:15:43:45:8a:3a:01:39:a5:39:22:17:13:b6: 8f:41:fa:2d:b1:b9:a6:53:82:17:cf:d0:c6:c8:20:02: 3a:c9:85:07:bd:62:8e:6b:39:24:d9:7e:b8:a6:70:4a: 84:7a:f1:a6:05:ee:a0:9e:fb:39:4c:fc:ea:f9:81:84: a6:0b:19:29:83:ad:1c:31:fb:6c:88:c5:a1:2e:f7:3f: 53:d1:95:f4:fa:ec:95:79:6a:88:20:9c:40:0f:09:f3: 91:e6:5f:da:ab:a8:31:e6:d8:ec:84:2b:f6:53:fd:9c: 55:22:cf:be:34:23:a9:31:b0:8b:9f:09:ba:24:19:68: df:76:26:be:1c:66:ec:ec:e3:24:d0:de:35:eb:68:f4: 81:d2:88:37:a7:5d:a8:36:79:3a:3b:f5:57:35:d4:b1: f4:cb:6d:e7:c6:be:d2:31:29:90:13:16:fc:ab:18:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:9c:50:d5:07:f1:7b:a7:24:3d:e4:49:0d:54:7f:65: 45:39:d5:9b:ca:f0:ee:2b:72:61:7e:43:74:f9:60:70: 2c:35:40:05:91:a6:ab:25:09:d8:71:e1:2d:ef:d7:95: 1b:e0:3e:41:5e:a0:9a:9a:fb:5a:02:09:ff:97:c6:59: a4:cb:66:71:bb:d8:ce:30:2b:24:18:61:40:82:5c:52: 4e:64:2f:e1:43:18:1e:25:81:9f:0a:f5:ab:f3:c6:be: 5a:1a:05:2a:22:50:0b:92:cb:bd:4f:f0:d8:3f:8e:0d: 02:db:33:40:3f:7a:c1:27:a5:11:8c:da:0e:31:03:03: ad:a2:97:d5:a9:a0:4e:d7:60:de:73:12:14:03:03:f5: 50:e9:f6:87:a0:3b:3e:ff:72:ea:55:61:f9:7c:e2:5a: 91:ea:a0:12:ec:05:97:a7:e6:78:e0:da:16:8d:66:12: f8:80:78:e3:b2:a3:b6:ad:5e:a5:41:fe:fb:d4:8e:6a: 2e:de:29:94:65:a8:7d:24:aa:96:05:fa:d3:b9:d8:f0: ad:44:94:32:af:96:98:7d:3a:e2:71:2e:b5:19:24:98: a5:a1:85:03:e3:bc:5f:e1:02:ff:28:63:a7:e3:c5:61: 4e:e4:6b:2a:e3:a1:c2:61:c4:4a:d2:5b:34:20:be:bf Fingerprint (SHA-256): B4:BB:C5:AD:F8:81:28:E3:77:DC:DB:91:0B:B2:CA:72:40:B6:09:3F:CB:76:09:1D:B6:3D:98:CA:AA:C8:43:41 Fingerprint (SHA1): 7C:B5:24:C5:90:45:B1:5F:8F:62:66:BA:A3:FD:73:47:F1:DA:91:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3535: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194882 (0x433ee342) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:52:06 2025 Not After : Thu Nov 28 11:52:06 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:fb:0a:7b:90:38:76:95:46:a9:94:50:0c:34:34:1c: bc:86:1a:8e:95:f3:12:c2:66:29:c3:33:30:1f:60:7d: 95:89:e3:8a:13:c4:59:ca:3e:e8:99:7a:3b:83:57:ae: ee:9e:81:5e:ed:74:86:6a:0a:3b:cb:37:82:a3:2c:95: 45:1e:c5:0e:df:04:d0:6a:79:3a:b0:0c:f4:6d:42:24: 60:93:37:0d:d2:40:59:a5:ed:c8:52:1d:d6:27:e3:dc: bf:3f:fa:31:90:f2:b2:37:22:0a:d4:b1:ab:aa:2a:62: 6d:b0:48:54:23:ed:cb:2f:b2:96:b6:7b:33:ec:d0:ec: 69:09:67:31:4c:d8:b6:71:10:8a:c2:b8:9a:f7:35:6e: 2e:60:ab:4b:75:0f:3f:89:56:ef:42:87:07:33:a2:3f: 3c:26:39:0b:63:17:b7:f9:d8:77:90:4a:37:1c:83:1c: 19:de:b9:1a:49:e8:82:13:ad:ed:ba:8a:e9:78:55:4b: b2:36:60:7e:ad:11:40:9d:88:44:ca:c0:d8:b0:f5:85: cb:7f:b5:9b:37:a3:3f:25:83:28:49:93:08:13:e1:1e: 42:80:c2:34:d3:1e:56:0d:6f:57:4e:f2:e3:d1:86:5a: 4c:e5:a0:7f:90:6d:9a:de:78:75:c9:7b:77:65:24:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:ee:5f:82:e5:29:13:96:fa:c9:43:0d:69:42:44:7e: b2:c5:74:9d:89:fc:ee:67:cf:dd:4e:1d:72:f7:da:fa: 73:73:f5:57:95:8b:53:58:9e:53:ff:5d:da:d7:d6:c4: c1:ae:dc:d4:3e:a3:9d:9e:a8:62:d0:07:70:fa:0c:83: 60:4f:d5:ea:34:5d:c2:7a:d6:b6:ca:3a:6f:d0:47:51: 0d:be:9c:3a:ce:a0:e4:a1:98:e5:03:91:77:88:11:05: 33:42:c1:0d:ab:62:6d:3b:ed:ea:91:a5:fd:5e:17:b6: 3a:76:25:25:d4:8d:c5:3a:04:4a:aa:55:91:59:2d:b5: 92:81:1b:f3:26:f5:18:fb:6a:4e:d3:87:2c:8a:dd:fc: 82:24:bd:6d:6c:63:cb:23:71:98:1d:f5:60:05:02:05: bc:3d:14:0e:d9:4d:6b:59:9c:f2:c2:8c:ab:46:e2:8c: 0d:04:ce:f4:42:82:bb:30:ff:bb:de:ed:21:58:95:4b: 58:58:41:4b:49:41:d6:82:8a:3d:b1:4c:64:42:03:9d: a5:a8:bf:b8:41:ce:2a:45:5f:27:1e:90:7b:ac:af:c2: 25:1b:42:a7:68:07:67:48:88:7a:ba:a0:c2:81:83:5c: 18:98:b6:9b:cf:c4:c1:90:40:d5:39:87:27:14:f4:40 Fingerprint (SHA-256): 9E:9A:32:AF:F7:B8:85:B9:67:88:0A:28:7C:AC:9C:A0:05:38:AB:63:6F:34:63:8B:2D:01:DA:22:44:B3:BC:59 Fingerprint (SHA1): 73:55:84:C0:0D:2F:69:23:D1:31:77:33:BE:A9:C3:8B:59:07:8B:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3536: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194880 (0x433ee340) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:52:05 2025 Not After : Thu Nov 28 11:52:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:c0:65:27:8c:ad:f2:83:79:b3:22:3b:d0:69:1c:b5: 0a:e8:52:51:b2:4b:c7:69:d7:40:47:0e:df:a2:d0:7c: 1d:1b:e3:6b:3d:99:a1:0e:c7:a5:5e:a2:1c:10:ad:9a: 8c:b0:21:20:0f:80:ef:39:11:d0:22:a0:1c:2d:73:fa: d2:04:ff:de:2c:60:29:8a:c4:7e:f6:54:71:d1:60:a2: a0:59:27:15:43:45:8a:3a:01:39:a5:39:22:17:13:b6: 8f:41:fa:2d:b1:b9:a6:53:82:17:cf:d0:c6:c8:20:02: 3a:c9:85:07:bd:62:8e:6b:39:24:d9:7e:b8:a6:70:4a: 84:7a:f1:a6:05:ee:a0:9e:fb:39:4c:fc:ea:f9:81:84: a6:0b:19:29:83:ad:1c:31:fb:6c:88:c5:a1:2e:f7:3f: 53:d1:95:f4:fa:ec:95:79:6a:88:20:9c:40:0f:09:f3: 91:e6:5f:da:ab:a8:31:e6:d8:ec:84:2b:f6:53:fd:9c: 55:22:cf:be:34:23:a9:31:b0:8b:9f:09:ba:24:19:68: df:76:26:be:1c:66:ec:ec:e3:24:d0:de:35:eb:68:f4: 81:d2:88:37:a7:5d:a8:36:79:3a:3b:f5:57:35:d4:b1: f4:cb:6d:e7:c6:be:d2:31:29:90:13:16:fc:ab:18:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:9c:50:d5:07:f1:7b:a7:24:3d:e4:49:0d:54:7f:65: 45:39:d5:9b:ca:f0:ee:2b:72:61:7e:43:74:f9:60:70: 2c:35:40:05:91:a6:ab:25:09:d8:71:e1:2d:ef:d7:95: 1b:e0:3e:41:5e:a0:9a:9a:fb:5a:02:09:ff:97:c6:59: a4:cb:66:71:bb:d8:ce:30:2b:24:18:61:40:82:5c:52: 4e:64:2f:e1:43:18:1e:25:81:9f:0a:f5:ab:f3:c6:be: 5a:1a:05:2a:22:50:0b:92:cb:bd:4f:f0:d8:3f:8e:0d: 02:db:33:40:3f:7a:c1:27:a5:11:8c:da:0e:31:03:03: ad:a2:97:d5:a9:a0:4e:d7:60:de:73:12:14:03:03:f5: 50:e9:f6:87:a0:3b:3e:ff:72:ea:55:61:f9:7c:e2:5a: 91:ea:a0:12:ec:05:97:a7:e6:78:e0:da:16:8d:66:12: f8:80:78:e3:b2:a3:b6:ad:5e:a5:41:fe:fb:d4:8e:6a: 2e:de:29:94:65:a8:7d:24:aa:96:05:fa:d3:b9:d8:f0: ad:44:94:32:af:96:98:7d:3a:e2:71:2e:b5:19:24:98: a5:a1:85:03:e3:bc:5f:e1:02:ff:28:63:a7:e3:c5:61: 4e:e4:6b:2a:e3:a1:c2:61:c4:4a:d2:5b:34:20:be:bf Fingerprint (SHA-256): B4:BB:C5:AD:F8:81:28:E3:77:DC:DB:91:0B:B2:CA:72:40:B6:09:3F:CB:76:09:1D:B6:3D:98:CA:AA:C8:43:41 Fingerprint (SHA1): 7C:B5:24:C5:90:45:B1:5F:8F:62:66:BA:A3:FD:73:47:F1:DA:91:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3537: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #3538: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194880 (0x433ee340) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:52:05 2025 Not After : Thu Nov 28 11:52:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:c0:65:27:8c:ad:f2:83:79:b3:22:3b:d0:69:1c:b5: 0a:e8:52:51:b2:4b:c7:69:d7:40:47:0e:df:a2:d0:7c: 1d:1b:e3:6b:3d:99:a1:0e:c7:a5:5e:a2:1c:10:ad:9a: 8c:b0:21:20:0f:80:ef:39:11:d0:22:a0:1c:2d:73:fa: d2:04:ff:de:2c:60:29:8a:c4:7e:f6:54:71:d1:60:a2: a0:59:27:15:43:45:8a:3a:01:39:a5:39:22:17:13:b6: 8f:41:fa:2d:b1:b9:a6:53:82:17:cf:d0:c6:c8:20:02: 3a:c9:85:07:bd:62:8e:6b:39:24:d9:7e:b8:a6:70:4a: 84:7a:f1:a6:05:ee:a0:9e:fb:39:4c:fc:ea:f9:81:84: a6:0b:19:29:83:ad:1c:31:fb:6c:88:c5:a1:2e:f7:3f: 53:d1:95:f4:fa:ec:95:79:6a:88:20:9c:40:0f:09:f3: 91:e6:5f:da:ab:a8:31:e6:d8:ec:84:2b:f6:53:fd:9c: 55:22:cf:be:34:23:a9:31:b0:8b:9f:09:ba:24:19:68: df:76:26:be:1c:66:ec:ec:e3:24:d0:de:35:eb:68:f4: 81:d2:88:37:a7:5d:a8:36:79:3a:3b:f5:57:35:d4:b1: f4:cb:6d:e7:c6:be:d2:31:29:90:13:16:fc:ab:18:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:9c:50:d5:07:f1:7b:a7:24:3d:e4:49:0d:54:7f:65: 45:39:d5:9b:ca:f0:ee:2b:72:61:7e:43:74:f9:60:70: 2c:35:40:05:91:a6:ab:25:09:d8:71:e1:2d:ef:d7:95: 1b:e0:3e:41:5e:a0:9a:9a:fb:5a:02:09:ff:97:c6:59: a4:cb:66:71:bb:d8:ce:30:2b:24:18:61:40:82:5c:52: 4e:64:2f:e1:43:18:1e:25:81:9f:0a:f5:ab:f3:c6:be: 5a:1a:05:2a:22:50:0b:92:cb:bd:4f:f0:d8:3f:8e:0d: 02:db:33:40:3f:7a:c1:27:a5:11:8c:da:0e:31:03:03: ad:a2:97:d5:a9:a0:4e:d7:60:de:73:12:14:03:03:f5: 50:e9:f6:87:a0:3b:3e:ff:72:ea:55:61:f9:7c:e2:5a: 91:ea:a0:12:ec:05:97:a7:e6:78:e0:da:16:8d:66:12: f8:80:78:e3:b2:a3:b6:ad:5e:a5:41:fe:fb:d4:8e:6a: 2e:de:29:94:65:a8:7d:24:aa:96:05:fa:d3:b9:d8:f0: ad:44:94:32:af:96:98:7d:3a:e2:71:2e:b5:19:24:98: a5:a1:85:03:e3:bc:5f:e1:02:ff:28:63:a7:e3:c5:61: 4e:e4:6b:2a:e3:a1:c2:61:c4:4a:d2:5b:34:20:be:bf Fingerprint (SHA-256): B4:BB:C5:AD:F8:81:28:E3:77:DC:DB:91:0B:B2:CA:72:40:B6:09:3F:CB:76:09:1D:B6:3D:98:CA:AA:C8:43:41 Fingerprint (SHA1): 7C:B5:24:C5:90:45:B1:5F:8F:62:66:BA:A3:FD:73:47:F1:DA:91:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3539: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194882 (0x433ee342) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Fri Nov 28 11:52:06 2025 Not After : Thu Nov 28 11:52:06 2030 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:fb:0a:7b:90:38:76:95:46:a9:94:50:0c:34:34:1c: bc:86:1a:8e:95:f3:12:c2:66:29:c3:33:30:1f:60:7d: 95:89:e3:8a:13:c4:59:ca:3e:e8:99:7a:3b:83:57:ae: ee:9e:81:5e:ed:74:86:6a:0a:3b:cb:37:82:a3:2c:95: 45:1e:c5:0e:df:04:d0:6a:79:3a:b0:0c:f4:6d:42:24: 60:93:37:0d:d2:40:59:a5:ed:c8:52:1d:d6:27:e3:dc: bf:3f:fa:31:90:f2:b2:37:22:0a:d4:b1:ab:aa:2a:62: 6d:b0:48:54:23:ed:cb:2f:b2:96:b6:7b:33:ec:d0:ec: 69:09:67:31:4c:d8:b6:71:10:8a:c2:b8:9a:f7:35:6e: 2e:60:ab:4b:75:0f:3f:89:56:ef:42:87:07:33:a2:3f: 3c:26:39:0b:63:17:b7:f9:d8:77:90:4a:37:1c:83:1c: 19:de:b9:1a:49:e8:82:13:ad:ed:ba:8a:e9:78:55:4b: b2:36:60:7e:ad:11:40:9d:88:44:ca:c0:d8:b0:f5:85: cb:7f:b5:9b:37:a3:3f:25:83:28:49:93:08:13:e1:1e: 42:80:c2:34:d3:1e:56:0d:6f:57:4e:f2:e3:d1:86:5a: 4c:e5:a0:7f:90:6d:9a:de:78:75:c9:7b:77:65:24:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:ee:5f:82:e5:29:13:96:fa:c9:43:0d:69:42:44:7e: b2:c5:74:9d:89:fc:ee:67:cf:dd:4e:1d:72:f7:da:fa: 73:73:f5:57:95:8b:53:58:9e:53:ff:5d:da:d7:d6:c4: c1:ae:dc:d4:3e:a3:9d:9e:a8:62:d0:07:70:fa:0c:83: 60:4f:d5:ea:34:5d:c2:7a:d6:b6:ca:3a:6f:d0:47:51: 0d:be:9c:3a:ce:a0:e4:a1:98:e5:03:91:77:88:11:05: 33:42:c1:0d:ab:62:6d:3b:ed:ea:91:a5:fd:5e:17:b6: 3a:76:25:25:d4:8d:c5:3a:04:4a:aa:55:91:59:2d:b5: 92:81:1b:f3:26:f5:18:fb:6a:4e:d3:87:2c:8a:dd:fc: 82:24:bd:6d:6c:63:cb:23:71:98:1d:f5:60:05:02:05: bc:3d:14:0e:d9:4d:6b:59:9c:f2:c2:8c:ab:46:e2:8c: 0d:04:ce:f4:42:82:bb:30:ff:bb:de:ed:21:58:95:4b: 58:58:41:4b:49:41:d6:82:8a:3d:b1:4c:64:42:03:9d: a5:a8:bf:b8:41:ce:2a:45:5f:27:1e:90:7b:ac:af:c2: 25:1b:42:a7:68:07:67:48:88:7a:ba:a0:c2:81:83:5c: 18:98:b6:9b:cf:c4:c1:90:40:d5:39:87:27:14:f4:40 Fingerprint (SHA-256): 9E:9A:32:AF:F7:B8:85:B9:67:88:0A:28:7C:AC:9C:A0:05:38:AB:63:6F:34:63:8B:2D:01:DA:22:44:B3:BC:59 Fingerprint (SHA1): 73:55:84:C0:0D:2F:69:23:D1:31:77:33:BE:A9:C3:8B:59:07:8B:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3540: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #3541: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #3542: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #3543: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194880 (0x433ee340) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:52:05 2025 Not After : Thu Nov 28 11:52:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:c0:65:27:8c:ad:f2:83:79:b3:22:3b:d0:69:1c:b5: 0a:e8:52:51:b2:4b:c7:69:d7:40:47:0e:df:a2:d0:7c: 1d:1b:e3:6b:3d:99:a1:0e:c7:a5:5e:a2:1c:10:ad:9a: 8c:b0:21:20:0f:80:ef:39:11:d0:22:a0:1c:2d:73:fa: d2:04:ff:de:2c:60:29:8a:c4:7e:f6:54:71:d1:60:a2: a0:59:27:15:43:45:8a:3a:01:39:a5:39:22:17:13:b6: 8f:41:fa:2d:b1:b9:a6:53:82:17:cf:d0:c6:c8:20:02: 3a:c9:85:07:bd:62:8e:6b:39:24:d9:7e:b8:a6:70:4a: 84:7a:f1:a6:05:ee:a0:9e:fb:39:4c:fc:ea:f9:81:84: a6:0b:19:29:83:ad:1c:31:fb:6c:88:c5:a1:2e:f7:3f: 53:d1:95:f4:fa:ec:95:79:6a:88:20:9c:40:0f:09:f3: 91:e6:5f:da:ab:a8:31:e6:d8:ec:84:2b:f6:53:fd:9c: 55:22:cf:be:34:23:a9:31:b0:8b:9f:09:ba:24:19:68: df:76:26:be:1c:66:ec:ec:e3:24:d0:de:35:eb:68:f4: 81:d2:88:37:a7:5d:a8:36:79:3a:3b:f5:57:35:d4:b1: f4:cb:6d:e7:c6:be:d2:31:29:90:13:16:fc:ab:18:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:9c:50:d5:07:f1:7b:a7:24:3d:e4:49:0d:54:7f:65: 45:39:d5:9b:ca:f0:ee:2b:72:61:7e:43:74:f9:60:70: 2c:35:40:05:91:a6:ab:25:09:d8:71:e1:2d:ef:d7:95: 1b:e0:3e:41:5e:a0:9a:9a:fb:5a:02:09:ff:97:c6:59: a4:cb:66:71:bb:d8:ce:30:2b:24:18:61:40:82:5c:52: 4e:64:2f:e1:43:18:1e:25:81:9f:0a:f5:ab:f3:c6:be: 5a:1a:05:2a:22:50:0b:92:cb:bd:4f:f0:d8:3f:8e:0d: 02:db:33:40:3f:7a:c1:27:a5:11:8c:da:0e:31:03:03: ad:a2:97:d5:a9:a0:4e:d7:60:de:73:12:14:03:03:f5: 50:e9:f6:87:a0:3b:3e:ff:72:ea:55:61:f9:7c:e2:5a: 91:ea:a0:12:ec:05:97:a7:e6:78:e0:da:16:8d:66:12: f8:80:78:e3:b2:a3:b6:ad:5e:a5:41:fe:fb:d4:8e:6a: 2e:de:29:94:65:a8:7d:24:aa:96:05:fa:d3:b9:d8:f0: ad:44:94:32:af:96:98:7d:3a:e2:71:2e:b5:19:24:98: a5:a1:85:03:e3:bc:5f:e1:02:ff:28:63:a7:e3:c5:61: 4e:e4:6b:2a:e3:a1:c2:61:c4:4a:d2:5b:34:20:be:bf Fingerprint (SHA-256): B4:BB:C5:AD:F8:81:28:E3:77:DC:DB:91:0B:B2:CA:72:40:B6:09:3F:CB:76:09:1D:B6:3D:98:CA:AA:C8:43:41 Fingerprint (SHA1): 7C:B5:24:C5:90:45:B1:5F:8F:62:66:BA:A3:FD:73:47:F1:DA:91:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3544: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194884 (0x433ee344) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:52:08 2025 Not After : Thu Nov 28 11:52:08 2075 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:fd:55:1c:d8:1c:88:51:5d:25:f1:4e:52:2b:4e:82: 5c:10:a9:36:10:9c:13:7a:63:e1:64:a3:09:67:2a:43: 5d:d6:ee:54:d6:49:d5:5f:db:9e:fb:4b:dc:2a:f0:ed: dc:e9:a9:ca:c7:18:87:4f:9e:7e:14:15:92:ba:8a:6e: 67:13:ec:f6:e6:27:05:2a:8c:e5:3e:8d:93:05:45:67: b8:3e:7b:99:85:15:5f:15:28:25:0b:55:22:de:b1:ff: e9:93:fe:25:f0:6f:cc:53:0e:42:e3:2d:fe:d0:d7:b8: f0:11:26:e3:c9:da:32:05:5a:c3:0d:4c:34:4c:6d:8f: 29:4c:aa:f9:63:80:2c:45:72:c0:6a:b5:30:2b:28:2c: 36:a5:f2:58:e7:2d:5e:2c:50:38:63:bb:b2:e1:b2:88: 64:6f:f9:e5:e1:b3:31:75:a1:21:b6:2c:89:33:1a:d8: 56:cc:65:99:c0:03:9e:87:22:07:9b:b0:ca:47:12:9b: 40:c9:3e:2c:58:13:6a:19:94:b2:3b:48:61:5d:b5:d1: 94:60:a2:9f:13:dd:f0:ca:0c:e7:f3:d6:0d:e6:bd:a2: 55:18:8f:30:0b:8f:92:a2:87:8b:93:c9:89:2c:88:8d: b5:d0:02:10:14:92:1c:97:bd:9d:c8:e7:c8:01:f2:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:6b:13:9a:5f:2b:71:ef:60:6b:94:e8:90:8f:ba:a7: ce:8b:f2:58:1c:74:44:29:6a:bc:ff:08:22:e2:15:32: 43:f2:4b:80:b3:13:0b:f7:35:9d:89:77:65:ac:cf:24: 86:cc:40:34:70:20:11:d9:5a:95:c4:c4:74:e1:6f:b2: a4:44:21:6d:85:3a:ba:45:1c:e9:ac:c0:20:40:25:57: 4a:ee:49:a4:c8:e0:b8:65:d9:dd:dd:3b:94:d7:90:9c: 9c:e2:79:9f:53:e6:40:c6:14:34:26:18:fa:65:1e:02: 70:0a:81:78:93:50:54:54:bc:be:63:3b:24:56:14:98: b0:e7:d4:32:8e:79:bf:08:47:dc:ef:ec:a7:b7:96:a6: 3c:c8:22:49:d6:2e:f6:6f:99:f5:e3:e1:a0:ed:32:52: 0a:1d:4d:8d:6f:7a:0d:a9:4f:ae:2f:8c:7e:c0:61:ec: 3d:cf:5c:67:0a:dc:df:0d:6c:06:0e:4a:aa:99:bc:26: fa:2c:dc:76:cd:c6:30:58:94:4d:0a:be:f3:18:58:95: e5:4d:59:21:bb:11:ba:a8:84:2d:65:41:e4:77:9c:bc: c0:81:a2:50:e0:63:b5:e4:e4:38:d3:ed:de:65:5e:2a: 57:3c:2b:a1:93:b5:11:2d:17:9d:d7:9a:89:58:c8:0e Fingerprint (SHA-256): B5:90:C1:12:0A:61:B3:73:89:B4:4E:ED:99:01:25:AE:8B:CC:F7:B9:F1:0E:0B:6A:3A:7F:BB:7E:8B:67:34:67 Fingerprint (SHA1): 54:C9:75:78:97:6E:95:4C:70:7D:83:B3:E5:46:6C:99:66:C9:93:1C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #3545: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194880 (0x433ee340) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Fri Nov 28 11:52:05 2025 Not After : Thu Nov 28 11:52:05 2075 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:c0:65:27:8c:ad:f2:83:79:b3:22:3b:d0:69:1c:b5: 0a:e8:52:51:b2:4b:c7:69:d7:40:47:0e:df:a2:d0:7c: 1d:1b:e3:6b:3d:99:a1:0e:c7:a5:5e:a2:1c:10:ad:9a: 8c:b0:21:20:0f:80:ef:39:11:d0:22:a0:1c:2d:73:fa: d2:04:ff:de:2c:60:29:8a:c4:7e:f6:54:71:d1:60:a2: a0:59:27:15:43:45:8a:3a:01:39:a5:39:22:17:13:b6: 8f:41:fa:2d:b1:b9:a6:53:82:17:cf:d0:c6:c8:20:02: 3a:c9:85:07:bd:62:8e:6b:39:24:d9:7e:b8:a6:70:4a: 84:7a:f1:a6:05:ee:a0:9e:fb:39:4c:fc:ea:f9:81:84: a6:0b:19:29:83:ad:1c:31:fb:6c:88:c5:a1:2e:f7:3f: 53:d1:95:f4:fa:ec:95:79:6a:88:20:9c:40:0f:09:f3: 91:e6:5f:da:ab:a8:31:e6:d8:ec:84:2b:f6:53:fd:9c: 55:22:cf:be:34:23:a9:31:b0:8b:9f:09:ba:24:19:68: df:76:26:be:1c:66:ec:ec:e3:24:d0:de:35:eb:68:f4: 81:d2:88:37:a7:5d:a8:36:79:3a:3b:f5:57:35:d4:b1: f4:cb:6d:e7:c6:be:d2:31:29:90:13:16:fc:ab:18:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:9c:50:d5:07:f1:7b:a7:24:3d:e4:49:0d:54:7f:65: 45:39:d5:9b:ca:f0:ee:2b:72:61:7e:43:74:f9:60:70: 2c:35:40:05:91:a6:ab:25:09:d8:71:e1:2d:ef:d7:95: 1b:e0:3e:41:5e:a0:9a:9a:fb:5a:02:09:ff:97:c6:59: a4:cb:66:71:bb:d8:ce:30:2b:24:18:61:40:82:5c:52: 4e:64:2f:e1:43:18:1e:25:81:9f:0a:f5:ab:f3:c6:be: 5a:1a:05:2a:22:50:0b:92:cb:bd:4f:f0:d8:3f:8e:0d: 02:db:33:40:3f:7a:c1:27:a5:11:8c:da:0e:31:03:03: ad:a2:97:d5:a9:a0:4e:d7:60:de:73:12:14:03:03:f5: 50:e9:f6:87:a0:3b:3e:ff:72:ea:55:61:f9:7c:e2:5a: 91:ea:a0:12:ec:05:97:a7:e6:78:e0:da:16:8d:66:12: f8:80:78:e3:b2:a3:b6:ad:5e:a5:41:fe:fb:d4:8e:6a: 2e:de:29:94:65:a8:7d:24:aa:96:05:fa:d3:b9:d8:f0: ad:44:94:32:af:96:98:7d:3a:e2:71:2e:b5:19:24:98: a5:a1:85:03:e3:bc:5f:e1:02:ff:28:63:a7:e3:c5:61: 4e:e4:6b:2a:e3:a1:c2:61:c4:4a:d2:5b:34:20:be:bf Fingerprint (SHA-256): B4:BB:C5:AD:F8:81:28:E3:77:DC:DB:91:0B:B2:CA:72:40:B6:09:3F:CB:76:09:1D:B6:3D:98:CA:AA:C8:43:41 Fingerprint (SHA1): 7C:B5:24:C5:90:45:B1:5F:8F:62:66:BA:A3:FD:73:47:F1:DA:91:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3546: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #3547: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #3548: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #3549: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #3550: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #3551: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1128194885 (0x433ee345) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Fri Nov 28 11:52:09 2025 Not After : Thu Nov 28 11:52:09 2030 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:52:dc:6e:9d:95:6b:6b:fd:c2:68:09:22:7b:38:a4: 20:17:03:17:4c:19:f7:95:b6:70:d1:eb:48:82:da:fd: 1d:82:6b:23:fe:7d:a5:ae:02:ef:b1:6f:ea:03:6f:a3: ca:d6:d0:07:4a:61:d6:bf:39:6e:a4:03:8f:a0:dd:b9: 85:ba:98:fc:03:f4:4c:46:7f:50:15:c7:68:c4:9a:68: d4:5d:6f:67:f7:bf:5b:53:27:4e:9a:d5:eb:46:4c:4b: 5c:63:00:50:a1:be:f9:41:7b:ed:bf:27:b5:bc:2d:bd: 97:72:b4:96:17:1b:db:a7:4f:8c:04:0a:6a:68:9d:e9: db:f5:89:7b:18:c0:7a:ef:d9:26:27:ed:cd:3f:f4:5c: f4:b0:fb:21:e2:83:d3:46:0e:fc:dc:1b:8d:bc:e7:a0: 7d:c4:12:c2:70:5d:82:66:92:df:ca:51:0a:94:88:c7: 49:08:b0:d1:6d:26:d8:4c:ab:27:f5:2b:90:8c:5b:6d: 9d:55:ba:7d:7e:33:95:50:80:a0:cc:04:f5:c7:06:3b: 69:35:e7:c0:4f:c5:f6:e7:2e:f9:5c:1c:78:53:bb:68: 7c:1f:40:54:2d:2f:da:4e:18:64:99:86:3e:a4:31:36: 36:51:e4:f6:b2:62:c1:b8:98:96:dd:6a:7b:b9:22:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:03:e6:4a:05:fa:18:5d:dd:c7:14:98:f9:26:f8:d5: ad:74:6a:f3:59:d3:c7:c7:db:e5:2a:ac:8b:0f:62:77: 9b:a8:9e:9a:18:b8:20:84:8d:66:d4:c8:02:9a:d0:27: 49:f2:0e:1f:27:70:d3:d4:c4:19:10:b9:3f:30:2f:12: f5:54:78:f0:20:e6:ee:77:33:c7:47:06:a2:52:47:09: 96:3a:da:a6:29:0a:40:c6:53:e3:6e:5e:d8:d6:d1:3a: 34:e9:a6:58:23:40:52:e5:d1:54:93:57:b8:4e:ea:5d: 12:44:42:fd:27:c9:a1:70:2f:37:8e:78:e8:03:cb:ae: 87:bb:d9:cf:1b:44:f1:e2:d3:57:07:24:4e:3d:70:21: a0:c1:50:6b:65:da:ef:ac:9d:7e:6a:a1:85:a4:c1:f0: 73:51:e8:38:fb:f6:84:a3:47:5c:f6:7e:1e:11:68:da: cf:f6:34:7b:35:b6:cc:50:38:03:18:be:86:0b:dd:bb: ee:e3:0a:c2:f3:29:01:34:81:b2:be:fb:73:bb:a0:be: 40:06:6b:f1:b0:ed:0a:1f:c0:32:7e:e2:9d:8b:52:ed: 7b:0d:ee:1f:3c:a4:12:93:49:c2:29:ad:96:48:90:a4: 2a:9b:99:a6:b3:3a:1c:64:cc:f8:5a:e5:6c:ad:90:46 Fingerprint (SHA-256): CA:C6:76:6C:3E:8C:0E:9D:49:F2:B0:A2:02:9B:5D:18:DA:FB:C2:02:F2:4C:2A:A1:DD:EA:6E:B4:10:B7:4C:33 Fingerprint (SHA1): 71:88:AE:EF:C0:7E:E6:2A:61:C0:68:BE:32:E8:E4:65:8A:08:D6:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #3552: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #3553: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #3554: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #3555: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #3556: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #3557: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3558: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3559: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3560: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3561: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3562: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3563: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3564: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3565: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3566: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3567: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3568: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8182: Peer's certificate has an invalid signature. Returned value is 1, expected result is fail chains.sh: #3569: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3570: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3571: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3572: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3573: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3574: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3575: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3576: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.112/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #3577: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 2346683 at Fri Nov 28 19:52:13 CST 2025 kill -USR1 2346683 httpserv: normal termination httpserv -b -p 9361 2>/dev/null; httpserv with PID 2346683 killed at Fri Nov 28 19:52:13 CST 2025 TIMESTAMP chains END: Fri Nov 28 19:52:13 CST 2025 Running tests for ec TIMESTAMP ec BEGIN: Fri Nov 28 19:52:13 CST 2025 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Fri Nov 28 19:52:13 CST 2025 ecperf.sh: ecperf test =============================== Testing NIST-P256 using freebl implementation... ECDH_Derive count: 100 sec: 0.06 op/sec: 1659.72 ECDSA_Sign count: 100 sec: 0.03 op/sec: 3348.74 ECDHE max rate = 1252.12 ECDSA_Verify count: 100 sec: 0.07 op/sec: 1361.64 ... okay. Testing NIST-P384 using freebl implementation... ECDH_Derive count: 100 sec: 0.17 op/sec: 586.75 ECDSA_Sign count: 100 sec: 0.18 op/sec: 553.59 ECDHE max rate = 285.08 ECDSA_Verify count: 100 sec: 0.34 op/sec: 293.00 ... okay. Testing NIST-P521 using freebl implementation... ECDH_Derive count: 100 sec: 0.42 op/sec: 238.63 ECDSA_Sign count: 100 sec: 0.45 op/sec: 224.38 ECDHE max rate = 115.75 ECDSA_Verify count: 100 sec: 0.84 op/sec: 118.93 ... okay. Testing Curve25519 using freebl implementation... ECDH_Derive count: 100 sec: 0.01 op/sec: 7810.67 ... okay. ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Fri Nov 28 19:52:16 CST 2025 Running ec tests for ectest TIMESTAMP ectest BEGIN: Fri Nov 28 19:52:16 CST 2025 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: freebl ec tests - PASSED ectest.sh: #7: pk11 ec tests - PASSED TIMESTAMP ectest END: Fri Nov 28 19:52:17 CST 2025 TIMESTAMP ec END: Fri Nov 28 19:52:17 CST 2025 ec.sh: Testing with non-threadsafe softoken =============================== Running test cycle: THREAD_UNSAFE ---------------------- List of tests that will be executed: ssl Running tests for ssl TIMESTAMP ssl BEGIN: Fri Nov 28 19:52:17 CST 2025 rm: cannot remove '/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.THREAD_UNSAFE.cert.cache.tar.gz': No such file or directory cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #79: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #80: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #82: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #110: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #111: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #114: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k a25932f6fd6ceda7d040203d2ca5c7778a133baf -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k d967bc460c58984d1ef2f3b1013cc5c27785ec09 -s CN=orphan -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:7c:25:4a:00:ff:6a:2d:a1:6a:ec:e9:78:a0:93: 3f:80:09:31:3e:d7:be:51:f9:c4:87:b7:37:1f:92:3d: c5:58:d6:24:0b:2e:24:9f:74:36:ac:5c:16:05:8e:b3: c4:44:ff:71:f6:c5:d9:14:d3:26:e7:ef:61:5b:11:40: b1:cb:ca:b5:af:d0:4b:8d:57:8f:d3:68:db:15:90:a7: 4d:7f:71:00:17:0a:03:d2:61:ae:a2:d6:a7:cc:ec:20: e9:4d:d9:47:ee:49:8e:52:02:a5:13:ab:ff:9c:86:ad: 4a:49:33:70:65:18:fb:34:ca:45:d3:50:ed:31:98:56: cc:67:17:a1:e1:e4:57:42:06:df:86:f1:8d:5e:78:5d: 2d:f3:60:9a:d3:45:00:55:20:e8:8d:36:f9:47:3c:f8: 19:1d:48:4f:45:19:9f:bd:bc:a9:01:08:22:7b:27:c2: ea:e0:6f:4f:a3:34:f6:91:25:4a:d0:a9:a9:01:f2:54: 7a:4d:d3:bd:22:1c:e3:b7:7c:81:1d:fc:19:c5:7d:56: 84:75:3f:75:82:38:b6:76:b4:5a:f2:f5:4a:59:1b:af: 8b:3e:fa:30:ce:ae:8d:a3:70:99:9f:7d:96:af:ac:60: 06:7c:5e:eb:d0:cd:60:22:2c:5b:a3:46:cd:cd:14:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:86:41:c6:b9:8e:ff:2a:f4:3e:3f:79:01:5f:21:10: a2:42:cf:9d:2f:86:e9:f4:d5:85:cb:f3:74:c1:fa:59: 43:df:16:20:38:b2:f0:be:96:9a:19:08:0e:f3:0b:9d: d4:75:0c:6c:f0:aa:53:7d:27:fa:c2:fe:f1:a0:ea:08: 5f:08:02:70:31:ba:5e:5e:3a:dd:c7:dd:1c:83:75:46: 64:26:20:60:7d:df:99:42:f7:db:dd:b9:b4:5e:a1:f7: 57:b6:ad:58:56:19:b6:8a:97:ca:ba:da:6d:aa:3b:1b: 72:a5:6d:51:d6:1b:24:85:19:6a:e9:0b:a5:c7:eb:74: d5:7b:13:e2:da:16:35:99:9c:9c:7f:5b:cb:4e:77:9f: b9:2c:6a:4a:ad:e6:89:cd:37:29:c7:39:58:5a:f0:3e: 9d:f7:39:5c:bc:f4:9a:dd:ce:51:d1:20:8c:6a:df:27: 58:5b:fb:1f:66:0e:80:5b:81:82:4f:08:1b:68:77:cc: f3:72:39:8e:9e:6c:d1:6b:89:ab:8c:86:e1:3c:12:cd: 86:31:66:fb:06:91:ea:6d:01:e8:e8:9f:0d:91:bc:f5: 6a:c6:75:0e:06:bd:42:d4:93:f7:ad:b4:e6:b3:81:92: 9f:b5:5a:95:7a:e2:43:3a:d4:45:6b:e4:ea:88:84:08 Fingerprint (SHA-256): 07:2C:AA:2B:01:83:8E:B5:38:FC:47:8B:7B:B8:D6:91:3A:3A:C0:68:F9:B6:41:36:DA:E7:BF:72:46:0C:E6:AB Fingerprint (SHA1): 42:89:8D:E1:10:90:AB:FA:63:C6:65:39:E0:45:C9:02:15:A2:80:60 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:a5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:56 2025 Not After : Sat Feb 28 11:52:56 2026 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:6c:3e:a5:34:9c:98:10:1f:e2:00:b6:2a:ea:16:de: 2f:7a:54:d6:d7:b5:2c:73:1c:5d:82:94:9d:0a:62:fb: 66:65:45:3a:b3:05:95:38:2d:47:a6:5c:21:57:12:14: 60:70:76:69:8c:d6:7b:ff:ad:cc:9c:92:02:12:8f:93: a4:84:45:0f:31:6e:65:dc:95:28:cf:d7:28:3c:a7:fe: 7d:9f:fd:08:b4:88:3d:2d:da:f8:07:e4:e9:ff:ee:a0: f1:7f:94:38:d2:93:3a:70:4b:12:08:a8:21:76:ef:f7: 18:30:04:db:a1:5d:ca:0c:c9:aa:a4:b3:97:b7:51:91: 68:35:1e:b8:ee:6b:33:e6:9e:92:ef:cc:b1:15:14:28: e2:71:ed:04:d1:b8:26:db:93:07:28:f1:04:70:6a:55: c6:8e:c6:f8:78:fb:6a:2a:07:71:84:41:16:c3:ee:00: 48:23:db:9f:72:b9:1c:9a:7f:df:de:2b:97:45:8a:1c: f0:b7:50:a3:e4:dc:2d:d6:23:3b:46:39:38:6a:d0:b7: 6a:22:6e:5f:a4:11:bc:28:54:81:1d:ca:33:1e:96:e6: 9c:4a:da:e8:6c:9b:ab:5e:1b:2b:3e:0f:36:1c:c8:36: 05:11:07:fe:1b:16:4d:d1:9c:91:d6:d3:f1:21:31:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e5:bf:a4:7d:c9:f4:d5:7a:2f:4a:78:e1:40:7d:fb:76: 9b:28:13:93:67:cb:af:ed:9b:b2:18:29:e4:2a:3d:93: 17:93:9e:8a:f8:11:1a:86:02:1c:0b:cf:c8:4c:95:4c: bd:2a:c0:07:05:df:d9:95:c0:b2:04:cb:73:25:a1:a5: 44:a7:b6:0c:51:e6:fc:48:47:8c:ac:9f:de:ae:79:6a: 14:fb:82:1e:f5:8b:bf:38:da:88:ff:e2:08:ed:d6:0f: c6:65:6f:9a:ad:01:71:c6:90:63:1a:dd:d6:60:6b:df: 83:09:88:d7:07:82:9b:1a:eb:35:bf:4f:1c:b4:49:64: f1:23:8a:9b:65:0e:55:4a:d2:2f:16:6f:97:35:97:9a: c1:c3:7f:eb:fa:8c:b4:36:88:fa:6d:5e:bd:e8:08:21: 32:51:69:63:11:09:d9:87:83:4a:b7:8a:49:48:d2:5e: 0c:c2:92:2e:19:4e:d9:23:15:a6:79:6e:1e:61:31:31: c2:b5:fd:fd:32:a2:2d:fd:bf:48:c5:38:2b:54:a3:e3: 4c:ac:4c:e7:36:4c:c2:b7:0b:39:f7:24:a1:6d:52:19: 66:1e:fb:4b:2b:42:65:52:c2:d6:ad:b6:8d:42:6c:0a: 9a:6f:bb:9a:2a:b3:2d:68:82:39:ca:37:12:54:7a:aa Fingerprint (SHA-256): B8:B1:06:86:6E:E6:F4:43:CD:D3:45:A8:02:05:A7:8E:56:DC:27:45:71:D1:AA:A8:D9:1C:FC:56:C4:71:18:6C Fingerprint (SHA1): 22:96:50:01:87:5A:F4:7D:2B:8D:E4:71:85:5A:4A:76:83:D8:E3:09 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:a5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:56 2025 Not After : Sat Feb 28 11:52:56 2026 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:b5:87:8b:8a:39:22:54:11:1b:59:0b:01:c4:57:37: ef:83:2a:5d:9b:69:86:1e:5f:7b:5e:37:2f:3e:7a:d7: 03:3b:79:64:66:d6:d9:43:99:87:ae:50:05:9b:41:e5: a6:07:23:c0:ca:cc:f5:4c:3d:b1:5e:3a:4a:f2:33:50: 22:57:9f:00:af:d9:44:5d:20:65:d4:0f:b0:0f:43:f0: 6d:a6:85:8c:96:73:ca:c9:a4:24:6d:c4:53:ec:ba:03: 19:87:20:6f:66:d5:6e:ea:63:bb:21:31:56:14:6a:b4: 11:51:e4:2c:a7:56:ac:72:0e:ea:d4:d4:56:8d:d6:b1: a9:43:98:ac:b1:d5:53:db:e9:64:25:5e:fd:ab:f1:02: d5:7e:e3:44:91:0d:8a:e4:cf:03:99:75:58:2d:6b:d9: eb:ae:08:4b:ae:00:3a:73:da:f6:66:b0:e1:52:b9:97: 65:0f:e9:d0:d6:d7:44:fc:4a:3a:13:84:0d:b4:01:17: 61:e7:ab:db:d7:8d:a1:a0:c2:ef:46:2a:54:81:c5:1e: 67:6f:d0:ff:20:dd:43:2b:75:02:a4:e9:bc:ef:a0:9e: 52:bb:cd:c1:31:01:fd:1f:06:86:30:c3:8b:42:36:fd: 8e:f9:8d:40:c6:3c:c4:7b:3a:35:ef:68:ff:6f:4a:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:8d:5d:64:d9:ad:92:e9:da:b0:5c:5e:91:52:fa:9e: 08:90:6a:79:3a:b1:4c:0a:e1:c5:aa:81:29:f9:fd:01: 08:eb:12:5a:6c:4f:8a:00:70:0b:41:9b:a5:ef:2a:2d: b9:06:36:1b:00:30:fa:47:f2:a0:be:6b:bc:01:91:ed: ce:33:df:af:9a:09:b0:13:f0:cb:18:de:3a:58:f4:a6: b9:40:29:c9:ce:1b:7b:72:8b:86:23:26:83:17:e8:c8: 39:20:a8:7b:aa:ff:2d:5e:7f:ea:35:ff:b7:57:e3:63: 04:10:3f:1c:86:e6:44:f2:e7:2a:55:d6:17:7d:7e:ea: 78:43:6a:ab:69:72:96:5c:fa:23:6d:bd:42:19:5a:ae: 74:e3:47:76:b8:e4:f8:e4:c9:ef:0d:cb:36:db:16:a7: f6:24:cc:ce:b9:4a:ff:22:65:15:f7:e7:76:18:09:9f: d7:48:a4:8b:ec:48:28:42:e6:85:0c:04:a7:5d:a1:4d: 23:16:48:07:ce:ec:a6:ba:de:f4:e4:1e:a8:9a:d4:08: 9d:94:1f:0a:be:c4:3a:65:77:c6:8a:22:29:5b:ec:70: f5:12:bf:97:a5:ae:b5:72:4d:78:dd:bf:82:b5:a8:ab: 19:09:22:12:fd:54:d9:f3:cc:8c:00:0c:fa:c3:b8:e1 Fingerprint (SHA-256): 29:C8:0D:29:CE:CB:EF:59:4B:09:83:DF:14:27:54:3F:87:21:02:BE:B3:39:7C:D6:E3:16:93:66:4B:F9:4A:C8 Fingerprint (SHA1): 23:84:ED:3F:DF:5F:88:AC:B7:14:97:FA:C8:EA:CD:D8:64:C0:0C:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:a7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:57 2025 Not After : Sat Feb 28 11:52:57 2026 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:5d:0c:80:18:5a:ea:c6:e5:ba:34:90:ef:75:2e:f3: 28:c5:49:3a:84:6d:de:54:c2:d1:7b:77:02:06:ed:66: 2f:17:ad:68:c1:53:2f:c2:c1:59:95:2e:aa:df:6e:58: aa:f1:46:b3:1b:a5:5a:a5:48:36:ae:3b:5e:27:d6:39: 54:c0:cb:1f:29:fd:c6:fa:9c:fb:2a:4a:97:48:cb:c9: 47:b7:cd:01:9e:ac:4c:54:91:74:1e:9d:f8:95:04:d3: 1e:86:fd:5f:5f:b8:9d:e7:c3:a2:27:e4:6f:50:f6:f9: 19:00:ae:4c:02:7f:7e:1f:37:89:03:0c:55:9b:db:2d: 80:5f:43:1a:c8:b7:e1:92:6c:e6:d7:bd:ea:62:31:bb: f3:e6:65:5e:f3:50:83:87:f8:c2:f1:3b:26:ae:f5:ea: 04:00:5e:b9:46:4e:57:ed:1c:56:e0:9a:92:16:fd:79: 90:b6:90:6c:1a:54:7c:65:4b:c6:75:f7:05:3a:b8:0c: 58:b4:fe:69:b3:01:04:06:a2:af:19:98:e7:b4:8a:a6: db:a5:c4:39:14:f0:08:d4:20:cc:82:6f:64:6c:3b:4b: bd:e6:19:21:50:e2:30:12:41:26:93:af:5c:60:3a:a3: a7:81:c8:71:90:43:4f:16:b3:59:3e:9a:12:31:4a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:ae:ca:6a:b6:90:cd:3a:2c:f4:89:63:a0:2e:56:d6: 21:2a:f9:b2:fd:0b:b5:0e:27:a5:95:d4:9e:10:41:3f: 4c:cb:c7:4f:53:0b:60:54:36:07:d5:47:51:c5:22:57: 93:9f:cb:80:01:2f:b7:4f:c8:d2:83:c8:da:90:df:10: 23:10:19:69:10:38:77:6f:d5:9f:6a:07:b9:06:ee:f8: de:d0:a1:3d:b8:19:30:f8:5a:c0:f7:9f:ae:b5:08:c5: ab:f0:e9:85:83:80:f9:5f:fd:9f:a8:32:2e:8f:9c:9f: 49:9d:20:1e:a8:eb:1e:a8:81:10:2f:7e:66:a9:ee:e2: 07:7c:8b:ea:d3:ea:28:60:b7:16:47:76:0a:39:a3:5e: 70:d5:8b:3e:da:ad:0e:30:64:fe:0a:30:4b:95:cd:d0: 20:4c:8c:9e:8f:8a:21:65:ac:a1:c9:6c:f7:b3:54:ac: 22:63:2f:0e:98:aa:f9:77:bd:7d:89:f4:6d:de:64:b9: 7a:3e:b0:87:dd:5f:ab:6f:b2:a0:3f:8a:48:38:f3:65: d9:5d:0f:80:f3:4b:13:75:00:2e:c0:cb:95:b2:4c:63: 76:2d:94:e4:8c:e1:69:73:7f:1b:fd:f3:ea:18:75:6d: 54:01:fd:bb:ce:75:0e:2d:03:47:06:0e:d1:a9:dc:8f Fingerprint (SHA-256): 94:6C:A0:FE:C3:04:AA:A0:1C:2F:E4:B1:8E:AA:00:3F:12:44:D3:09:59:FE:00:AA:47:46:10:B6:FF:2A:2C:1A Fingerprint (SHA1): 37:9C:F6:33:A6:C3:6E:4A:A0:FF:B6:8A:7C:E1:55:E3:6A:F2:4C:8E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:a8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:57 2025 Not After : Sat Feb 28 11:52:57 2026 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:e9:a5:dd:2d:97:41:70:af:ea:04:ac:49:99:c3:7f: 47:36:8c:d3:23:13:14:4a:89:fa:1b:11:cc:da:2f:85: 30:45:ee:22:94:da:2b:eb:2f:71:b8:0b:a3:82:01:63: d3:51:2d:e9:5d:04:2b:02:a8:91:a0:d1:19:42:f8:38: a7:b9:b7:b2:a2:bf:3a:4a:ce:68:a8:cb:95:1c:33:4a: e3:d4:6c:8f:31:af:6b:48:f4:bf:5c:d7:5f:29:6e:cc: aa:7b:e9:71:e6:27:19:8a:b8:dd:06:cf:d3:01:9b:ab: 96:9e:11:54:31:3d:d8:78:66:80:5d:75:a0:5a:82:42: 6f:7e:90:ef:ef:e3:06:81:5a:27:15:47:f1:4f:f4:0b: 5f:51:ff:7e:85:6b:a1:01:7f:2a:4f:3d:c8:06:68:24: 4d:08:60:4f:03:14:3c:aa:54:cf:0f:1d:07:4f:3b:1a: 8e:88:24:be:20:73:11:a0:ca:53:de:49:ba:b5:2f:22: 61:9c:9c:c4:0a:e9:5f:6b:d2:59:c5:78:ef:a9:f1:cc: 2c:a4:ae:32:8f:2e:19:f6:2c:07:d8:d3:d5:e3:7e:84: 60:7e:3c:92:28:ae:3d:72:01:60:a1:21:87:02:17:39: bb:c7:46:88:b5:6e:38:94:db:d8:df:96:00:fc:44:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:47:f9:1b:57:b4:a9:e6:64:3c:4f:9a:cb:d4:98:53: 5f:5a:15:78:3b:4d:3e:68:b9:c9:61:38:c4:41:10:26: 72:65:bd:9e:1a:66:32:00:2f:76:b0:84:8d:07:69:df: 41:13:e8:26:d8:cc:da:af:30:1d:d5:e8:1e:d7:f4:04: c3:ae:4a:82:64:18:19:bd:f6:17:93:06:5e:5e:2c:bd: da:27:17:a3:69:2f:20:4a:09:81:99:2e:9d:c8:ba:65: f8:29:87:61:a7:80:d9:22:af:17:f2:18:29:38:ed:2b: 02:f2:0f:08:1b:4b:eb:54:df:06:dd:bd:33:65:ba:ca: 3a:1a:6a:1d:7e:40:51:80:71:71:96:d2:64:e5:1d:29: c7:74:e5:ab:bc:8c:77:cd:68:02:08:7b:ac:13:4d:77: 90:25:38:bb:be:27:b4:6f:bf:06:f0:0b:9f:a8:f9:61: e8:45:b4:18:8a:99:f6:c9:8b:5c:f4:47:cc:5e:22:5e: bd:e5:d4:35:3a:52:0f:7a:c2:82:d9:00:46:67:42:fa: 1e:30:98:06:97:a8:8e:e2:00:1b:13:bd:34:e6:76:66: 8c:f9:5d:49:99:8b:96:5b:c2:65:01:73:ff:d7:88:e1: be:02:d8:d5:3a:36:91:16:68:53:4a:a0:fa:73:5b:37 Fingerprint (SHA-256): 0F:4A:BF:05:A6:ED:31:1A:99:23:6F:BF:57:BF:14:25:9A:2B:61:4B:66:F2:98:75:28:E4:D7:9D:BE:22:9D:49 Fingerprint (SHA1): DF:5F:90:05:4D:52:A1:BD:FC:04:1A:2B:AE:81:D6:DC:64:7B:07:8E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:a8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:58 2025 Not After : Sat Feb 28 11:52:58 2026 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:94:c0:3e:05:d9:87:02:a6:2b:92:d9:be:72:34:64: c3:bf:a1:24:8a:22:2f:08:3f:00:8e:d8:d5:7d:36:2e: 3c:32:8b:61:f0:f1:c5:bb:1c:4d:58:2f:0a:fa:80:36: 00:28:95:ec:d5:bc:52:2b:59:f2:e1:75:a3:77:8b:0b: e6:c3:91:d1:14:03:30:19:7e:90:f6:a5:cc:ec:62:14: fc:11:f4:10:06:68:23:6a:34:79:dc:d9:b5:0a:89:98: 40:fd:f3:c5:ab:05:c8:4f:99:44:fb:aa:d2:61:53:e6: 7f:21:f2:80:be:fc:b4:96:2e:68:57:0c:97:53:d6:36: 6d:c3:3f:f8:e6:78:32:d8:ca:c1:f7:1f:96:93:ae:95: 3c:6d:61:9e:81:67:42:19:ae:4b:3d:28:c6:90:a6:a9: 99:60:89:33:56:93:17:1b:16:46:47:2b:fb:5f:20:7c: fa:82:e0:a2:93:9d:57:f8:11:d5:e5:d7:e6:49:a1:c6: 77:d1:f0:ee:b4:cb:08:7a:62:4b:73:19:54:83:e5:24: 2d:c3:2c:be:6c:95:18:04:b4:d9:d2:08:89:7c:e2:c1: 78:0f:e3:f6:a4:e9:81:82:44:7d:a9:32:d0:19:7f:a7: 38:85:c6:8f:9c:7f:ba:5c:7f:e1:ea:c4:9d:39:a2:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:36:95:e2:fa:9c:8d:c2:dd:a2:e7:02:d5:d6:ca:17: 8e:ed:b9:0b:f8:64:d8:db:e0:35:b1:6a:44:af:15:99: 9f:1d:09:84:36:f3:9c:ed:09:9c:01:46:06:90:f8:38: 9f:db:3b:dd:66:11:cc:ba:86:13:31:58:8e:d4:12:cd: d3:77:5c:d8:c1:2c:d4:9e:e3:67:40:2d:85:e8:47:4b: 62:4c:b6:85:74:aa:79:81:6f:d2:15:f3:70:c4:12:4f: 33:60:68:e4:bb:cb:6a:9b:4f:c5:4a:4d:d2:8a:8a:25: 0b:a7:4c:30:de:6d:d2:24:07:cd:ae:d1:e2:da:33:bb: 60:3c:b5:d5:65:32:15:5d:44:09:7d:b5:6a:f1:fd:41: f1:94:9d:69:71:61:2f:0e:e6:b7:37:87:64:66:d0:45: 0b:19:e7:fe:b9:32:f8:eb:c7:28:73:2e:dc:b3:ed:26: f9:e3:80:93:b4:66:a5:d9:df:f0:cf:24:b3:63:41:7f: fa:07:6d:a8:02:a3:d5:e1:91:80:a5:42:e3:90:e9:5d: cc:9d:92:dd:d6:9d:66:19:4f:26:a3:12:fa:0d:e4:f2: fb:5d:a5:ac:99:22:a0:44:19:ca:2f:59:a6:57:ea:c7: 11:bd:5d:01:28:79:1b:ca:ee:24:2e:af:bc:1a:58:8a Fingerprint (SHA-256): B5:9B:DB:2D:72:3C:6D:2A:95:44:5F:60:04:32:3E:BE:7D:66:E9:C3:C9:E5:D3:9C:E4:DF:3A:8A:23:3F:52:45 Fingerprint (SHA1): F1:B2:1D:50:A0:8A:A6:97:98:B4:01:66:BE:14:D8:BB:2B:3F:18:D1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:a9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:58 2025 Not After : Sat Feb 28 11:52:58 2026 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:92:23:d3:e3:ad:ee:49:46:91:26:99:6d:6f:d9:b0: 7f:52:83:e6:28:01:5d:6b:a1:b1:ba:8f:83:85:91:8f: f9:68:26:2f:4d:f0:4a:1f:b0:10:43:27:c2:9d:59:f7: 5e:62:cc:52:75:2c:ce:00:1d:cc:64:1a:61:e0:e3:22: 6b:07:d4:4b:39:4e:52:0b:7d:d7:92:3d:7f:4c:f0:cd: 99:62:89:b6:b2:e2:02:18:8e:3e:7b:2b:08:de:28:b1: 0b:8e:0e:c4:be:95:37:f3:6e:d4:23:65:44:e7:26:1a: 07:bc:8b:a0:58:1d:0a:d1:9e:0c:66:7f:03:b5:34:15: c0:f9:d5:40:60:a7:08:d5:49:b9:ff:7b:39:cb:1e:16: 7e:f1:50:56:53:a5:97:76:a4:12:51:e2:0a:a1:71:22: 78:9f:3e:fc:7b:a3:87:b2:d0:3e:5e:87:1f:e8:80:27: cc:cf:f4:ae:3e:1e:e0:1e:34:e5:25:50:5d:1a:69:b4: 13:d4:30:56:86:4b:17:bf:d1:87:45:27:f8:8a:51:16: c7:6f:0b:ec:01:59:48:2a:6d:e4:00:fe:cb:1b:8f:d9: d7:ab:3a:e3:4c:5f:97:83:2d:43:10:d0:2c:a9:f6:48: 30:67:be:cf:68:1e:6d:93:8c:f1:20:5b:95:73:39:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:c9:31:3f:11:32:5b:95:a5:ed:ce:36:0d:e2:f1:90: 17:da:d1:14:97:d7:f9:90:1b:4b:1c:fb:a6:f6:53:95: d7:db:35:73:7c:26:07:21:c8:f9:ea:97:2a:82:1e:f4: c6:e6:b7:c8:0a:99:9b:3e:59:3d:f2:b4:81:77:d8:03: 42:52:4e:f0:80:9d:15:59:38:9b:c6:5d:d2:f3:c6:36: f8:2e:4b:ed:bb:90:0d:18:ff:fd:b1:e8:68:63:4d:51: 40:c6:00:22:6b:eb:77:16:b7:4f:1a:6d:fa:76:2b:a6: 74:d3:2a:a6:95:16:b0:02:ef:1a:04:40:19:fd:69:e4: d0:90:63:c1:fd:dc:77:f5:26:ed:33:a9:ba:c4:76:91: 98:b3:5b:94:27:1b:42:ea:25:9a:ea:72:8a:4a:e4:d1: 52:46:60:e5:8b:19:c0:90:83:1f:8d:c1:32:39:2a:04: 37:4c:c3:9f:f8:6b:bb:47:1f:49:80:b2:06:a6:bd:40: 5d:73:3f:83:65:ae:4f:7f:a6:c7:fe:56:13:af:da:58: a9:a6:76:9b:67:81:4c:3a:ed:b3:04:9b:6a:b7:71:19: b8:67:c6:74:55:fd:a8:de:ab:8c:65:81:03:43:1a:e8: 7c:f5:50:96:2a:2e:c2:da:ad:0d:fe:eb:74:3b:ca:28 Fingerprint (SHA-256): 0C:12:A1:91:06:94:5D:1D:A4:7C:3F:91:B4:36:2E:25:2D:29:D1:40:8F:D9:8B:CD:BD:53:A1:40:32:87:56:7A Fingerprint (SHA1): B8:41:9A:57:C7:8C:DB:F1:14:E3:0E:A8:23:A4:DF:A2:D4:16:74:30 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:aa Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:58 2025 Not After : Sat Feb 28 11:52:58 2026 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:b7:e6:ad:ec:eb:db:83:b5:7e:5d:09:65:14:3a:ef: 54:a3:40:e5:44:28:9c:65:7d:a9:3a:69:89:95:0a:1e: c2:8c:f3:36:d3:1f:04:14:84:97:7e:0a:76:3a:b3:5f: b4:51:51:de:49:b6:b3:9c:d4:63:21:b1:1b:93:2d:60: 1a:a3:0d:9b:ac:1b:75:15:c2:44:98:6b:a7:47:ed:be: 23:f0:bc:b2:15:a6:47:18:ca:9b:d4:e2:8b:4d:7c:2e: e5:95:ad:ea:54:10:1e:05:b1:1e:60:cd:83:d2:90:8c: c2:9e:fb:29:87:a3:30:41:6c:56:ea:57:68:44:3b:04: a1:1d:e2:25:31:ef:c8:5e:c1:63:e3:fc:1c:c7:49:8c: 6b:9b:fc:d1:58:66:e8:6c:5c:ca:4a:51:90:62:4f:77: 24:59:05:24:30:37:66:b4:bc:a4:45:22:f7:ef:3b:c9: 35:8f:06:15:03:7a:58:91:1e:d9:c4:b3:06:0b:28:d0: c8:59:a3:14:66:4f:94:0d:b2:a4:48:8a:0e:ae:3c:12: f4:c5:f3:94:3e:08:42:a3:53:07:0e:18:91:06:23:e6: 56:94:ec:89:42:71:17:76:37:ae:47:e0:e3:f7:83:d1: f3:8a:1e:92:67:49:7a:a4:7d:b6:ea:4b:84:31:36:51 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:a1:24:39:46:17:25:63:2e:97:b6:41:1d:02:90:8e: 8e:82:c5:b9:64:c9:be:61:06:d8:95:2e:e2:c7:30:d8: 80:34:0d:f9:c9:06:3c:64:be:ca:0e:a0:ce:5e:fc:50: 36:c4:a1:0e:be:3b:1a:76:1c:9e:2c:ca:aa:2b:79:c3: 6f:8a:84:f4:01:57:98:3e:d7:87:a5:31:b8:7a:af:af: 33:f0:e9:a5:be:21:9c:80:6e:00:8f:a4:77:70:e3:7b: 94:1c:fd:30:30:91:d6:3f:fc:e4:da:0d:c0:dd:e9:7c: 64:e5:ef:1c:48:43:6f:9a:5b:67:30:b7:08:d2:8e:f6: 25:f4:9d:96:7b:e1:6b:77:b2:6d:44:38:0e:24:2a:f4: 46:f7:cc:ce:35:4f:c9:53:13:57:e3:75:3e:ae:ce:11: ed:9e:e3:ef:c4:90:30:e1:c9:5e:80:02:86:87:bf:29: 74:f7:d6:60:04:cb:0a:09:c6:80:58:a9:b7:1d:32:4d: e2:ae:c7:f8:21:8e:7e:2a:11:4e:50:59:4e:44:2b:70: 3c:22:75:cc:e6:37:54:31:c4:2d:f1:2f:65:1f:e7:85: 48:75:2b:cc:66:e9:12:44:07:45:3a:5d:06:31:5a:3d: cd:d6:50:bf:35:e0:6d:ae:ca:59:5d:cc:d7:25:a5:79 Fingerprint (SHA-256): E6:AD:21:05:DA:78:A6:A1:38:AA:A8:C4:FF:5F:CA:45:E6:89:9B:51:B1:0A:CA:EC:E3:FE:E1:DC:79:2E:61:86 Fingerprint (SHA1): E0:65:55:88:DA:4E:97:C4:D6:C9:DF:92:7D:E2:FD:71:D3:08:0F:BE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:ab Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:59 2025 Not After : Sat Feb 28 11:52:59 2026 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:15:6e:05:b3:08:0c:3f:cc:69:59:72:55:cf:fa:88: 03:9a:25:55:ef:a2:d2:3f:c3:e8:41:54:24:d4:f3:6f: c0:c8:05:59:75:bd:d8:1f:79:d9:2b:97:6a:e9:2f:99: e0:c4:d4:e2:af:d6:9d:92:5c:ee:47:ea:84:34:6f:f3: 28:cf:71:7c:ab:05:9f:61:27:ef:0d:7c:44:db:d3:d7: 7b:92:25:0b:fd:bf:56:ad:a4:ce:dd:2d:67:bd:f6:40: 2e:43:17:6a:b7:f5:4d:d9:9b:72:a5:27:6a:4d:69:ef: 1f:22:d8:c7:63:ce:63:6c:72:d6:47:5c:23:3d:97:21: 66:a5:82:33:b7:59:22:7c:cd:b5:3b:00:9e:28:53:38: 2e:fc:88:ef:47:0a:6e:1f:30:1b:3b:06:ac:d6:52:61: 3c:2c:bd:ed:0f:da:51:45:75:73:d7:f7:7b:5d:60:4e: 98:fb:9d:fc:18:9b:67:52:e5:6a:f8:63:e3:0b:e4:3b: 14:b2:26:6b:65:9c:03:0e:66:fc:e7:ab:f3:22:f0:26: a1:34:57:85:6a:ac:ef:b8:44:2e:04:03:6c:61:e5:d1: 29:98:5e:b9:b3:06:14:b3:25:66:f8:9e:5d:f8:a1:eb: 2f:c9:81:5a:5e:6f:92:35:c2:23:04:be:03:42:b6:5b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:e8:72:7c:ad:01:4e:12:bf:68:9f:8b:86:5a:15:6e: fc:90:e1:68:dd:fa:83:bb:b9:07:38:87:9c:31:85:2d: 3d:bd:23:c3:85:2e:e0:3c:0b:f4:c5:ca:1c:c7:22:de: 95:89:a6:0c:e1:f7:44:21:86:3e:73:70:03:9e:65:68: a7:19:75:df:75:39:8b:a3:a3:59:59:7a:e9:29:1b:80: 62:4f:a7:c7:01:86:f2:f8:e4:2d:99:22:95:d6:73:03: 9b:ee:da:9d:52:31:85:fd:69:2f:7c:ea:09:ab:bd:b1: 6a:17:d6:b3:14:5c:70:3a:06:dc:fb:08:2c:db:48:90: 2a:e6:75:e6:9a:65:b5:34:d7:62:f8:1d:73:2d:54:b7: 17:7d:54:0e:af:54:90:94:a1:e3:54:3e:be:db:4f:ad: df:e4:2d:88:ed:89:b9:17:ca:85:31:6a:d9:78:08:63: ee:dc:23:fc:28:48:1f:7f:f1:82:31:3d:6d:be:9c:42: 4b:99:46:bd:6b:ee:72:26:0f:fe:4a:d4:5d:9e:5b:f3: e0:74:6d:d9:ba:08:cb:87:e6:8b:20:a8:f1:2b:b6:cc: 10:06:5c:50:d5:f0:8c:5f:df:a8:a4:1b:91:f2:1a:2e: 67:10:bc:e0:61:a5:3e:fc:ff:9b:c6:3c:e2:35:b3:78 Fingerprint (SHA-256): B8:FE:1B:93:40:08:80:B3:28:47:16:FF:C4:B3:DB:68:7A:BB:36:89:3C:5A:59:E0:EC:CE:51:86:9D:1D:58:EB Fingerprint (SHA1): 07:7E:CA:2F:15:68:20:8A:C7:B7:00:B9:C9:87:F4:91:6B:6F:72:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:ac Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:52:59 2025 Not After : Sat Feb 28 11:52:59 2026 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:ed:8f:c1:01:2c:16:fa:f8:61:d0:5d:77:ea:d9:83: 32:1a:d8:19:0d:f1:4d:52:6b:72:20:b5:95:da:c1:4b: 06:1d:83:58:05:b6:c0:1b:46:d9:40:3d:d6:37:34:71: fa:69:93:3a:49:d6:b2:51:79:1c:80:97:42:01:0a:61: 79:d8:8f:45:a6:32:65:4e:05:db:63:d7:2c:20:58:31: a4:8f:af:76:45:0e:79:4d:f5:52:fa:0e:7c:da:4f:e7: b7:91:30:39:c6:dc:f2:eb:31:ed:6d:ec:01:77:52:5b: bd:26:c8:d7:42:f3:39:98:b8:7b:46:51:2c:63:e4:f1: db:81:e6:aa:76:8b:9d:df:3d:7f:14:0c:f5:55:d8:c0: ea:8c:7e:ea:8c:f0:f1:92:58:77:06:63:6b:27:91:e6: 25:b6:3b:f0:05:90:e9:9f:d7:ce:13:ad:47:ed:16:28: 04:df:cd:2b:d1:e9:98:e8:22:7e:a9:48:3e:88:92:e3: 8d:60:8e:3f:9e:58:92:ab:dd:fd:60:e7:32:3e:de:22: c4:b7:8f:5a:5b:07:69:8f:87:0f:e6:db:85:f4:a1:dc: 42:74:28:ba:2e:50:ba:a0:04:6e:a9:41:88:82:c4:22: 6a:a9:e9:9a:52:54:52:ca:40:f6:39:b0:e9:c2:35:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:67:ce:ef:15:7a:0b:fc:5b:2a:75:de:94:35:9a:3a: da:bc:50:f9:34:6e:45:1d:af:5c:60:13:75:5d:ae:53: 03:99:dc:b9:b3:8a:3e:23:58:f9:11:ec:7d:aa:3b:47: fd:dc:b1:06:e0:7a:85:f1:59:7b:86:31:a3:48:76:81: f2:82:80:d6:18:a6:3e:21:8a:63:5a:31:35:be:fb:c8: 1b:eb:e5:3c:a5:88:68:5b:b7:e4:6c:af:ec:0d:7e:12: 31:5a:98:e6:be:ed:f6:26:a1:37:01:9d:cf:54:ef:be: ec:0b:35:0e:9c:bc:7a:c9:89:19:05:b2:1a:0a:42:65: bf:4e:0a:39:aa:a6:fe:c7:6c:68:eb:13:51:f0:a3:45: 23:36:7c:ef:91:15:4b:45:7c:fb:dd:94:2e:8f:c6:46: 48:ff:6a:11:b9:67:8d:ed:50:6d:97:fe:e7:98:97:b4: a9:0e:d5:ce:97:03:d6:07:6f:a3:18:90:b1:47:a2:9b: 99:43:9a:84:0d:b5:56:88:77:00:4f:fa:ab:d0:cd:8a: ca:e5:84:f4:cb:cb:42:89:50:67:b4:48:62:ed:1f:08: 14:a5:bb:ee:7a:a4:a4:94:0e:d1:f5:99:9f:97:d3:9d: 32:49:79:5e:50:23:d9:fe:10:21:1a:ce:71:30:f7:70 Fingerprint (SHA-256): 56:18:EC:C7:D7:D4:72:5F:EE:4C:89:D0:89:92:33:8A:03:19:72:BA:A4:26:B3:E1:B5:F0:A7:CB:DA:7F:B2:4F Fingerprint (SHA1): F1:E2:14:B3:FB:EC:93:EF:20:7D:0D:CD:A4:35:9D:43:A9:9E:18:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:ad Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:53:00 2025 Not After : Sat Feb 28 11:53:00 2026 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:88:bc:6c:36:83:99:18:9a:b2:2b:f7:f6:e7:5b:b1: d3:78:23:af:ae:9b:2b:2d:a8:be:22:84:ce:08:cb:f9: e6:77:b1:01:1e:4e:6f:1e:00:75:0b:bf:57:f4:48:5f: 72:30:c6:a4:ef:f1:d4:18:9b:53:ab:17:c3:2f:a7:8a: 1a:2e:5f:b5:1e:cd:cf:26:44:1d:1a:ca:29:d0:5c:02: 96:11:45:c8:f9:b4:39:d2:c5:95:b3:a0:3e:64:ea:86: d0:b7:95:8b:0e:58:37:32:f9:bb:af:88:68:74:79:84: 07:a9:ad:1d:03:4b:ac:56:da:f5:75:db:3e:7c:14:1a: a3:a0:2d:ad:92:01:20:95:33:5d:54:d1:75:40:10:61: c3:1d:c6:1c:bc:d3:cc:99:3c:f9:20:0d:80:6c:af:0f: c0:e9:cb:de:6c:05:f6:10:83:b5:87:73:a1:44:61:2e: 2f:4c:84:3a:c3:2d:dd:1e:41:f4:fc:da:55:d1:9c:00: 38:31:23:d8:4a:48:40:ca:dd:00:26:8c:e5:1c:45:1c: a0:79:00:fc:7b:58:18:af:32:ab:2d:ec:6c:60:b7:d9: 21:c7:56:5d:11:44:d4:6b:ca:1c:a7:73:a4:c5:ac:0e: 7a:5e:92:d2:74:53:9d:d2:78:30:05:cd:aa:fd:f6:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:50:41:68:34:e9:f7:7c:85:d5:12:85:c3:ab:be:88: d7:39:2b:08:36:0e:75:8d:9d:07:5c:f5:cd:6b:49:82: 91:bf:df:9e:a0:1c:b6:f8:dd:5b:47:2b:66:74:bc:fb: aa:55:b2:3d:02:28:6a:1c:31:bb:da:b7:76:b2:a5:c4: 60:bb:17:e8:b4:d7:55:82:16:2a:41:b3:fd:e3:e4:50: 4b:9a:99:64:50:9e:8b:64:4e:d5:b9:41:71:58:da:ae: fd:cf:c0:2d:03:23:5a:7f:df:d4:d3:ee:e1:ab:fa:53: f0:72:ee:e3:c3:e9:3f:94:eb:e6:f3:73:0d:50:71:10: 3d:81:89:94:bc:8e:de:33:92:b3:8f:7f:5e:0b:11:66: 59:44:cf:5a:da:b9:e1:48:94:43:15:e9:fd:c1:1b:15: 63:69:83:30:88:27:20:f4:db:08:a0:44:04:9c:89:43: f7:be:f0:a3:e4:ff:a1:25:71:aa:05:cc:20:27:9a:be: a4:43:df:5e:b4:cf:97:41:91:63:ea:4c:31:cf:2e:d4: a1:7e:57:fc:69:82:6d:1b:95:5d:ba:5f:65:96:90:f6: 8b:fb:98:22:d8:95:b6:38:db:91:eb:35:41:7c:17:95: ce:8f:55:bd:0b:7a:80:14:e0:45:a9:69:75:89:6f:7b Fingerprint (SHA-256): F0:CE:3E:82:9B:E1:A1:4F:C8:01:18:C9:06:03:FD:0F:F1:BA:6B:61:24:E7:F4:2B:6F:39:FA:3E:48:E1:AA:FF Fingerprint (SHA1): FC:FB:BD:D5:DB:E4:F2:38:19:8D:A7:2C:29:59:56:A2:B4:76:72:91 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:ae Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Fri Nov 28 11:53:01 2025 Not After : Sat Feb 28 11:53:01 2026 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:01:f4:4b:28:5a:a5:63:3c:c1:7a:c7:cf:3d:10:b9: 7f:07:e5:fe:5f:62:0e:01:5a:18:79:59:e4:c9:e1:e1: 58:c8:87:51:47:2c:a7:23:b8:64:ca:fe:b3:fb:1f:9b: 81:bf:61:f1:bd:4d:9b:1c:a4:be:22:f1:4d:ba:2f:54: e3:47:ef:55:f9:c7:a6:fa:d1:3c:8d:c6:78:92:65:79: d5:e0:2e:a8:93:36:33:7b:15:70:d6:52:02:bd:8b:e9: d8:2e:1c:7f:1d:49:76:c0:e3:58:7c:e7:23:27:b2:08: 45:43:c7:54:28:64:8e:7c:b5:cd:05:98:1c:a4:97:bb: ef:75:4b:3b:ec:e8:5d:a9:e8:72:e3:8f:e6:a5:ae:e5: ac:78:6e:ae:67:cf:7d:c3:7d:ef:17:81:0a:b9:17:2a: 31:a7:0e:34:58:fb:00:2b:ec:07:1e:0c:8d:27:0a:40: 7a:18:47:2d:5a:39:84:0b:40:59:bc:37:0f:82:d8:f4: fa:38:34:5d:52:56:86:3b:4b:b5:8f:97:29:9d:72:be: 05:ea:ea:67:f7:ae:c8:54:b8:10:0c:59:9c:1d:86:ce: e2:6e:2d:4b:0b:73:e0:3c:c0:ea:43:1c:e3:2a:d2:81: 0e:f5:a3:35:3e:82:af:e0:15:b9:ea:aa:e8:c3:79:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:19:f3:9e:eb:d8:74:3c:fb:64:c9:d9:97:c2:98:c7: 83:13:10:90:c6:48:e7:84:c4:f6:ce:ec:c8:7b:87:25: 51:c5:b2:20:71:c6:3b:8e:4b:e4:f6:1c:7e:10:84:59: e4:ce:1e:82:63:d3:d5:6b:c0:29:3a:47:47:00:d1:cb: 79:f5:6c:97:01:bf:3b:36:27:79:54:0c:12:4f:2f:24: e1:98:cf:8c:ba:6e:21:46:01:fa:37:0f:a7:37:ec:47: 95:c5:79:1a:d3:65:31:b0:dc:d4:d0:a8:89:88:e6:ba: 9a:b2:c2:c7:5d:22:56:f7:4a:ad:45:60:d9:6d:f5:f4: f8:60:ce:85:f3:6a:14:8e:77:33:76:fa:29:1e:18:91: 8b:9a:c8:99:d8:3a:bb:d7:26:b2:11:5a:27:aa:da:19: ac:88:81:72:cb:23:a8:d5:f5:b7:dc:e6:1f:2d:47:a2: a5:db:a3:86:6d:5c:86:e6:e3:c8:41:de:a9:df:c9:c1: 93:26:74:48:50:3f:6a:21:51:92:2c:42:40:ce:f3:c5: 12:2e:53:65:9b:19:52:16:9e:3f:48:9c:0a:7a:e5:34: 66:91:dc:49:f1:81:87:ae:38:93:b6:25:fb:5f:5d:be: a1:00:24:2c:19:d1:1f:1f:e6:4d:c1:24:d1:a4:f2:36 Fingerprint (SHA-256): E1:34:00:EB:32:0C:C0:82:B3:AE:64:AC:41:DA:4D:2D:AE:C5:79:E1:A6:DD:B3:AA:15:E5:6D:B3:02:1D:95:29 Fingerprint (SHA1): CF:CA:A7:39:70:EA:4D:96:BE:CF:4F:43:47:C8:8A:60:07:75:B3:12 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:b1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Nov 28 11:53:02 2025 Not After : Sat Feb 28 11:53:02 2026 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:28:df:72:e2:a2:0c:d1:aa:5d:69:7f:73:f6:53:0b: 8b:1c:65:94:ff:6c:77:cf:3d:9a:0c:dc:46:8e:98:18: 51:1d:c0:5a:a6:46:15:99:af:f9:ad:cd:9b:a3:4a:05: b5:1b:2a:6f:56:76:1b:ff:8e:68:8c:00:41:c0:85:81: b1:26:e8:98:a3:5d:3c:d5:ca:71:46:5b:30:e6:4f:69: 83:37:9f:ce:b3:39:b7:00:c9:f0:7c:9d:7a:97:03:6b: 7f:ff:6d:1c:07:2a:29:87:40:06:ec:2c:56:ba:50:b9: f7:b8:e4:01:84:46:71:f3:02:65:8a:2e:33:20:23:25: 0a:f1:f2:bb:bf:b3:90:10:74:59:df:3f:e5:ef:f0:1e: 20:d9:e4:56:14:02:5f:c3:af:3d:33:31:30:2e:24:8f: 1c:03:0e:6f:57:92:ac:a3:c0:1d:5f:cc:1c:fd:e4:d9: 60:98:d3:d8:3e:66:7b:6b:6d:49:9d:3f:26:7f:68:70: 03:2c:b7:61:20:33:66:73:44:cb:f5:ab:bc:6b:7f:8e: e5:aa:32:dc:7b:a6:82:1d:c4:6b:bf:43:72:7f:e8:ae: 69:48:55:10:7a:90:24:b9:c8:40:01:3a:7c:aa:43:0a: 9e:17:81:dd:84:23:f0:37:1b:7d:94:c8:a9:92:90:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:bb:9d:48:24:36:c6:88:4b:9e:2d:a7:14:7c:11:1d: d4:6d:6e:b1:37:5e:e3:20:63:4a:0b:f2:6e:db:84:df: d9:8c:5d:38:33:a8:8a:74:1f:22:f0:1c:42:e7:bd:63: 9e:fe:06:86:ec:92:9f:b0:c4:1a:5d:a1:58:fb:0a:c6: dd:1f:48:bd:d4:63:b8:f8:cd:bb:8a:8e:fe:34:43:6f: e4:4e:d3:07:5b:db:99:fd:9e:5f:c3:d3:0f:d9:8c:42: dd:01:f5:2c:e5:66:1a:d5:27:bf:85:24:d7:13:3b:10: ab:fc:dc:9c:c2:49:dc:3f:51:b1:02:f1:16:fc:ee:49: 97:95:2c:57:10:ae:e4:33:eb:8a:2f:e1:2a:cf:dc:a9: 37:90:35:a0:09:ff:a2:10:0d:37:a2:04:dc:bc:e4:75: 27:08:5d:97:2d:71:4e:df:e8:48:93:1e:34:7b:14:81: 76:a5:c4:26:9e:77:07:25:41:67:be:1f:04:4d:93:f7: ca:37:9b:d0:57:bd:86:e6:61:4f:a5:41:87:e2:05:c0: 22:72:1d:f9:c3:42:e8:f5:19:c9:20:a3:40:4c:b3:ef: 78:a1:b7:eb:bc:29:e5:fc:4b:cf:2e:35:13:98:43:b4: db:7e:96:bc:ff:db:e2:b4:dd:a4:60:3d:70:83:3a:de Fingerprint (SHA-256): D4:8E:FD:43:4A:86:0D:7F:F6:68:62:A3:EB:0A:52:EE:9F:70:D6:09:16:BF:80:F7:D4:C4:73:9B:E2:56:99:D5 Fingerprint (SHA1): 39:F6:01:F9:96:2D:58:44:56:7C:A7:07:59:DD:86:B3:97:18:44:4E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to sanext.der cert.sh: #346: dump extension 2.5.29.17 to file sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:sanext.der,2.5.29.17:critical:sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:sanext.der,2.5.29.17:critical:sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c8:94:c8:b5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Fri Nov 28 11:53:04 2025 Not After : Sat Feb 28 11:53:04 2026 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:be:53:d4:c8:df:68:95:85:7c:90:cb:b8:19:c9:22: c7:74:e3:a9:43:a6:c8:61:ee:7a:74:c4:5e:13:77:9d: 7f:86:26:19:2f:98:7a:f5:f5:3a:26:26:65:76:05:e0: f5:2b:d9:ce:21:97:b0:05:ad:24:8a:a6:df:01:04:81: d5:22:40:b7:dc:51:81:9e:54:c6:c3:05:8c:dc:1c:5b: 1f:ce:56:5e:fa:7e:74:48:e1:12:49:d7:81:37:c9:9a: a7:13:86:43:96:38:90:36:8f:4b:54:c5:e9:b7:7e:06: 4d:04:d9:7d:68:fd:c6:14:c1:8e:a2:74:29:de:78:67: 78:6f:38:76:36:db:4e:4b:11:a5:a0:94:ae:fe:10:0f: ca:d6:a5:ef:e0:3b:5d:af:1e:97:37:ac:59:b8:33:2a: 8c:f9:14:7f:be:fe:b6:5b:fc:b6:af:f1:64:53:ac:22: 3b:31:51:c2:68:96:33:b6:c5:ad:af:e1:11:42:ad:93: 34:cd:7e:56:88:90:a4:9f:32:d2:c8:fa:43:17:8a:98: e5:86:4d:1f:ee:42:7a:ea:91:c1:6e:2c:08:47:6e:da: ad:45:d1:be:2d:50:0c:3e:74:5f:03:b2:45:f3:b2:fa: 8d:c5:98:eb:6e:34:f8:9c:31:7a:0d:a7:4a:27:8c:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:d6:88:4a:0f:e9:92:6d:1c:b0:20:5e:90:9b:90:00: 4a:11:9a:ac:41:1f:75:1b:23:7c:dc:67:fe:87:c0:6c: 57:b1:66:24:a1:ba:94:2a:80:b2:a4:b4:1e:97:57:9d: dc:b7:78:0b:0b:6b:0d:b5:16:ae:15:2b:ae:a0:aa:1b: 08:36:c9:18:0f:57:24:16:f7:91:a6:34:c4:d4:8a:6d: b1:1a:eb:92:7d:98:31:8c:5f:30:6a:c2:35:b2:f5:14: 37:e8:a1:e5:d3:f4:23:3b:52:d0:c8:e1:1c:0b:b9:8a: 16:f0:ff:7f:ed:9b:f1:cd:ad:53:33:82:26:9c:69:22: 2b:4f:63:11:42:3c:4e:32:9e:24:ac:c3:b9:ff:28:f0: d0:08:fd:a0:ab:25:f1:00:a9:95:13:91:d3:6d:4e:e8: 0e:e5:f4:49:5a:8e:f4:ee:c2:ce:0d:43:2a:72:2d:21: 84:fb:1a:63:4a:04:fd:d8:b9:bd:8e:a6:04:a6:27:05: d9:53:0d:c4:3e:d1:8a:da:b7:34:9a:e5:ad:2e:30:42: b2:b8:f2:17:c9:63:de:1d:10:7d:3b:a7:26:73:6c:9a: 71:ba:a1:62:e0:ea:e6:85:53:0b:e8:12:99:fe:ae:30: 42:6b:20:88:02:22:f7:8e:37:0b:e6:f0:60:6d:dc:9f Fingerprint (SHA-256): 59:BD:33:B4:A9:B6:53:D8:33:A6:2F:74:5E:1E:2A:02:C4:AA:DC:C2:E2:4B:05:C8:6D:E4:0A:2A:53:AF:96:C8 Fingerprint (SHA1): 6B:ED:CB:93:DC:1D:D0:D8:08:39:A9:D2:8F:B8:6E:CA:93:59:1E:33 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa f3776dcb2e266aa84c5acf714ee6c8fc4ed6a127 NSS Certificate DB:localhost.localdomain < 1> dsa b8ded0161b36be6a9438062adf876144680ef138 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa 34bcdac2039fbe40e9c9d8f32437223ac16a0390 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 07cf46fdeb44173782558cf138280e32b1c80973 NSS Certificate DB:localhost.localdomain-ec < 4> ec 5be9fdca866155c3ed1cdc210ae9b899dd9daa8d NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa 4526b76831e651f69d12b866c68e3976ceca6655 NSS Certificate DB:localhost-sni.localdomain < 7> dsa 47609ef9eca5f30e956c291bed16499df6d26d9a NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa d24847b3aa3bdffa6ed6ee95194eb7297af5f908 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 9e3a96c7cdc4b53b7d30a55d389e41f8e617a5c9 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 7048df6ffc40041a9f8cacf9f29bc263c47a7859 NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa d967bc460c58984d1ef2f3b1013cc5c27785ec09 (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.112/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:53:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:53:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364404 >/dev/null 2>/dev/null selfserv_9351 with PID 2364404 found at Fri Nov 28 19:53:59 CST 2025 selfserv_9351 with PID 2364404 started at Fri Nov 28 19:53:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #722: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364404 at Fri Nov 28 19:53:59 CST 2025 kill -USR1 2364404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364404 killed at Fri Nov 28 19:53:59 CST 2025 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:53:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:53:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364443 >/dev/null 2>/dev/null selfserv_9351 with PID 2364443 found at Fri Nov 28 19:53:59 CST 2025 selfserv_9351 with PID 2364443 started at Fri Nov 28 19:53:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #723: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364443 at Fri Nov 28 19:53:59 CST 2025 kill -USR1 2364443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364443 killed at Fri Nov 28 19:53:59 CST 2025 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:53:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:53:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364500 >/dev/null 2>/dev/null selfserv_9351 with PID 2364500 found at Fri Nov 28 19:53:59 CST 2025 selfserv_9351 with PID 2364500 started at Fri Nov 28 19:53:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #724: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364500 at Fri Nov 28 19:54:00 CST 2025 kill -USR1 2364500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364500 killed at Fri Nov 28 19:54:00 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364553 >/dev/null 2>/dev/null selfserv_9351 with PID 2364553 found at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 with PID 2364553 started at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #725: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364553 at Fri Nov 28 19:54:00 CST 2025 kill -USR1 2364553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364553 killed at Fri Nov 28 19:54:00 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364592 >/dev/null 2>/dev/null selfserv_9351 with PID 2364592 found at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 with PID 2364592 started at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #726: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364592 at Fri Nov 28 19:54:00 CST 2025 kill -USR1 2364592 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364592 killed at Fri Nov 28 19:54:00 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364631 >/dev/null 2>/dev/null selfserv_9351 with PID 2364631 found at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 with PID 2364631 started at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #727: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364631 at Fri Nov 28 19:54:00 CST 2025 kill -USR1 2364631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364631 killed at Fri Nov 28 19:54:00 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364684 >/dev/null 2>/dev/null selfserv_9351 with PID 2364684 found at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 with PID 2364684 started at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #728: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2364684 at Fri Nov 28 19:54:00 CST 2025 kill -USR1 2364684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364684 killed at Fri Nov 28 19:54:00 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364727 >/dev/null 2>/dev/null selfserv_9351 with PID 2364727 found at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 with PID 2364727 started at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #729: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2364727 at Fri Nov 28 19:54:01 CST 2025 kill -USR1 2364727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364727 killed at Fri Nov 28 19:54:01 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364778 >/dev/null 2>/dev/null selfserv_9351 with PID 2364778 found at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 with PID 2364778 started at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #730: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2364778 at Fri Nov 28 19:54:01 CST 2025 kill -USR1 2364778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364778 killed at Fri Nov 28 19:54:01 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364867 >/dev/null 2>/dev/null selfserv_9351 with PID 2364867 found at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 with PID 2364867 started at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #731: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2364867 at Fri Nov 28 19:54:01 CST 2025 kill -USR1 2364867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364867 killed at Fri Nov 28 19:54:01 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364910 >/dev/null 2>/dev/null selfserv_9351 with PID 2364910 found at Fri Nov 28 19:54:01 CST 2025 selfserv_9351 with PID 2364910 started at Fri Nov 28 19:54:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #732: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2364910 at Fri Nov 28 19:54:02 CST 2025 kill -USR1 2364910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364910 killed at Fri Nov 28 19:54:02 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2364949 >/dev/null 2>/dev/null selfserv_9351 with PID 2364949 found at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 with PID 2364949 started at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #733: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2364949 at Fri Nov 28 19:54:02 CST 2025 kill -USR1 2364949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2364949 killed at Fri Nov 28 19:54:02 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365002 >/dev/null 2>/dev/null selfserv_9351 with PID 2365002 found at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 with PID 2365002 started at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #734: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365002 at Fri Nov 28 19:54:02 CST 2025 kill -USR1 2365002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365002 killed at Fri Nov 28 19:54:02 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365041 >/dev/null 2>/dev/null selfserv_9351 with PID 2365041 found at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 with PID 2365041 started at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #735: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365041 at Fri Nov 28 19:54:02 CST 2025 kill -USR1 2365041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365041 killed at Fri Nov 28 19:54:02 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365082 >/dev/null 2>/dev/null selfserv_9351 with PID 2365082 found at Fri Nov 28 19:54:02 CST 2025 selfserv_9351 with PID 2365082 started at Fri Nov 28 19:54:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #736: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365082 at Fri Nov 28 19:54:02 CST 2025 kill -USR1 2365082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365082 killed at Fri Nov 28 19:54:02 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365135 >/dev/null 2>/dev/null selfserv_9351 with PID 2365135 found at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 with PID 2365135 started at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #737: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365135 at Fri Nov 28 19:54:03 CST 2025 kill -USR1 2365135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365135 killed at Fri Nov 28 19:54:03 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365174 >/dev/null 2>/dev/null selfserv_9351 with PID 2365174 found at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 with PID 2365174 started at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #738: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365174 at Fri Nov 28 19:54:03 CST 2025 kill -USR1 2365174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365174 killed at Fri Nov 28 19:54:03 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365213 >/dev/null 2>/dev/null selfserv_9351 with PID 2365213 found at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 with PID 2365213 started at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #739: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365213 at Fri Nov 28 19:54:03 CST 2025 kill -USR1 2365213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365213 killed at Fri Nov 28 19:54:03 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365271 >/dev/null 2>/dev/null selfserv_9351 with PID 2365271 found at Fri Nov 28 19:54:03 CST 2025 selfserv_9351 with PID 2365271 started at Fri Nov 28 19:54:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #740: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365271 at Fri Nov 28 19:54:04 CST 2025 kill -USR1 2365271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365271 killed at Fri Nov 28 19:54:04 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365310 >/dev/null 2>/dev/null selfserv_9351 with PID 2365310 found at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 with PID 2365310 started at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #741: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365310 at Fri Nov 28 19:54:04 CST 2025 kill -USR1 2365310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365310 killed at Fri Nov 28 19:54:04 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365349 >/dev/null 2>/dev/null selfserv_9351 with PID 2365349 found at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 with PID 2365349 started at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #742: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365349 at Fri Nov 28 19:54:04 CST 2025 kill -USR1 2365349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365349 killed at Fri Nov 28 19:54:04 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365402 >/dev/null 2>/dev/null selfserv_9351 with PID 2365402 found at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 with PID 2365402 started at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #743: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365402 at Fri Nov 28 19:54:04 CST 2025 kill -USR1 2365402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365402 killed at Fri Nov 28 19:54:04 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365447 >/dev/null 2>/dev/null selfserv_9351 with PID 2365447 found at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 with PID 2365447 started at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #744: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365447 at Fri Nov 28 19:54:05 CST 2025 kill -USR1 2365447 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365447 killed at Fri Nov 28 19:54:05 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365486 >/dev/null 2>/dev/null selfserv_9351 with PID 2365486 found at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 with PID 2365486 started at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #745: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365486 at Fri Nov 28 19:54:05 CST 2025 kill -USR1 2365486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365486 killed at Fri Nov 28 19:54:05 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365539 >/dev/null 2>/dev/null selfserv_9351 with PID 2365539 found at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 with PID 2365539 started at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #746: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365539 at Fri Nov 28 19:54:05 CST 2025 kill -USR1 2365539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365539 killed at Fri Nov 28 19:54:05 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365578 >/dev/null 2>/dev/null selfserv_9351 with PID 2365578 found at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 with PID 2365578 started at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #747: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365578 at Fri Nov 28 19:54:05 CST 2025 kill -USR1 2365578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365578 killed at Fri Nov 28 19:54:05 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365618 >/dev/null 2>/dev/null selfserv_9351 with PID 2365618 found at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 with PID 2365618 started at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #748: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365618 at Fri Nov 28 19:54:06 CST 2025 kill -USR1 2365618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365618 killed at Fri Nov 28 19:54:06 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365671 >/dev/null 2>/dev/null selfserv_9351 with PID 2365671 found at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 with PID 2365671 started at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #749: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365671 at Fri Nov 28 19:54:06 CST 2025 kill -USR1 2365671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365671 killed at Fri Nov 28 19:54:06 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365710 >/dev/null 2>/dev/null selfserv_9351 with PID 2365710 found at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 with PID 2365710 started at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #750: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365710 at Fri Nov 28 19:54:06 CST 2025 kill -USR1 2365710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365710 killed at Fri Nov 28 19:54:06 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365749 >/dev/null 2>/dev/null selfserv_9351 with PID 2365749 found at Fri Nov 28 19:54:06 CST 2025 selfserv_9351 with PID 2365749 started at Fri Nov 28 19:54:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #751: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365749 at Fri Nov 28 19:54:07 CST 2025 kill -USR1 2365749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365749 killed at Fri Nov 28 19:54:07 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365802 >/dev/null 2>/dev/null selfserv_9351 with PID 2365802 found at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 with PID 2365802 started at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #752: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365802 at Fri Nov 28 19:54:07 CST 2025 kill -USR1 2365802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365802 killed at Fri Nov 28 19:54:07 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365841 >/dev/null 2>/dev/null selfserv_9351 with PID 2365841 found at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 with PID 2365841 started at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #753: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365841 at Fri Nov 28 19:54:07 CST 2025 kill -USR1 2365841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365841 killed at Fri Nov 28 19:54:07 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365880 >/dev/null 2>/dev/null selfserv_9351 with PID 2365880 found at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 with PID 2365880 started at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #754: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365880 at Fri Nov 28 19:54:07 CST 2025 kill -USR1 2365880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365880 killed at Fri Nov 28 19:54:07 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365934 >/dev/null 2>/dev/null selfserv_9351 with PID 2365934 found at Fri Nov 28 19:54:07 CST 2025 selfserv_9351 with PID 2365934 started at Fri Nov 28 19:54:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #755: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2365934 at Fri Nov 28 19:54:08 CST 2025 kill -USR1 2365934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365934 killed at Fri Nov 28 19:54:08 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2365973 >/dev/null 2>/dev/null selfserv_9351 with PID 2365973 found at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 with PID 2365973 started at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #756: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2365973 at Fri Nov 28 19:54:08 CST 2025 kill -USR1 2365973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2365973 killed at Fri Nov 28 19:54:08 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366012 >/dev/null 2>/dev/null selfserv_9351 with PID 2366012 found at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 with PID 2366012 started at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #757: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2366012 at Fri Nov 28 19:54:08 CST 2025 kill -USR1 2366012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366012 killed at Fri Nov 28 19:54:08 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366065 >/dev/null 2>/dev/null selfserv_9351 with PID 2366065 found at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 with PID 2366065 started at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #758: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366065 at Fri Nov 28 19:54:08 CST 2025 kill -USR1 2366065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366065 killed at Fri Nov 28 19:54:08 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366109 >/dev/null 2>/dev/null selfserv_9351 with PID 2366109 found at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 with PID 2366109 started at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #759: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366109 at Fri Nov 28 19:54:09 CST 2025 kill -USR1 2366109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366109 killed at Fri Nov 28 19:54:09 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366148 >/dev/null 2>/dev/null selfserv_9351 with PID 2366148 found at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 with PID 2366148 started at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #760: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366148 at Fri Nov 28 19:54:09 CST 2025 kill -USR1 2366148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366148 killed at Fri Nov 28 19:54:09 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366201 >/dev/null 2>/dev/null selfserv_9351 with PID 2366201 found at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 with PID 2366201 started at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #761: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366201 at Fri Nov 28 19:54:09 CST 2025 kill -USR1 2366201 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366201 killed at Fri Nov 28 19:54:09 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366240 >/dev/null 2>/dev/null selfserv_9351 with PID 2366240 found at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 with PID 2366240 started at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #762: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366240 at Fri Nov 28 19:54:09 CST 2025 kill -USR1 2366240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366240 killed at Fri Nov 28 19:54:09 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366285 >/dev/null 2>/dev/null selfserv_9351 with PID 2366285 found at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 with PID 2366285 started at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #763: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366285 at Fri Nov 28 19:54:10 CST 2025 kill -USR1 2366285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366285 killed at Fri Nov 28 19:54:10 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366338 >/dev/null 2>/dev/null selfserv_9351 with PID 2366338 found at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 with PID 2366338 started at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #764: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366338 at Fri Nov 28 19:54:10 CST 2025 kill -USR1 2366338 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366338 killed at Fri Nov 28 19:54:10 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366377 >/dev/null 2>/dev/null selfserv_9351 with PID 2366377 found at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 with PID 2366377 started at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #765: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366377 at Fri Nov 28 19:54:10 CST 2025 kill -USR1 2366377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366377 killed at Fri Nov 28 19:54:10 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366416 >/dev/null 2>/dev/null selfserv_9351 with PID 2366416 found at Fri Nov 28 19:54:10 CST 2025 selfserv_9351 with PID 2366416 started at Fri Nov 28 19:54:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #766: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366416 at Fri Nov 28 19:54:10 CST 2025 kill -USR1 2366416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366416 killed at Fri Nov 28 19:54:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366473 >/dev/null 2>/dev/null selfserv_9351 with PID 2366473 found at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 with PID 2366473 started at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #767: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366473 at Fri Nov 28 19:54:11 CST 2025 kill -USR1 2366473 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366473 killed at Fri Nov 28 19:54:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366512 >/dev/null 2>/dev/null selfserv_9351 with PID 2366512 found at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 with PID 2366512 started at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #768: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366512 at Fri Nov 28 19:54:11 CST 2025 kill -USR1 2366512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366512 killed at Fri Nov 28 19:54:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366551 >/dev/null 2>/dev/null selfserv_9351 with PID 2366551 found at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 with PID 2366551 started at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #769: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366551 at Fri Nov 28 19:54:11 CST 2025 kill -USR1 2366551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366551 killed at Fri Nov 28 19:54:11 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366609 >/dev/null 2>/dev/null selfserv_9351 with PID 2366609 found at Fri Nov 28 19:54:11 CST 2025 selfserv_9351 with PID 2366609 started at Fri Nov 28 19:54:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #770: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366609 at Fri Nov 28 19:54:12 CST 2025 kill -USR1 2366609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366609 killed at Fri Nov 28 19:54:12 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366648 >/dev/null 2>/dev/null selfserv_9351 with PID 2366648 found at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 with PID 2366648 started at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #771: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366648 at Fri Nov 28 19:54:12 CST 2025 kill -USR1 2366648 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366648 killed at Fri Nov 28 19:54:12 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366687 >/dev/null 2>/dev/null selfserv_9351 with PID 2366687 found at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 with PID 2366687 started at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #772: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366687 at Fri Nov 28 19:54:12 CST 2025 kill -USR1 2366687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366687 killed at Fri Nov 28 19:54:12 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366740 >/dev/null 2>/dev/null selfserv_9351 with PID 2366740 found at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 with PID 2366740 started at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #773: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366740 at Fri Nov 28 19:54:12 CST 2025 kill -USR1 2366740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366740 killed at Fri Nov 28 19:54:12 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366780 >/dev/null 2>/dev/null selfserv_9351 with PID 2366780 found at Fri Nov 28 19:54:12 CST 2025 selfserv_9351 with PID 2366780 started at Fri Nov 28 19:54:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #774: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366780 at Fri Nov 28 19:54:13 CST 2025 kill -USR1 2366780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366780 killed at Fri Nov 28 19:54:13 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366819 >/dev/null 2>/dev/null selfserv_9351 with PID 2366819 found at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 with PID 2366819 started at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #775: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2366819 at Fri Nov 28 19:54:13 CST 2025 kill -USR1 2366819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366819 killed at Fri Nov 28 19:54:13 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366872 >/dev/null 2>/dev/null selfserv_9351 with PID 2366872 found at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 with PID 2366872 started at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #776: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366872 at Fri Nov 28 19:54:13 CST 2025 kill -USR1 2366872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366872 killed at Fri Nov 28 19:54:13 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366911 >/dev/null 2>/dev/null selfserv_9351 with PID 2366911 found at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 with PID 2366911 started at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #777: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366911 at Fri Nov 28 19:54:13 CST 2025 kill -USR1 2366911 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366911 killed at Fri Nov 28 19:54:13 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2366955 >/dev/null 2>/dev/null selfserv_9351 with PID 2366955 found at Fri Nov 28 19:54:13 CST 2025 selfserv_9351 with PID 2366955 started at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #778: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2366955 at Fri Nov 28 19:54:14 CST 2025 kill -USR1 2366955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2366955 killed at Fri Nov 28 19:54:14 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367008 >/dev/null 2>/dev/null selfserv_9351 with PID 2367008 found at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 with PID 2367008 started at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #779: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367008 at Fri Nov 28 19:54:14 CST 2025 kill -USR1 2367008 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367008 killed at Fri Nov 28 19:54:14 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367047 >/dev/null 2>/dev/null selfserv_9351 with PID 2367047 found at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 with PID 2367047 started at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #780: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367047 at Fri Nov 28 19:54:14 CST 2025 kill -USR1 2367047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367047 killed at Fri Nov 28 19:54:14 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367086 >/dev/null 2>/dev/null selfserv_9351 with PID 2367086 found at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 with PID 2367086 started at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #781: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367086 at Fri Nov 28 19:54:14 CST 2025 kill -USR1 2367086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367086 killed at Fri Nov 28 19:54:14 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367145 >/dev/null 2>/dev/null selfserv_9351 with PID 2367145 found at Fri Nov 28 19:54:14 CST 2025 selfserv_9351 with PID 2367145 started at Fri Nov 28 19:54:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #782: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367145 at Fri Nov 28 19:54:15 CST 2025 kill -USR1 2367145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367145 killed at Fri Nov 28 19:54:15 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367184 >/dev/null 2>/dev/null selfserv_9351 with PID 2367184 found at Fri Nov 28 19:54:15 CST 2025 selfserv_9351 with PID 2367184 started at Fri Nov 28 19:54:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #783: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367184 at Fri Nov 28 19:54:15 CST 2025 kill -USR1 2367184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367184 killed at Fri Nov 28 19:54:15 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367223 >/dev/null 2>/dev/null selfserv_9351 with PID 2367223 found at Fri Nov 28 19:54:15 CST 2025 selfserv_9351 with PID 2367223 started at Fri Nov 28 19:54:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #784: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367223 at Fri Nov 28 19:54:15 CST 2025 kill -USR1 2367223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367223 killed at Fri Nov 28 19:54:15 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367278 >/dev/null 2>/dev/null selfserv_9351 with PID 2367278 found at Fri Nov 28 19:54:15 CST 2025 selfserv_9351 with PID 2367278 started at Fri Nov 28 19:54:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #785: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367278 at Fri Nov 28 19:54:16 CST 2025 kill -USR1 2367278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367278 killed at Fri Nov 28 19:54:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367317 >/dev/null 2>/dev/null selfserv_9351 with PID 2367317 found at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 with PID 2367317 started at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #786: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367317 at Fri Nov 28 19:54:16 CST 2025 kill -USR1 2367317 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367317 killed at Fri Nov 28 19:54:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367356 >/dev/null 2>/dev/null selfserv_9351 with PID 2367356 found at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 with PID 2367356 started at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367356 at Fri Nov 28 19:54:16 CST 2025 kill -USR1 2367356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367356 killed at Fri Nov 28 19:54:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367409 >/dev/null 2>/dev/null selfserv_9351 with PID 2367409 found at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 with PID 2367409 started at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367409 at Fri Nov 28 19:54:16 CST 2025 kill -USR1 2367409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367409 killed at Fri Nov 28 19:54:16 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367449 >/dev/null 2>/dev/null selfserv_9351 with PID 2367449 found at Fri Nov 28 19:54:16 CST 2025 selfserv_9351 with PID 2367449 started at Fri Nov 28 19:54:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #789: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367449 at Fri Nov 28 19:54:17 CST 2025 kill -USR1 2367449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367449 killed at Fri Nov 28 19:54:17 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367488 >/dev/null 2>/dev/null selfserv_9351 with PID 2367488 found at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 with PID 2367488 started at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #790: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367488 at Fri Nov 28 19:54:17 CST 2025 kill -USR1 2367488 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367488 killed at Fri Nov 28 19:54:17 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367541 >/dev/null 2>/dev/null selfserv_9351 with PID 2367541 found at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 with PID 2367541 started at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #791: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367541 at Fri Nov 28 19:54:17 CST 2025 kill -USR1 2367541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367541 killed at Fri Nov 28 19:54:17 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367580 >/dev/null 2>/dev/null selfserv_9351 with PID 2367580 found at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 with PID 2367580 started at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367580 at Fri Nov 28 19:54:17 CST 2025 kill -USR1 2367580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367580 killed at Fri Nov 28 19:54:17 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367620 >/dev/null 2>/dev/null selfserv_9351 with PID 2367620 found at Fri Nov 28 19:54:17 CST 2025 selfserv_9351 with PID 2367620 started at Fri Nov 28 19:54:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #793: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367620 at Fri Nov 28 19:54:18 CST 2025 kill -USR1 2367620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367620 killed at Fri Nov 28 19:54:18 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367673 >/dev/null 2>/dev/null selfserv_9351 with PID 2367673 found at Fri Nov 28 19:54:18 CST 2025 selfserv_9351 with PID 2367673 started at Fri Nov 28 19:54:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #794: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367673 at Fri Nov 28 19:54:18 CST 2025 kill -USR1 2367673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367673 killed at Fri Nov 28 19:54:18 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367712 >/dev/null 2>/dev/null selfserv_9351 with PID 2367712 found at Fri Nov 28 19:54:18 CST 2025 selfserv_9351 with PID 2367712 started at Fri Nov 28 19:54:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367712 at Fri Nov 28 19:54:18 CST 2025 kill -USR1 2367712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367712 killed at Fri Nov 28 19:54:18 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367755 >/dev/null 2>/dev/null selfserv_9351 with PID 2367755 found at Fri Nov 28 19:54:18 CST 2025 selfserv_9351 with PID 2367755 started at Fri Nov 28 19:54:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367755 at Fri Nov 28 19:54:19 CST 2025 kill -USR1 2367755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367755 killed at Fri Nov 28 19:54:19 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367808 >/dev/null 2>/dev/null selfserv_9351 with PID 2367808 found at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 with PID 2367808 started at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367808 at Fri Nov 28 19:54:19 CST 2025 kill -USR1 2367808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367808 killed at Fri Nov 28 19:54:19 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367847 >/dev/null 2>/dev/null selfserv_9351 with PID 2367847 found at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 with PID 2367847 started at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367847 at Fri Nov 28 19:54:19 CST 2025 kill -USR1 2367847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367847 killed at Fri Nov 28 19:54:19 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367886 >/dev/null 2>/dev/null selfserv_9351 with PID 2367886 found at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 with PID 2367886 started at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367886 at Fri Nov 28 19:54:19 CST 2025 kill -USR1 2367886 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367886 killed at Fri Nov 28 19:54:19 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367945 >/dev/null 2>/dev/null selfserv_9351 with PID 2367945 found at Fri Nov 28 19:54:19 CST 2025 selfserv_9351 with PID 2367945 started at Fri Nov 28 19:54:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #800: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2367945 at Fri Nov 28 19:54:20 CST 2025 kill -USR1 2367945 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367945 killed at Fri Nov 28 19:54:20 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2367984 >/dev/null 2>/dev/null selfserv_9351 with PID 2367984 found at Fri Nov 28 19:54:20 CST 2025 selfserv_9351 with PID 2367984 started at Fri Nov 28 19:54:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2367984 at Fri Nov 28 19:54:20 CST 2025 kill -USR1 2367984 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2367984 killed at Fri Nov 28 19:54:20 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368023 >/dev/null 2>/dev/null selfserv_9351 with PID 2368023 found at Fri Nov 28 19:54:20 CST 2025 selfserv_9351 with PID 2368023 started at Fri Nov 28 19:54:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #802: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368023 at Fri Nov 28 19:54:20 CST 2025 kill -USR1 2368023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368023 killed at Fri Nov 28 19:54:20 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:20 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368081 >/dev/null 2>/dev/null selfserv_9351 with PID 2368081 found at Fri Nov 28 19:54:20 CST 2025 selfserv_9351 with PID 2368081 started at Fri Nov 28 19:54:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #803: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368081 at Fri Nov 28 19:54:21 CST 2025 kill -USR1 2368081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368081 killed at Fri Nov 28 19:54:21 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368120 >/dev/null 2>/dev/null selfserv_9351 with PID 2368120 found at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 with PID 2368120 started at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #804: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368120 at Fri Nov 28 19:54:21 CST 2025 kill -USR1 2368120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368120 killed at Fri Nov 28 19:54:21 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368159 >/dev/null 2>/dev/null selfserv_9351 with PID 2368159 found at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 with PID 2368159 started at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368159 at Fri Nov 28 19:54:21 CST 2025 kill -USR1 2368159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368159 killed at Fri Nov 28 19:54:21 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368212 >/dev/null 2>/dev/null selfserv_9351 with PID 2368212 found at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 with PID 2368212 started at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368212 at Fri Nov 28 19:54:21 CST 2025 kill -USR1 2368212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368212 killed at Fri Nov 28 19:54:21 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:21 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368258 >/dev/null 2>/dev/null selfserv_9351 with PID 2368258 found at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 with PID 2368258 started at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #807: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368258 at Fri Nov 28 19:54:22 CST 2025 kill -USR1 2368258 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368258 killed at Fri Nov 28 19:54:22 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368297 >/dev/null 2>/dev/null selfserv_9351 with PID 2368297 found at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 with PID 2368297 started at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #808: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368297 at Fri Nov 28 19:54:22 CST 2025 kill -USR1 2368297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368297 killed at Fri Nov 28 19:54:22 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368350 >/dev/null 2>/dev/null selfserv_9351 with PID 2368350 found at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 with PID 2368350 started at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #809: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368350 at Fri Nov 28 19:54:22 CST 2025 kill -USR1 2368350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368350 killed at Fri Nov 28 19:54:22 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368390 >/dev/null 2>/dev/null selfserv_9351 with PID 2368390 found at Fri Nov 28 19:54:22 CST 2025 selfserv_9351 with PID 2368390 started at Fri Nov 28 19:54:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2368390 at Fri Nov 28 19:54:23 CST 2025 kill -USR1 2368390 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368390 killed at Fri Nov 28 19:54:23 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368429 >/dev/null 2>/dev/null selfserv_9351 with PID 2368429 found at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 with PID 2368429 started at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368429 at Fri Nov 28 19:54:23 CST 2025 kill -USR1 2368429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368429 killed at Fri Nov 28 19:54:23 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368482 >/dev/null 2>/dev/null selfserv_9351 with PID 2368482 found at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 with PID 2368482 started at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #812: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368482 at Fri Nov 28 19:54:23 CST 2025 kill -USR1 2368482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368482 killed at Fri Nov 28 19:54:23 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368521 >/dev/null 2>/dev/null selfserv_9351 with PID 2368521 found at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 with PID 2368521 started at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2368521 at Fri Nov 28 19:54:23 CST 2025 kill -USR1 2368521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368521 killed at Fri Nov 28 19:54:23 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368584 >/dev/null 2>/dev/null selfserv_9351 with PID 2368584 found at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 with PID 2368584 started at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368584 at Fri Nov 28 19:54:24 CST 2025 kill -USR1 2368584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368584 killed at Fri Nov 28 19:54:24 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368637 >/dev/null 2>/dev/null selfserv_9351 with PID 2368637 found at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 with PID 2368637 started at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368637 at Fri Nov 28 19:54:24 CST 2025 kill -USR1 2368637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368637 killed at Fri Nov 28 19:54:24 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368676 >/dev/null 2>/dev/null selfserv_9351 with PID 2368676 found at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 with PID 2368676 started at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2368676 at Fri Nov 28 19:54:24 CST 2025 kill -USR1 2368676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368676 killed at Fri Nov 28 19:54:24 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368715 >/dev/null 2>/dev/null selfserv_9351 with PID 2368715 found at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 with PID 2368715 started at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368715 at Fri Nov 28 19:54:24 CST 2025 kill -USR1 2368715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368715 killed at Fri Nov 28 19:54:24 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368774 >/dev/null 2>/dev/null selfserv_9351 with PID 2368774 found at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 with PID 2368774 started at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2368774 at Fri Nov 28 19:54:25 CST 2025 kill -USR1 2368774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368774 killed at Fri Nov 28 19:54:25 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368813 >/dev/null 2>/dev/null selfserv_9351 with PID 2368813 found at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 with PID 2368813 started at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2368813 at Fri Nov 28 19:54:25 CST 2025 kill -USR1 2368813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368813 killed at Fri Nov 28 19:54:25 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368852 >/dev/null 2>/dev/null selfserv_9351 with PID 2368852 found at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 with PID 2368852 started at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2368852 at Fri Nov 28 19:54:25 CST 2025 kill -USR1 2368852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368852 killed at Fri Nov 28 19:54:25 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368906 >/dev/null 2>/dev/null selfserv_9351 with PID 2368906 found at Fri Nov 28 19:54:25 CST 2025 selfserv_9351 with PID 2368906 started at Fri Nov 28 19:54:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #821: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368906 at Fri Nov 28 19:54:26 CST 2025 kill -USR1 2368906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368906 killed at Fri Nov 28 19:54:26 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368945 >/dev/null 2>/dev/null selfserv_9351 with PID 2368945 found at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 with PID 2368945 started at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #822: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368945 at Fri Nov 28 19:54:26 CST 2025 kill -USR1 2368945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368945 killed at Fri Nov 28 19:54:26 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2368984 >/dev/null 2>/dev/null selfserv_9351 with PID 2368984 found at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 with PID 2368984 started at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #823: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2368984 at Fri Nov 28 19:54:26 CST 2025 kill -USR1 2368984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2368984 killed at Fri Nov 28 19:54:26 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369037 >/dev/null 2>/dev/null selfserv_9351 with PID 2369037 found at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 with PID 2369037 started at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #824: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2369037 at Fri Nov 28 19:54:26 CST 2025 kill -USR1 2369037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369037 killed at Fri Nov 28 19:54:26 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369076 >/dev/null 2>/dev/null selfserv_9351 with PID 2369076 found at Fri Nov 28 19:54:26 CST 2025 selfserv_9351 with PID 2369076 started at Fri Nov 28 19:54:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369076 at Fri Nov 28 19:54:27 CST 2025 kill -USR1 2369076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369076 killed at Fri Nov 28 19:54:27 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369115 >/dev/null 2>/dev/null selfserv_9351 with PID 2369115 found at Fri Nov 28 19:54:27 CST 2025 selfserv_9351 with PID 2369115 started at Fri Nov 28 19:54:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #826: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2369115 at Fri Nov 28 19:54:27 CST 2025 kill -USR1 2369115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369115 killed at Fri Nov 28 19:54:27 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369168 >/dev/null 2>/dev/null selfserv_9351 with PID 2369168 found at Fri Nov 28 19:54:27 CST 2025 selfserv_9351 with PID 2369168 started at Fri Nov 28 19:54:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369168 at Fri Nov 28 19:54:27 CST 2025 kill -USR1 2369168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369168 killed at Fri Nov 28 19:54:27 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369207 >/dev/null 2>/dev/null selfserv_9351 with PID 2369207 found at Fri Nov 28 19:54:27 CST 2025 selfserv_9351 with PID 2369207 started at Fri Nov 28 19:54:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369207 at Fri Nov 28 19:54:27 CST 2025 kill -USR1 2369207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369207 killed at Fri Nov 28 19:54:27 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369246 >/dev/null 2>/dev/null selfserv_9351 with PID 2369246 found at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 with PID 2369246 started at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369246 at Fri Nov 28 19:54:28 CST 2025 kill -USR1 2369246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369246 killed at Fri Nov 28 19:54:28 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369299 >/dev/null 2>/dev/null selfserv_9351 with PID 2369299 found at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 with PID 2369299 started at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369299 at Fri Nov 28 19:54:28 CST 2025 kill -USR1 2369299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369299 killed at Fri Nov 28 19:54:28 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369338 >/dev/null 2>/dev/null selfserv_9351 with PID 2369338 found at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 with PID 2369338 started at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369338 at Fri Nov 28 19:54:28 CST 2025 kill -USR1 2369338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369338 killed at Fri Nov 28 19:54:28 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369381 >/dev/null 2>/dev/null selfserv_9351 with PID 2369381 found at Fri Nov 28 19:54:28 CST 2025 selfserv_9351 with PID 2369381 started at Fri Nov 28 19:54:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369381 at Fri Nov 28 19:54:28 CST 2025 kill -USR1 2369381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369381 killed at Fri Nov 28 19:54:28 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369434 >/dev/null 2>/dev/null selfserv_9351 with PID 2369434 found at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 with PID 2369434 started at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #833: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369434 at Fri Nov 28 19:54:29 CST 2025 kill -USR1 2369434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369434 killed at Fri Nov 28 19:54:29 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369473 >/dev/null 2>/dev/null selfserv_9351 with PID 2369473 found at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 with PID 2369473 started at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369473 at Fri Nov 28 19:54:29 CST 2025 kill -USR1 2369473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369473 killed at Fri Nov 28 19:54:29 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369512 >/dev/null 2>/dev/null selfserv_9351 with PID 2369512 found at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 with PID 2369512 started at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #835: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369512 at Fri Nov 28 19:54:29 CST 2025 kill -USR1 2369512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369512 killed at Fri Nov 28 19:54:29 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369571 >/dev/null 2>/dev/null selfserv_9351 with PID 2369571 found at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 with PID 2369571 started at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369571 at Fri Nov 28 19:54:29 CST 2025 kill -USR1 2369571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369571 killed at Fri Nov 28 19:54:29 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:29 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369610 >/dev/null 2>/dev/null selfserv_9351 with PID 2369610 found at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 with PID 2369610 started at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #837: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369610 at Fri Nov 28 19:54:30 CST 2025 kill -USR1 2369610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369610 killed at Fri Nov 28 19:54:30 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369649 >/dev/null 2>/dev/null selfserv_9351 with PID 2369649 found at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 with PID 2369649 started at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369649 at Fri Nov 28 19:54:30 CST 2025 kill -USR1 2369649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369649 killed at Fri Nov 28 19:54:30 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369702 >/dev/null 2>/dev/null selfserv_9351 with PID 2369702 found at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 with PID 2369702 started at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #839: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369702 at Fri Nov 28 19:54:30 CST 2025 kill -USR1 2369702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369702 killed at Fri Nov 28 19:54:30 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369741 >/dev/null 2>/dev/null selfserv_9351 with PID 2369741 found at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 with PID 2369741 started at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369741 at Fri Nov 28 19:54:30 CST 2025 kill -USR1 2369741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369741 killed at Fri Nov 28 19:54:30 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369784 >/dev/null 2>/dev/null selfserv_9351 with PID 2369784 found at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 with PID 2369784 started at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #841: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369784 at Fri Nov 28 19:54:31 CST 2025 kill -USR1 2369784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369784 killed at Fri Nov 28 19:54:31 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369837 >/dev/null 2>/dev/null selfserv_9351 with PID 2369837 found at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 with PID 2369837 started at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369837 at Fri Nov 28 19:54:31 CST 2025 kill -USR1 2369837 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369837 killed at Fri Nov 28 19:54:31 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369876 >/dev/null 2>/dev/null selfserv_9351 with PID 2369876 found at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 with PID 2369876 started at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369876 at Fri Nov 28 19:54:31 CST 2025 kill -USR1 2369876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369876 killed at Fri Nov 28 19:54:31 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369915 >/dev/null 2>/dev/null selfserv_9351 with PID 2369915 found at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 with PID 2369915 started at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #844: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2369915 at Fri Nov 28 19:54:31 CST 2025 kill -USR1 2369915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369915 killed at Fri Nov 28 19:54:31 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2369972 >/dev/null 2>/dev/null selfserv_9351 with PID 2369972 found at Fri Nov 28 19:54:31 CST 2025 selfserv_9351 with PID 2369972 started at Fri Nov 28 19:54:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #845: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2369972 at Fri Nov 28 19:54:32 CST 2025 kill -USR1 2369972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2369972 killed at Fri Nov 28 19:54:32 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370011 >/dev/null 2>/dev/null selfserv_9351 with PID 2370011 found at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 with PID 2370011 started at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370011 at Fri Nov 28 19:54:32 CST 2025 kill -USR1 2370011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370011 killed at Fri Nov 28 19:54:32 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370050 >/dev/null 2>/dev/null selfserv_9351 with PID 2370050 found at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 with PID 2370050 started at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #847: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2370050 at Fri Nov 28 19:54:32 CST 2025 kill -USR1 2370050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370050 killed at Fri Nov 28 19:54:32 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370103 >/dev/null 2>/dev/null selfserv_9351 with PID 2370103 found at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 with PID 2370103 started at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #848: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2370103 at Fri Nov 28 19:54:32 CST 2025 kill -USR1 2370103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370103 killed at Fri Nov 28 19:54:32 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370143 >/dev/null 2>/dev/null selfserv_9351 with PID 2370143 found at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 with PID 2370143 started at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #849: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2370143 at Fri Nov 28 19:54:33 CST 2025 kill -USR1 2370143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370143 killed at Fri Nov 28 19:54:33 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370182 >/dev/null 2>/dev/null selfserv_9351 with PID 2370182 found at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 with PID 2370182 started at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #850: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2370182 at Fri Nov 28 19:54:33 CST 2025 kill -USR1 2370182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370182 killed at Fri Nov 28 19:54:33 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370235 >/dev/null 2>/dev/null selfserv_9351 with PID 2370235 found at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 with PID 2370235 started at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #851: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2370235 at Fri Nov 28 19:54:33 CST 2025 kill -USR1 2370235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370235 killed at Fri Nov 28 19:54:33 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370274 >/dev/null 2>/dev/null selfserv_9351 with PID 2370274 found at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 with PID 2370274 started at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #852: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370274 at Fri Nov 28 19:54:33 CST 2025 kill -USR1 2370274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370274 killed at Fri Nov 28 19:54:33 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:33 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370318 >/dev/null 2>/dev/null selfserv_9351 with PID 2370318 found at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 with PID 2370318 started at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #853: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2370318 at Fri Nov 28 19:54:34 CST 2025 kill -USR1 2370318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370318 killed at Fri Nov 28 19:54:34 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370371 >/dev/null 2>/dev/null selfserv_9351 with PID 2370371 found at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 with PID 2370371 started at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370371 at Fri Nov 28 19:54:34 CST 2025 kill -USR1 2370371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370371 killed at Fri Nov 28 19:54:34 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370410 >/dev/null 2>/dev/null selfserv_9351 with PID 2370410 found at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 with PID 2370410 started at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #855: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370410 at Fri Nov 28 19:54:34 CST 2025 kill -USR1 2370410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370410 killed at Fri Nov 28 19:54:34 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370449 >/dev/null 2>/dev/null selfserv_9351 with PID 2370449 found at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 with PID 2370449 started at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #856: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370449 at Fri Nov 28 19:54:34 CST 2025 kill -USR1 2370449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370449 killed at Fri Nov 28 19:54:34 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370508 >/dev/null 2>/dev/null selfserv_9351 with PID 2370508 found at Fri Nov 28 19:54:34 CST 2025 selfserv_9351 with PID 2370508 started at Fri Nov 28 19:54:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #857: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370508 at Fri Nov 28 19:54:35 CST 2025 kill -USR1 2370508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370508 killed at Fri Nov 28 19:54:35 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370547 >/dev/null 2>/dev/null selfserv_9351 with PID 2370547 found at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 with PID 2370547 started at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #858: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370547 at Fri Nov 28 19:54:35 CST 2025 kill -USR1 2370547 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370547 killed at Fri Nov 28 19:54:35 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370586 >/dev/null 2>/dev/null selfserv_9351 with PID 2370586 found at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 with PID 2370586 started at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #859: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370586 at Fri Nov 28 19:54:35 CST 2025 kill -USR1 2370586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370586 killed at Fri Nov 28 19:54:35 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370639 >/dev/null 2>/dev/null selfserv_9351 with PID 2370639 found at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 with PID 2370639 started at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #860: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370639 at Fri Nov 28 19:54:35 CST 2025 kill -USR1 2370639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370639 killed at Fri Nov 28 19:54:35 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370679 >/dev/null 2>/dev/null selfserv_9351 with PID 2370679 found at Fri Nov 28 19:54:35 CST 2025 selfserv_9351 with PID 2370679 started at Fri Nov 28 19:54:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #861: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370679 at Fri Nov 28 19:54:36 CST 2025 kill -USR1 2370679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370679 killed at Fri Nov 28 19:54:36 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370718 >/dev/null 2>/dev/null selfserv_9351 with PID 2370718 found at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 with PID 2370718 started at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #862: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370718 at Fri Nov 28 19:54:36 CST 2025 kill -USR1 2370718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370718 killed at Fri Nov 28 19:54:36 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370771 >/dev/null 2>/dev/null selfserv_9351 with PID 2370771 found at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 with PID 2370771 started at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #863: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370771 at Fri Nov 28 19:54:36 CST 2025 kill -USR1 2370771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370771 killed at Fri Nov 28 19:54:36 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370810 >/dev/null 2>/dev/null selfserv_9351 with PID 2370810 found at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 with PID 2370810 started at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #864: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370810 at Fri Nov 28 19:54:36 CST 2025 kill -USR1 2370810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370810 killed at Fri Nov 28 19:54:36 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370849 >/dev/null 2>/dev/null selfserv_9351 with PID 2370849 found at Fri Nov 28 19:54:36 CST 2025 selfserv_9351 with PID 2370849 started at Fri Nov 28 19:54:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #865: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2370849 at Fri Nov 28 19:54:36 CST 2025 kill -USR1 2370849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370849 killed at Fri Nov 28 19:54:36 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370902 >/dev/null 2>/dev/null selfserv_9351 with PID 2370902 found at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 with PID 2370902 started at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #866: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370902 at Fri Nov 28 19:54:37 CST 2025 kill -USR1 2370902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370902 killed at Fri Nov 28 19:54:37 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370941 >/dev/null 2>/dev/null selfserv_9351 with PID 2370941 found at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 with PID 2370941 started at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #867: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370941 at Fri Nov 28 19:54:37 CST 2025 kill -USR1 2370941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370941 killed at Fri Nov 28 19:54:37 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2370980 >/dev/null 2>/dev/null selfserv_9351 with PID 2370980 found at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 with PID 2370980 started at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #868: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2370980 at Fri Nov 28 19:54:37 CST 2025 kill -USR1 2370980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2370980 killed at Fri Nov 28 19:54:37 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371033 >/dev/null 2>/dev/null selfserv_9351 with PID 2371033 found at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 with PID 2371033 started at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #869: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371033 at Fri Nov 28 19:54:37 CST 2025 kill -USR1 2371033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371033 killed at Fri Nov 28 19:54:37 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371072 >/dev/null 2>/dev/null selfserv_9351 with PID 2371072 found at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 with PID 2371072 started at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #870: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371072 at Fri Nov 28 19:54:38 CST 2025 kill -USR1 2371072 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371072 killed at Fri Nov 28 19:54:38 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371111 >/dev/null 2>/dev/null selfserv_9351 with PID 2371111 found at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 with PID 2371111 started at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #871: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371111 at Fri Nov 28 19:54:38 CST 2025 kill -USR1 2371111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371111 killed at Fri Nov 28 19:54:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371164 >/dev/null 2>/dev/null selfserv_9351 with PID 2371164 found at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 with PID 2371164 started at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #872: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371164 at Fri Nov 28 19:54:38 CST 2025 kill -USR1 2371164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371164 killed at Fri Nov 28 19:54:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371203 >/dev/null 2>/dev/null selfserv_9351 with PID 2371203 found at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 with PID 2371203 started at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #873: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371203 at Fri Nov 28 19:54:38 CST 2025 kill -USR1 2371203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371203 killed at Fri Nov 28 19:54:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371246 >/dev/null 2>/dev/null selfserv_9351 with PID 2371246 found at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 with PID 2371246 started at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #874: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371246 at Fri Nov 28 19:54:39 CST 2025 kill -USR1 2371246 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371246 killed at Fri Nov 28 19:54:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371299 >/dev/null 2>/dev/null selfserv_9351 with PID 2371299 found at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 with PID 2371299 started at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #875: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371299 at Fri Nov 28 19:54:39 CST 2025 kill -USR1 2371299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371299 killed at Fri Nov 28 19:54:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371338 >/dev/null 2>/dev/null selfserv_9351 with PID 2371338 found at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 with PID 2371338 started at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #876: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371338 at Fri Nov 28 19:54:39 CST 2025 kill -USR1 2371338 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371338 killed at Fri Nov 28 19:54:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371377 >/dev/null 2>/dev/null selfserv_9351 with PID 2371377 found at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 with PID 2371377 started at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #877: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371377 at Fri Nov 28 19:54:39 CST 2025 kill -USR1 2371377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371377 killed at Fri Nov 28 19:54:39 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371436 >/dev/null 2>/dev/null selfserv_9351 with PID 2371436 found at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 with PID 2371436 started at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #878: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371436 at Fri Nov 28 19:54:40 CST 2025 kill -USR1 2371436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371436 killed at Fri Nov 28 19:54:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371475 >/dev/null 2>/dev/null selfserv_9351 with PID 2371475 found at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 with PID 2371475 started at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #879: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371475 at Fri Nov 28 19:54:40 CST 2025 kill -USR1 2371475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371475 killed at Fri Nov 28 19:54:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371514 >/dev/null 2>/dev/null selfserv_9351 with PID 2371514 found at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 with PID 2371514 started at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #880: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371514 at Fri Nov 28 19:54:40 CST 2025 kill -USR1 2371514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371514 killed at Fri Nov 28 19:54:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371567 >/dev/null 2>/dev/null selfserv_9351 with PID 2371567 found at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 with PID 2371567 started at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #881: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371567 at Fri Nov 28 19:54:40 CST 2025 kill -USR1 2371567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371567 killed at Fri Nov 28 19:54:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371610 >/dev/null 2>/dev/null selfserv_9351 with PID 2371610 found at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 with PID 2371610 started at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #882: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371610 at Fri Nov 28 19:54:41 CST 2025 kill -USR1 2371610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371610 killed at Fri Nov 28 19:54:41 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371649 >/dev/null 2>/dev/null selfserv_9351 with PID 2371649 found at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 with PID 2371649 started at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #883: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371649 at Fri Nov 28 19:54:41 CST 2025 kill -USR1 2371649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371649 killed at Fri Nov 28 19:54:41 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371702 >/dev/null 2>/dev/null selfserv_9351 with PID 2371702 found at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 with PID 2371702 started at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #884: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371702 at Fri Nov 28 19:54:41 CST 2025 kill -USR1 2371702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371702 killed at Fri Nov 28 19:54:41 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371745 >/dev/null 2>/dev/null selfserv_9351 with PID 2371745 found at Fri Nov 28 19:54:41 CST 2025 selfserv_9351 with PID 2371745 started at Fri Nov 28 19:54:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #885: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371745 at Fri Nov 28 19:54:42 CST 2025 kill -USR1 2371745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371745 killed at Fri Nov 28 19:54:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371784 >/dev/null 2>/dev/null selfserv_9351 with PID 2371784 found at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 with PID 2371784 started at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #886: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371784 at Fri Nov 28 19:54:42 CST 2025 kill -USR1 2371784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371784 killed at Fri Nov 28 19:54:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371837 >/dev/null 2>/dev/null selfserv_9351 with PID 2371837 found at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 with PID 2371837 started at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #887: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371837 at Fri Nov 28 19:54:42 CST 2025 kill -USR1 2371837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371837 killed at Fri Nov 28 19:54:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371876 >/dev/null 2>/dev/null selfserv_9351 with PID 2371876 found at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 with PID 2371876 started at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #888: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371876 at Fri Nov 28 19:54:42 CST 2025 kill -USR1 2371876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371876 killed at Fri Nov 28 19:54:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371916 >/dev/null 2>/dev/null selfserv_9351 with PID 2371916 found at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 with PID 2371916 started at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #889: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2371916 at Fri Nov 28 19:54:43 CST 2025 kill -USR1 2371916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371916 killed at Fri Nov 28 19:54:43 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2371969 >/dev/null 2>/dev/null selfserv_9351 with PID 2371969 found at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 with PID 2371969 started at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #890: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2371969 at Fri Nov 28 19:54:43 CST 2025 kill -USR1 2371969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2371969 killed at Fri Nov 28 19:54:43 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2372008 >/dev/null 2>/dev/null selfserv_9351 with PID 2372008 found at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 with PID 2372008 started at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #891: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2372008 at Fri Nov 28 19:54:43 CST 2025 kill -USR1 2372008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2372008 killed at Fri Nov 28 19:54:43 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2372052 >/dev/null 2>/dev/null selfserv_9351 with PID 2372052 found at Fri Nov 28 19:54:43 CST 2025 selfserv_9351 with PID 2372052 started at Fri Nov 28 19:54:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #892: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2372052 at Fri Nov 28 19:54:44 CST 2025 kill -USR1 2372052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2372052 killed at Fri Nov 28 19:54:44 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2372105 >/dev/null 2>/dev/null selfserv_9351 with PID 2372105 found at Fri Nov 28 19:54:44 CST 2025 selfserv_9351 with PID 2372105 started at Fri Nov 28 19:54:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #893: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2372105 at Fri Nov 28 19:54:44 CST 2025 kill -USR1 2372105 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2372105 killed at Fri Nov 28 19:54:44 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2372144 >/dev/null 2>/dev/null selfserv_9351 with PID 2372144 found at Fri Nov 28 19:54:44 CST 2025 selfserv_9351 with PID 2372144 started at Fri Nov 28 19:54:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #894: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2372144 at Fri Nov 28 19:54:44 CST 2025 kill -USR1 2372144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2372144 killed at Fri Nov 28 19:54:44 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2372189 >/dev/null 2>/dev/null selfserv_9351 with PID 2372189 found at Fri Nov 28 19:54:44 CST 2025 selfserv_9351 with PID 2372189 started at Fri Nov 28 19:54:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #895: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2372189 at Fri Nov 28 19:54:45 CST 2025 kill -USR1 2372189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2372189 killed at Fri Nov 28 19:54:45 CST 2025 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/authin.tl.tmp 0 selfserv_9351 starting at Fri Nov 28 19:54:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:45 CST 2025 selfserv_9351 with PID 2372249 started at Fri Nov 28 19:54:45 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:45 CST 2025 ssl.sh: #722: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:45 CST 2025 ssl.sh: #723: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:45 CST 2025 ssl.sh: #724: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:45 CST 2025 ssl.sh: #725: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:45 CST 2025 ssl.sh: #726: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:46 CST 2025 ssl.sh: #727: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:46 CST 2025 ssl.sh: #728: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:46 CST 2025 ssl.sh: #729: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:46 CST 2025 ssl.sh: #730: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:46 CST 2025 ssl.sh: #731: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:46 CST 2025 ssl.sh: #732: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:47 CST 2025 ssl.sh: #733: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:47 CST 2025 ssl.sh: #734: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:47 CST 2025 ================= CRL Reloaded ============= ssl.sh: #735: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:47 CST 2025 ssl.sh: #736: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:47 CST 2025 ssl.sh: #737: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:47 CST 2025 ssl.sh: #738: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:48 CST 2025 ssl.sh: #739: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:48 CST 2025 ssl.sh: #740: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:48 CST 2025 ssl.sh: #741: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:48 CST 2025 ssl.sh: #742: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:48 CST 2025 ssl.sh: #743: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:48 CST 2025 ssl.sh: #744: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:49 CST 2025 ssl.sh: #745: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:49 CST 2025 ssl.sh: #746: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:49 CST 2025 ssl.sh: #747: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:49 CST 2025 ssl.sh: #748: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:49 CST 2025 ================= CRL Reloaded ============= ssl.sh: #749: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:49 CST 2025 ssl.sh: #750: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:50 CST 2025 ssl.sh: #751: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:50 CST 2025 ssl.sh: #752: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:50 CST 2025 ssl.sh: #753: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:50 CST 2025 ssl.sh: #754: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:50 CST 2025 ssl.sh: #755: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:50 CST 2025 ssl.sh: #756: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:51 CST 2025 ssl.sh: #757: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:51 CST 2025 ssl.sh: #758: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:51 CST 2025 ssl.sh: #759: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:51 CST 2025 ssl.sh: #760: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:51 CST 2025 ssl.sh: #761: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2372249 >/dev/null 2>/dev/null selfserv_9351 with PID 2372249 found at Fri Nov 28 19:54:51 CST 2025 ssl.sh: #762: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2372249 at Fri Nov 28 19:54:51 CST 2025 kill -USR1 2372249 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2372249 killed at Fri Nov 28 19:54:51 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:51 CST 2025 selfserv_9351 with PID 2373187 started at Fri Nov 28 19:54:51 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:52 CST 2025 ssl.sh: #763: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:52 CST 2025 ssl.sh: #764: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:52 CST 2025 ssl.sh: #765: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:52 CST 2025 ssl.sh: #766: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:52 CST 2025 ssl.sh: #767: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:52 CST 2025 ssl.sh: #768: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:53 CST 2025 ssl.sh: #769: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:53 CST 2025 ssl.sh: #770: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:53 CST 2025 ssl.sh: #771: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:53 CST 2025 ssl.sh: #772: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:53 CST 2025 ssl.sh: #773: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:53 CST 2025 ssl.sh: #774: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:54 CST 2025 ssl.sh: #775: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:54 CST 2025 ================= CRL Reloaded ============= ssl.sh: #776: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:54 CST 2025 ssl.sh: #777: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:54 CST 2025 ssl.sh: #778: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:54 CST 2025 ssl.sh: #779: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:54 CST 2025 ssl.sh: #780: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:55 CST 2025 ssl.sh: #781: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:55 CST 2025 ssl.sh: #782: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:55 CST 2025 ssl.sh: #783: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:55 CST 2025 ssl.sh: #784: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:55 CST 2025 ssl.sh: #785: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:55 CST 2025 ssl.sh: #786: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ssl.sh: #787: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ssl.sh: #788: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ssl.sh: #789: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ================= CRL Reloaded ============= ssl.sh: #790: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ssl.sh: #791: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ssl.sh: #792: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:56 CST 2025 ssl.sh: #793: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:57 CST 2025 ssl.sh: #794: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:57 CST 2025 ssl.sh: #795: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:57 CST 2025 ssl.sh: #796: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:57 CST 2025 ssl.sh: #797: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:57 CST 2025 ssl.sh: #798: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:57 CST 2025 ssl.sh: #799: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:58 CST 2025 ssl.sh: #800: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:58 CST 2025 ssl.sh: #801: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:58 CST 2025 ssl.sh: #802: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2373187 >/dev/null 2>/dev/null selfserv_9351 with PID 2373187 found at Fri Nov 28 19:54:58 CST 2025 ssl.sh: #803: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2373187 at Fri Nov 28 19:54:58 CST 2025 kill -USR1 2373187 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2373187 killed at Fri Nov 28 19:54:58 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:54:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:54:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:58 CST 2025 selfserv_9351 with PID 2374120 started at Fri Nov 28 19:54:58 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:58 CST 2025 ssl.sh: #804: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:58 CST 2025 ssl.sh: #805: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #806: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #807: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #808: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #809: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #810: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #811: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #812: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:54:59 CST 2025 ssl.sh: #813: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #814: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #815: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #816: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ================= CRL Reloaded ============= ssl.sh: #817: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #818: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #819: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #820: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #821: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:00 CST 2025 ssl.sh: #822: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #823: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #824: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #825: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #826: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #827: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #828: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #829: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:01 CST 2025 ssl.sh: #830: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ================= CRL Reloaded ============= ssl.sh: #831: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #832: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #833: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #834: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #835: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #836: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #837: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:02 CST 2025 ssl.sh: #838: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #839: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #840: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #841: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #842: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #843: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2374120 >/dev/null 2>/dev/null selfserv_9351 with PID 2374120 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #844: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2374120 at Fri Nov 28 19:55:03 CST 2025 kill -USR1 2374120 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2374120 killed at Fri Nov 28 19:55:03 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:03 CST 2025 selfserv_9351 with PID 2375130 started at Fri Nov 28 19:55:03 CST 2025 Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:03 CST 2025 ssl.sh: #845: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #846: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #847: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #848: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #849: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #850: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #851: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:04 CST 2025 ssl.sh: #852: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ssl.sh: #853: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ssl.sh: #854: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ssl.sh: #855: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ssl.sh: #856: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ssl.sh: #857: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ================= CRL Reloaded ============= ssl.sh: #858: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:05 CST 2025 ssl.sh: #859: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #860: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #861: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #862: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #863: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #864: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #865: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:06 CST 2025 ssl.sh: #866: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ssl.sh: #867: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ssl.sh: #868: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ssl.sh: #869: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ssl.sh: #870: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ssl.sh: #871: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ================= CRL Reloaded ============= ssl.sh: #872: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:07 CST 2025 ssl.sh: #873: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #874: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #875: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #876: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #877: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #878: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #879: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:08 CST 2025 ssl.sh: #880: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:09 CST 2025 ssl.sh: #881: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:09 CST 2025 ssl.sh: #882: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:09 CST 2025 ssl.sh: #883: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:09 CST 2025 ssl.sh: #884: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2375130 >/dev/null 2>/dev/null selfserv_9351 with PID 2375130 found at Fri Nov 28 19:55:09 CST 2025 ssl.sh: #885: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2375130 at Fri Nov 28 19:55:09 CST 2025 kill -USR1 2375130 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2375130 killed at Fri Nov 28 19:55:09 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2376067 >/dev/null 2>/dev/null selfserv_9351 with PID 2376067 found at Fri Nov 28 19:55:09 CST 2025 selfserv_9351 with PID 2376067 started at Fri Nov 28 19:55:09 CST 2025 trying to kill selfserv_9351 with PID 2376067 at Fri Nov 28 19:55:09 CST 2025 kill -USR1 2376067 ./ssl.sh: line 213: 2376067 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2376067 killed at Fri Nov 28 19:55:09 CST 2025 selfserv_9351 starting at Fri Nov 28 19:55:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:09 CST 2025 selfserv_9351 with PID 2376105 started at Fri Nov 28 19:55:09 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #886: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #887: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #888: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #889: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #890: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #891: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:10 CST 2025 ssl.sh: #892: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:11 CST 2025 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:11 CST 2025 ssl.sh: #894: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:11 CST 2025 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:11 CST 2025 ssl.sh: #896: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:11 CST 2025 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:11 CST 2025 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ================= CRL Reloaded ============= ssl.sh: #899: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ssl.sh: #902: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ssl.sh: #903: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ssl.sh: #904: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:12 CST 2025 ssl.sh: #905: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:13 CST 2025 ssl.sh: #906: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:13 CST 2025 ssl.sh: #907: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:13 CST 2025 ssl.sh: #908: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:13 CST 2025 ssl.sh: #909: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:13 CST 2025 ssl.sh: #910: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:13 CST 2025 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ================= CRL Reloaded ============= ssl.sh: #913: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ssl.sh: #914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ssl.sh: #915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ssl.sh: #916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ssl.sh: #917: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:14 CST 2025 ssl.sh: #918: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:15 CST 2025 ssl.sh: #919: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:15 CST 2025 ssl.sh: #920: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:15 CST 2025 ssl.sh: #921: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:15 CST 2025 ssl.sh: #922: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:15 CST 2025 ssl.sh: #923: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:15 CST 2025 ssl.sh: #924: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:16 CST 2025 ssl.sh: #925: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2376105 >/dev/null 2>/dev/null selfserv_9351 with PID 2376105 found at Fri Nov 28 19:55:16 CST 2025 ssl.sh: #926: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2376105 at Fri Nov 28 19:55:16 CST 2025 kill -USR1 2376105 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2376105 killed at Fri Nov 28 19:55:16 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:16 CST 2025 selfserv_9351 with PID 2377046 started at Fri Nov 28 19:55:16 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:16 CST 2025 ssl.sh: #927: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:16 CST 2025 ssl.sh: #928: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:16 CST 2025 ssl.sh: #929: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:17 CST 2025 ssl.sh: #930: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:17 CST 2025 ssl.sh: #931: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:17 CST 2025 ssl.sh: #932: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:17 CST 2025 ssl.sh: #933: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:17 CST 2025 ssl.sh: #934: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:17 CST 2025 ssl.sh: #935: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:18 CST 2025 ssl.sh: #936: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:18 CST 2025 ssl.sh: #937: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:18 CST 2025 ssl.sh: #938: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:18 CST 2025 ssl.sh: #939: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:18 CST 2025 ================= CRL Reloaded ============= ssl.sh: #940: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:18 CST 2025 ssl.sh: #941: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:19 CST 2025 ssl.sh: #942: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:19 CST 2025 ssl.sh: #943: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:19 CST 2025 ssl.sh: #944: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:19 CST 2025 ssl.sh: #945: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:19 CST 2025 ssl.sh: #946: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:19 CST 2025 ssl.sh: #947: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:20 CST 2025 ssl.sh: #948: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:20 CST 2025 ssl.sh: #949: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:20 CST 2025 ssl.sh: #950: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:20 CST 2025 ssl.sh: #951: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:20 CST 2025 ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:20 CST 2025 ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ================= CRL Reloaded ============= ssl.sh: #954: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ssl.sh: #955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ssl.sh: #959: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:21 CST 2025 ssl.sh: #960: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:22 CST 2025 ssl.sh: #961: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:22 CST 2025 ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:22 CST 2025 ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:22 CST 2025 ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:22 CST 2025 ssl.sh: #965: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:22 CST 2025 ssl.sh: #966: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377046 >/dev/null 2>/dev/null selfserv_9351 with PID 2377046 found at Fri Nov 28 19:55:23 CST 2025 ssl.sh: #967: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2377046 at Fri Nov 28 19:55:23 CST 2025 kill -USR1 2377046 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2377046 killed at Fri Nov 28 19:55:23 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:23 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:23 CST 2025 selfserv_9351 with PID 2377990 started at Fri Nov 28 19:55:23 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:23 CST 2025 ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:23 CST 2025 ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:23 CST 2025 ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:24 CST 2025 ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:24 CST 2025 ssl.sh: #972: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:24 CST 2025 ssl.sh: #973: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:24 CST 2025 ssl.sh: #974: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:24 CST 2025 ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:24 CST 2025 ssl.sh: #976: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:25 CST 2025 ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:25 CST 2025 ssl.sh: #978: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:25 CST 2025 ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:25 CST 2025 ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:25 CST 2025 ================= CRL Reloaded ============= ssl.sh: #981: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:25 CST 2025 ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:26 CST 2025 ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:26 CST 2025 ssl.sh: #984: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:26 CST 2025 ssl.sh: #985: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:26 CST 2025 ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:26 CST 2025 ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:26 CST 2025 ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:27 CST 2025 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:27 CST 2025 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:27 CST 2025 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:27 CST 2025 ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:27 CST 2025 ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:28 CST 2025 ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:28 CST 2025 ================= CRL Reloaded ============= ssl.sh: #995: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:28 CST 2025 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:28 CST 2025 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:28 CST 2025 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:28 CST 2025 ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:29 CST 2025 ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:29 CST 2025 ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:29 CST 2025 ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:29 CST 2025 ssl.sh: #1003: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:29 CST 2025 ssl.sh: #1004: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:29 CST 2025 ssl.sh: #1005: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:30 CST 2025 ssl.sh: #1006: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:30 CST 2025 ssl.sh: #1007: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2377990 >/dev/null 2>/dev/null selfserv_9351 with PID 2377990 found at Fri Nov 28 19:55:30 CST 2025 ssl.sh: #1008: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2377990 at Fri Nov 28 19:55:30 CST 2025 kill -USR1 2377990 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2377990 killed at Fri Nov 28 19:55:30 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:30 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:30 CST 2025 selfserv_9351 with PID 2378950 started at Fri Nov 28 19:55:30 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:30 CST 2025 ssl.sh: #1009: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:30 CST 2025 ssl.sh: #1010: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:30 CST 2025 ssl.sh: #1011: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1012: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1013: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1014: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1015: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1016: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1017: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1019: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:31 CST 2025 ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1022: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1023: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1024: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1025: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1026: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1027: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1028: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:32 CST 2025 ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1036: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:33 CST 2025 ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1041: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1042: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1043: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1044: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1045: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1046: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:34 CST 2025 ssl.sh: #1047: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1048: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2378950 >/dev/null 2>/dev/null selfserv_9351 with PID 2378950 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1049: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2378950 at Fri Nov 28 19:55:35 CST 2025 kill -USR1 2378950 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2378950 killed at Fri Nov 28 19:55:35 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:35 CST 2025 selfserv_9351 with PID 2379889 started at Fri Nov 28 19:55:35 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:35 CST 2025 ssl.sh: #1054: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1058: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1060: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1061: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:36 CST 2025 ssl.sh: #1062: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1063: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1067: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:37 CST 2025 ssl.sh: #1070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1072: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1074: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1075: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1077: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:38 CST 2025 ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1081: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1083: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1085: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1086: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:39 CST 2025 ssl.sh: #1087: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:40 CST 2025 ssl.sh: #1088: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:40 CST 2025 ssl.sh: #1089: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2379889 >/dev/null 2>/dev/null selfserv_9351 with PID 2379889 found at Fri Nov 28 19:55:40 CST 2025 ssl.sh: #1090: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2379889 at Fri Nov 28 19:55:40 CST 2025 kill -USR1 2379889 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2379889 killed at Fri Nov 28 19:55:40 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:40 CST 2025 selfserv_9351 with PID 2380819 started at Fri Nov 28 19:55:40 CST 2025 Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:40 CST 2025 ssl.sh: #1091: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:40 CST 2025 ssl.sh: #1092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:40 CST 2025 ssl.sh: #1093: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:41 CST 2025 ssl.sh: #1094: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:41 CST 2025 ssl.sh: #1095: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:41 CST 2025 ssl.sh: #1096: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:41 CST 2025 ssl.sh: #1097: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:41 CST 2025 ssl.sh: #1098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:41 CST 2025 ssl.sh: #1099: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:42 CST 2025 ssl.sh: #1100: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:42 CST 2025 ssl.sh: #1101: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:42 CST 2025 ssl.sh: #1102: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:42 CST 2025 ssl.sh: #1103: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:42 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1104: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:42 CST 2025 ssl.sh: #1105: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1106: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1107: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1109: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1111: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:43 CST 2025 ssl.sh: #1112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:44 CST 2025 ssl.sh: #1113: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:44 CST 2025 ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:44 CST 2025 ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:44 CST 2025 ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:44 CST 2025 ssl.sh: #1117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:44 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1118: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:45 CST 2025 ssl.sh: #1119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:45 CST 2025 ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:45 CST 2025 ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:45 CST 2025 ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:45 CST 2025 ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:45 CST 2025 ssl.sh: #1124: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1125: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1126: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1127: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1128: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1129: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1130: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2380819 >/dev/null 2>/dev/null selfserv_9351 with PID 2380819 found at Fri Nov 28 19:55:46 CST 2025 ssl.sh: #1131: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2380819 at Fri Nov 28 19:55:46 CST 2025 kill -USR1 2380819 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2380819 killed at Fri Nov 28 19:55:46 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2381759 >/dev/null 2>/dev/null selfserv_9351 with PID 2381759 found at Fri Nov 28 19:55:47 CST 2025 selfserv_9351 with PID 2381759 started at Fri Nov 28 19:55:47 CST 2025 trying to kill selfserv_9351 with PID 2381759 at Fri Nov 28 19:55:47 CST 2025 kill -USR1 2381759 ./ssl.sh: line 213: 2381759 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2381759 killed at Fri Nov 28 19:55:47 CST 2025 selfserv_9351 starting at Fri Nov 28 19:55:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:47 CST 2025 selfserv_9351 with PID 2381791 started at Fri Nov 28 19:55:47 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:47 CST 2025 ssl.sh: #1132: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:47 CST 2025 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:47 CST 2025 ssl.sh: #1134: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:47 CST 2025 ssl.sh: #1135: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:47 CST 2025 ssl.sh: #1136: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:48 CST 2025 ssl.sh: #1137: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:48 CST 2025 ssl.sh: #1138: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:48 CST 2025 ssl.sh: #1139: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:48 CST 2025 ssl.sh: #1140: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:48 CST 2025 ssl.sh: #1141: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:48 CST 2025 ssl.sh: #1142: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:49 CST 2025 ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:49 CST 2025 ssl.sh: #1144: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:49 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1145: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:49 CST 2025 ssl.sh: #1146: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:49 CST 2025 ssl.sh: #1147: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:49 CST 2025 ssl.sh: #1148: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1149: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1150: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1151: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1152: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1153: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1154: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:50 CST 2025 ssl.sh: #1155: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:51 CST 2025 ssl.sh: #1156: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:51 CST 2025 ssl.sh: #1157: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:51 CST 2025 ssl.sh: #1158: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:51 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1159: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:51 CST 2025 ssl.sh: #1160: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:51 CST 2025 ssl.sh: #1161: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1162: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1163: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1164: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1165: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1166: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1167: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:52 CST 2025 ssl.sh: #1168: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:53 CST 2025 ssl.sh: #1169: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:53 CST 2025 ssl.sh: #1170: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:53 CST 2025 ssl.sh: #1171: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2381791 >/dev/null 2>/dev/null selfserv_9351 with PID 2381791 found at Fri Nov 28 19:55:53 CST 2025 ssl.sh: #1172: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2381791 at Fri Nov 28 19:55:53 CST 2025 kill -USR1 2381791 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2381791 killed at Fri Nov 28 19:55:53 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:55:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:55:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:53 CST 2025 selfserv_9351 with PID 2382729 started at Fri Nov 28 19:55:53 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:53 CST 2025 ssl.sh: #1173: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:54 CST 2025 ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:54 CST 2025 ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:54 CST 2025 ssl.sh: #1176: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:54 CST 2025 ssl.sh: #1177: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:54 CST 2025 ssl.sh: #1178: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:54 CST 2025 ssl.sh: #1179: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:55 CST 2025 ssl.sh: #1180: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:55 CST 2025 ssl.sh: #1181: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:55 CST 2025 ssl.sh: #1182: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:55 CST 2025 ssl.sh: #1183: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:55 CST 2025 ssl.sh: #1184: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:55 CST 2025 ssl.sh: #1185: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1186: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ssl.sh: #1187: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ssl.sh: #1188: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ssl.sh: #1189: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ssl.sh: #1190: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ssl.sh: #1191: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:56 CST 2025 ssl.sh: #1192: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:57 CST 2025 ssl.sh: #1193: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:57 CST 2025 ssl.sh: #1194: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:57 CST 2025 ssl.sh: #1195: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:57 CST 2025 ssl.sh: #1196: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:57 CST 2025 ssl.sh: #1197: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:57 CST 2025 ssl.sh: #1198: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:58 CST 2025 ssl.sh: #1199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:58 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1200: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:58 CST 2025 ssl.sh: #1201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:58 CST 2025 ssl.sh: #1202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:58 CST 2025 ssl.sh: #1203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:58 CST 2025 ssl.sh: #1204: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:59 CST 2025 ssl.sh: #1205: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:59 CST 2025 ssl.sh: #1206: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:59 CST 2025 ssl.sh: #1207: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:59 CST 2025 ssl.sh: #1208: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:59 CST 2025 ssl.sh: #1209: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:55:59 CST 2025 ssl.sh: #1210: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:56:00 CST 2025 ssl.sh: #1211: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:56:00 CST 2025 ssl.sh: #1212: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2382729 >/dev/null 2>/dev/null selfserv_9351 with PID 2382729 found at Fri Nov 28 19:56:00 CST 2025 ssl.sh: #1213: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2382729 at Fri Nov 28 19:56:00 CST 2025 kill -USR1 2382729 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2382729 killed at Fri Nov 28 19:56:00 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:00 CST 2025 selfserv_9351 with PID 2383683 started at Fri Nov 28 19:56:00 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:00 CST 2025 ssl.sh: #1214: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:00 CST 2025 ssl.sh: #1215: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:01 CST 2025 ssl.sh: #1216: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:01 CST 2025 ssl.sh: #1217: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:01 CST 2025 ssl.sh: #1218: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:01 CST 2025 ssl.sh: #1219: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:01 CST 2025 ssl.sh: #1220: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:02 CST 2025 ssl.sh: #1221: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:02 CST 2025 ssl.sh: #1222: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:02 CST 2025 ssl.sh: #1223: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:02 CST 2025 ssl.sh: #1224: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:02 CST 2025 ssl.sh: #1225: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:02 CST 2025 ssl.sh: #1226: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:03 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1227: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:03 CST 2025 ssl.sh: #1228: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:03 CST 2025 ssl.sh: #1229: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:03 CST 2025 ssl.sh: #1230: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:03 CST 2025 ssl.sh: #1231: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:03 CST 2025 ssl.sh: #1232: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:04 CST 2025 ssl.sh: #1233: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:04 CST 2025 ssl.sh: #1234: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:04 CST 2025 ssl.sh: #1235: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:04 CST 2025 ssl.sh: #1236: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:04 CST 2025 ssl.sh: #1237: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:04 CST 2025 ssl.sh: #1238: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:05 CST 2025 ssl.sh: #1239: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:05 CST 2025 ssl.sh: #1240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:05 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1241: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:05 CST 2025 ssl.sh: #1242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:05 CST 2025 ssl.sh: #1243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:06 CST 2025 ssl.sh: #1244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:06 CST 2025 ssl.sh: #1245: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:06 CST 2025 ssl.sh: #1246: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:06 CST 2025 ssl.sh: #1247: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:06 CST 2025 ssl.sh: #1248: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:06 CST 2025 ssl.sh: #1249: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:07 CST 2025 ssl.sh: #1250: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:07 CST 2025 ssl.sh: #1251: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:07 CST 2025 ssl.sh: #1252: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:07 CST 2025 ssl.sh: #1253: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2383683 >/dev/null 2>/dev/null selfserv_9351 with PID 2383683 found at Fri Nov 28 19:56:07 CST 2025 ssl.sh: #1254: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2383683 at Fri Nov 28 19:56:07 CST 2025 kill -USR1 2383683 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2383683 killed at Fri Nov 28 19:56:07 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:07 CST 2025 selfserv_9351 with PID 2384673 started at Fri Nov 28 19:56:07 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1255: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1256: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1257: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1258: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1259: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1260: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1261: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1262: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:08 CST 2025 ssl.sh: #1263: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1264: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1265: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1266: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1267: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1268: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1269: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1270: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1271: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:09 CST 2025 ssl.sh: #1272: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1273: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1274: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1275: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1276: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1277: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1278: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1279: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1280: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:10 CST 2025 ssl.sh: #1281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1282: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1286: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1287: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1288: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1289: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:11 CST 2025 ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1292: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1293: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1294: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2384673 >/dev/null 2>/dev/null selfserv_9351 with PID 2384673 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1295: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2384673 at Fri Nov 28 19:56:12 CST 2025 kill -USR1 2384673 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2384673 killed at Fri Nov 28 19:56:12 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:12 CST 2025 selfserv_9351 with PID 2385611 started at Fri Nov 28 19:56:12 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1296: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:12 CST 2025 ssl.sh: #1298: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1304: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:13 CST 2025 ssl.sh: #1306: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1308: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1309: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1312: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1313: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:14 CST 2025 ssl.sh: #1314: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1315: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1316: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1317: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1318: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1319: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1320: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1321: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:15 CST 2025 ssl.sh: #1322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1323: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1327: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:16 CST 2025 ssl.sh: #1330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1331: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1332: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1333: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1334: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1335: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2385611 >/dev/null 2>/dev/null selfserv_9351 with PID 2385611 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1336: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2385611 at Fri Nov 28 19:56:17 CST 2025 kill -USR1 2385611 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2385611 killed at Fri Nov 28 19:56:17 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:17 CST 2025 selfserv_9351 with PID 2386545 started at Fri Nov 28 19:56:17 CST 2025 Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:17 CST 2025 ssl.sh: #1337: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:18 CST 2025 ssl.sh: #1338: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:18 CST 2025 ssl.sh: #1339: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:18 CST 2025 ssl.sh: #1340: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:18 CST 2025 ssl.sh: #1341: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:18 CST 2025 ssl.sh: #1342: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:18 CST 2025 ssl.sh: #1343: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ssl.sh: #1344: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ssl.sh: #1345: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ssl.sh: #1346: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ssl.sh: #1347: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ssl.sh: #1348: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ssl.sh: #1349: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:19 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1350: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:20 CST 2025 ssl.sh: #1351: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:20 CST 2025 ssl.sh: #1352: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:20 CST 2025 ssl.sh: #1353: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:20 CST 2025 ssl.sh: #1354: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:20 CST 2025 ssl.sh: #1355: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:20 CST 2025 ssl.sh: #1356: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:21 CST 2025 ssl.sh: #1357: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:21 CST 2025 ssl.sh: #1358: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:21 CST 2025 ssl.sh: #1359: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:21 CST 2025 ssl.sh: #1360: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:21 CST 2025 ssl.sh: #1361: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:21 CST 2025 ssl.sh: #1362: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ssl.sh: #1363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time ec subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ================= CRL Reloaded ============= ssl.sh: #1364: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ssl.sh: #1365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ssl.sh: #1366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ssl.sh: #1367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ssl.sh: #1368: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:22 CST 2025 ssl.sh: #1369: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:23 CST 2025 ssl.sh: #1370: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:23 CST 2025 ssl.sh: #1371: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:23 CST 2025 ssl.sh: #1372: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:23 CST 2025 ssl.sh: #1373: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:23 CST 2025 ssl.sh: #1374: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:23 CST 2025 ssl.sh: #1375: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:24 CST 2025 ssl.sh: #1376: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2386545 >/dev/null 2>/dev/null selfserv_9351 with PID 2386545 found at Fri Nov 28 19:56:24 CST 2025 ssl.sh: #1377: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2386545 at Fri Nov 28 19:56:24 CST 2025 kill -USR1 2386545 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2386545 killed at Fri Nov 28 19:56:24 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2387515 >/dev/null 2>/dev/null selfserv_9351 with PID 2387515 found at Fri Nov 28 19:56:24 CST 2025 selfserv_9351 with PID 2387515 started at Fri Nov 28 19:56:24 CST 2025 trying to kill selfserv_9351 with PID 2387515 at Fri Nov 28 19:56:24 CST 2025 kill -USR1 2387515 ./ssl.sh: line 213: 2387515 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9351 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2387515 killed at Fri Nov 28 19:56:24 CST 2025 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #1378: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #1379: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #1380: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #1381: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #1382: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9351 starting at Fri Nov 28 19:56:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2387606 >/dev/null 2>/dev/null selfserv_9351 with PID 2387606 found at Fri Nov 28 19:56:24 CST 2025 selfserv_9351 with PID 2387606 started at Fri Nov 28 19:56:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1383: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2387606 at Fri Nov 28 19:56:24 CST 2025 kill -USR1 2387606 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2387606 killed at Fri Nov 28 19:56:24 CST 2025 ssl.sh: Check that OCSP doesn't break if we disable sha1 - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** vfyserv -o wrong.host.badssl.com -d ../server 2>&1 | tee ../server/vfy.out Connecting to host wrong.host.badssl.com (addr 104.154.89.105) on port 443 Error in function PR_Write: -12276 - Unable to communicate securely with peer: requested domain name does not match the server's certificate. grep -E '12276|5961' ../server/vfy.out Error in function PR_Write: -12276 ssl.sh: #1384: produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9351 starting at Fri Nov 28 19:56:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2387658 >/dev/null 2>/dev/null selfserv_9351 with PID 2387658 found at Fri Nov 28 19:56:26 CST 2025 selfserv_9351 with PID 2387658 started at Fri Nov 28 19:56:26 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1385: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1386: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1387: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1388: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1389: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1390: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1391: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1392: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1393: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1394: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1395: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing ../client with: selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1396: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1397: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1398: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1399: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1400: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1401: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1402: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1403: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #1404: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #1405: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #1406: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #1407: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1408: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1409: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signature verification ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-verify library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #1410: Restrict RSA keys on signature verification produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signing ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-sign library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: Restrict RSA keys on signing produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-ssl library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12226: SSL peer rejected a handshake message for unacceptable content. tstclnt: write to SSL socket failed: SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. ssl.sh: #1412: Restrict RSA keys when used in SSL produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=1023 library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: Restrict RSA keys when used in SSL produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1414: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #1415: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.112/dist/Linux5.4_aarch64_gcc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2387658 at Fri Nov 28 19:56:28 CST 2025 kill -USR1 2387658 selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2387658 killed at Fri Nov 28 19:56:28 CST 2025 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:56:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2388121 >/dev/null 2>/dev/null selfserv_9351 with PID 2388121 found at Fri Nov 28 19:56:28 CST 2025 selfserv_9351 with PID 2388121 started at Fri Nov 28 19:56:28 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1409: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1410: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1411: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1412: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1413: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1414: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1415: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1416: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1417: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1418: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1419: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1420: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1421: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1422: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1423: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1424: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1425: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1426: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1427: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1428: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2388121 at Fri Nov 28 19:56:32 CST 2025 kill -USR1 2388121 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2388121 killed at Fri Nov 28 19:56:32 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:56:32 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2388626 >/dev/null 2>/dev/null selfserv_9351 with PID 2388626 found at Fri Nov 28 19:56:32 CST 2025 selfserv_9351 with PID 2388626 started at Fri Nov 28 19:56:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2388626 at Fri Nov 28 19:56:37 CST 2025 kill -USR1 2388626 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2388626 killed at Fri Nov 28 19:56:37 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:56:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389350 >/dev/null 2>/dev/null selfserv_9351 with PID 2389350 found at Fri Nov 28 19:56:37 CST 2025 selfserv_9351 with PID 2389350 started at Fri Nov 28 19:56:37 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1512: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389350 at Fri Nov 28 19:56:37 CST 2025 kill -USR1 2389350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389350 killed at Fri Nov 28 19:56:37 CST 2025 ssl.sh: SSL Client Authentication - server normal/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:37 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389404 >/dev/null 2>/dev/null selfserv_9351 with PID 2389404 found at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 with PID 2389404 started at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1512: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389404 at Fri Nov 28 19:56:38 CST 2025 kill -USR1 2389404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389404 killed at Fri Nov 28 19:56:38 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389445 >/dev/null 2>/dev/null selfserv_9351 with PID 2389445 found at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 with PID 2389445 started at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389445 at Fri Nov 28 19:56:38 CST 2025 kill -USR1 2389445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389445 killed at Fri Nov 28 19:56:38 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389486 >/dev/null 2>/dev/null selfserv_9351 with PID 2389486 found at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 with PID 2389486 started at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389486 at Fri Nov 28 19:56:38 CST 2025 kill -USR1 2389486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389486 killed at Fri Nov 28 19:56:38 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389528 >/dev/null 2>/dev/null selfserv_9351 with PID 2389528 found at Fri Nov 28 19:56:38 CST 2025 selfserv_9351 with PID 2389528 started at Fri Nov 28 19:56:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1515: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2389528 at Fri Nov 28 19:56:38 CST 2025 kill -USR1 2389528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389528 killed at Fri Nov 28 19:56:38 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389572 >/dev/null 2>/dev/null selfserv_9351 with PID 2389572 found at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 with PID 2389572 started at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1516: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2389572 at Fri Nov 28 19:56:39 CST 2025 kill -USR1 2389572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389572 killed at Fri Nov 28 19:56:39 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389613 >/dev/null 2>/dev/null selfserv_9351 with PID 2389613 found at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 with PID 2389613 started at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389613 at Fri Nov 28 19:56:39 CST 2025 kill -USR1 2389613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389613 killed at Fri Nov 28 19:56:39 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389654 >/dev/null 2>/dev/null selfserv_9351 with PID 2389654 found at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 with PID 2389654 started at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1518: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389654 at Fri Nov 28 19:56:39 CST 2025 kill -USR1 2389654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389654 killed at Fri Nov 28 19:56:39 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389701 >/dev/null 2>/dev/null selfserv_9351 with PID 2389701 found at Fri Nov 28 19:56:39 CST 2025 selfserv_9351 with PID 2389701 started at Fri Nov 28 19:56:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389701 at Fri Nov 28 19:56:40 CST 2025 kill -USR1 2389701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389701 killed at Fri Nov 28 19:56:40 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389742 >/dev/null 2>/dev/null selfserv_9351 with PID 2389742 found at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 with PID 2389742 started at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389742 at Fri Nov 28 19:56:40 CST 2025 kill -USR1 2389742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389742 killed at Fri Nov 28 19:56:40 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389783 >/dev/null 2>/dev/null selfserv_9351 with PID 2389783 found at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 with PID 2389783 started at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1521: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2389783 at Fri Nov 28 19:56:40 CST 2025 kill -USR1 2389783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389783 killed at Fri Nov 28 19:56:40 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389824 >/dev/null 2>/dev/null selfserv_9351 with PID 2389824 found at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 with PID 2389824 started at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1522: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2389824 at Fri Nov 28 19:56:40 CST 2025 kill -USR1 2389824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389824 killed at Fri Nov 28 19:56:40 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389869 >/dev/null 2>/dev/null selfserv_9351 with PID 2389869 found at Fri Nov 28 19:56:40 CST 2025 selfserv_9351 with PID 2389869 started at Fri Nov 28 19:56:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1523: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389869 at Fri Nov 28 19:56:41 CST 2025 kill -USR1 2389869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389869 killed at Fri Nov 28 19:56:41 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389910 >/dev/null 2>/dev/null selfserv_9351 with PID 2389910 found at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 with PID 2389910 started at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1524: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389910 at Fri Nov 28 19:56:41 CST 2025 kill -USR1 2389910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389910 killed at Fri Nov 28 19:56:41 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389951 >/dev/null 2>/dev/null selfserv_9351 with PID 2389951 found at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 with PID 2389951 started at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389951 at Fri Nov 28 19:56:41 CST 2025 kill -USR1 2389951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389951 killed at Fri Nov 28 19:56:41 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2389992 >/dev/null 2>/dev/null selfserv_9351 with PID 2389992 found at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 with PID 2389992 started at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2389992 at Fri Nov 28 19:56:41 CST 2025 kill -USR1 2389992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2389992 killed at Fri Nov 28 19:56:41 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390037 >/dev/null 2>/dev/null selfserv_9351 with PID 2390037 found at Fri Nov 28 19:56:41 CST 2025 selfserv_9351 with PID 2390037 started at Fri Nov 28 19:56:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1527: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390037 at Fri Nov 28 19:56:42 CST 2025 kill -USR1 2390037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390037 killed at Fri Nov 28 19:56:42 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390078 >/dev/null 2>/dev/null selfserv_9351 with PID 2390078 found at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 with PID 2390078 started at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1528: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390078 at Fri Nov 28 19:56:42 CST 2025 kill -USR1 2390078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390078 killed at Fri Nov 28 19:56:42 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390119 >/dev/null 2>/dev/null selfserv_9351 with PID 2390119 found at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 with PID 2390119 started at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1529: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390119 at Fri Nov 28 19:56:42 CST 2025 kill -USR1 2390119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390119 killed at Fri Nov 28 19:56:42 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390160 >/dev/null 2>/dev/null selfserv_9351 with PID 2390160 found at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 with PID 2390160 started at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1530: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390160 at Fri Nov 28 19:56:42 CST 2025 kill -USR1 2390160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390160 killed at Fri Nov 28 19:56:42 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390202 >/dev/null 2>/dev/null selfserv_9351 with PID 2390202 found at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 with PID 2390202 started at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1531: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390202 at Fri Nov 28 19:56:43 CST 2025 kill -USR1 2390202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390202 killed at Fri Nov 28 19:56:43 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390243 >/dev/null 2>/dev/null selfserv_9351 with PID 2390243 found at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 with PID 2390243 started at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1532: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390243 at Fri Nov 28 19:56:43 CST 2025 kill -USR1 2390243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390243 killed at Fri Nov 28 19:56:43 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390284 >/dev/null 2>/dev/null selfserv_9351 with PID 2390284 found at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 with PID 2390284 started at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390284 at Fri Nov 28 19:56:43 CST 2025 kill -USR1 2390284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390284 killed at Fri Nov 28 19:56:43 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390325 >/dev/null 2>/dev/null selfserv_9351 with PID 2390325 found at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 with PID 2390325 started at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390325 at Fri Nov 28 19:56:43 CST 2025 kill -USR1 2390325 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390325 killed at Fri Nov 28 19:56:43 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:43 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390371 >/dev/null 2>/dev/null selfserv_9351 with PID 2390371 found at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 with PID 2390371 started at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1535: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390371 at Fri Nov 28 19:56:44 CST 2025 kill -USR1 2390371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390371 killed at Fri Nov 28 19:56:44 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390412 >/dev/null 2>/dev/null selfserv_9351 with PID 2390412 found at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 with PID 2390412 started at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1536: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390412 at Fri Nov 28 19:56:44 CST 2025 kill -USR1 2390412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390412 killed at Fri Nov 28 19:56:44 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390453 >/dev/null 2>/dev/null selfserv_9351 with PID 2390453 found at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 with PID 2390453 started at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1537: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390453 at Fri Nov 28 19:56:44 CST 2025 kill -USR1 2390453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390453 killed at Fri Nov 28 19:56:44 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390500 >/dev/null 2>/dev/null selfserv_9351 with PID 2390500 found at Fri Nov 28 19:56:44 CST 2025 selfserv_9351 with PID 2390500 started at Fri Nov 28 19:56:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1538: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390500 at Fri Nov 28 19:56:45 CST 2025 kill -USR1 2390500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390500 killed at Fri Nov 28 19:56:45 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390541 >/dev/null 2>/dev/null selfserv_9351 with PID 2390541 found at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 with PID 2390541 started at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1539: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390541 at Fri Nov 28 19:56:45 CST 2025 kill -USR1 2390541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390541 killed at Fri Nov 28 19:56:45 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390582 >/dev/null 2>/dev/null selfserv_9351 with PID 2390582 found at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 with PID 2390582 started at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1540: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390582 at Fri Nov 28 19:56:45 CST 2025 kill -USR1 2390582 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390582 killed at Fri Nov 28 19:56:45 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390623 >/dev/null 2>/dev/null selfserv_9351 with PID 2390623 found at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 with PID 2390623 started at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1541: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390623 at Fri Nov 28 19:56:45 CST 2025 kill -USR1 2390623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390623 killed at Fri Nov 28 19:56:45 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:45 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390665 >/dev/null 2>/dev/null selfserv_9351 with PID 2390665 found at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 with PID 2390665 started at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1542: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390665 at Fri Nov 28 19:56:46 CST 2025 kill -USR1 2390665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390665 killed at Fri Nov 28 19:56:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390706 >/dev/null 2>/dev/null selfserv_9351 with PID 2390706 found at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 with PID 2390706 started at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1543: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390706 at Fri Nov 28 19:56:46 CST 2025 kill -USR1 2390706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390706 killed at Fri Nov 28 19:56:46 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390747 >/dev/null 2>/dev/null selfserv_9351 with PID 2390747 found at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 with PID 2390747 started at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1544: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390747 at Fri Nov 28 19:56:46 CST 2025 kill -USR1 2390747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390747 killed at Fri Nov 28 19:56:46 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390788 >/dev/null 2>/dev/null selfserv_9351 with PID 2390788 found at Fri Nov 28 19:56:46 CST 2025 selfserv_9351 with PID 2390788 started at Fri Nov 28 19:56:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1545: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390788 at Fri Nov 28 19:56:47 CST 2025 kill -USR1 2390788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390788 killed at Fri Nov 28 19:56:47 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390829 >/dev/null 2>/dev/null selfserv_9351 with PID 2390829 found at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 with PID 2390829 started at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1546: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390829 at Fri Nov 28 19:56:47 CST 2025 kill -USR1 2390829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390829 killed at Fri Nov 28 19:56:47 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390870 >/dev/null 2>/dev/null selfserv_9351 with PID 2390870 found at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 with PID 2390870 started at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1547: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390870 at Fri Nov 28 19:56:47 CST 2025 kill -USR1 2390870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390870 killed at Fri Nov 28 19:56:47 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390911 >/dev/null 2>/dev/null selfserv_9351 with PID 2390911 found at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 with PID 2390911 started at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1548: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390911 at Fri Nov 28 19:56:47 CST 2025 kill -USR1 2390911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390911 killed at Fri Nov 28 19:56:47 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390952 >/dev/null 2>/dev/null selfserv_9351 with PID 2390952 found at Fri Nov 28 19:56:47 CST 2025 selfserv_9351 with PID 2390952 started at Fri Nov 28 19:56:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1549: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2390952 at Fri Nov 28 19:56:48 CST 2025 kill -USR1 2390952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390952 killed at Fri Nov 28 19:56:48 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2390993 >/dev/null 2>/dev/null selfserv_9351 with PID 2390993 found at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 with PID 2390993 started at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1550: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2390993 at Fri Nov 28 19:56:48 CST 2025 kill -USR1 2390993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2390993 killed at Fri Nov 28 19:56:48 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391034 >/dev/null 2>/dev/null selfserv_9351 with PID 2391034 found at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 with PID 2391034 started at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1551: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391034 at Fri Nov 28 19:56:48 CST 2025 kill -USR1 2391034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391034 killed at Fri Nov 28 19:56:48 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391075 >/dev/null 2>/dev/null selfserv_9351 with PID 2391075 found at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 with PID 2391075 started at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1552: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391075 at Fri Nov 28 19:56:48 CST 2025 kill -USR1 2391075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391075 killed at Fri Nov 28 19:56:48 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391120 >/dev/null 2>/dev/null selfserv_9351 with PID 2391120 found at Fri Nov 28 19:56:48 CST 2025 selfserv_9351 with PID 2391120 started at Fri Nov 28 19:56:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1553: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391120 at Fri Nov 28 19:56:49 CST 2025 kill -USR1 2391120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391120 killed at Fri Nov 28 19:56:49 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391161 >/dev/null 2>/dev/null selfserv_9351 with PID 2391161 found at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 with PID 2391161 started at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1554: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2391161 at Fri Nov 28 19:56:49 CST 2025 kill -USR1 2391161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391161 killed at Fri Nov 28 19:56:49 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391202 >/dev/null 2>/dev/null selfserv_9351 with PID 2391202 found at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 with PID 2391202 started at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1555: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391202 at Fri Nov 28 19:56:49 CST 2025 kill -USR1 2391202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391202 killed at Fri Nov 28 19:56:49 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391243 >/dev/null 2>/dev/null selfserv_9351 with PID 2391243 found at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 with PID 2391243 started at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391243 at Fri Nov 28 19:56:49 CST 2025 kill -USR1 2391243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391243 killed at Fri Nov 28 19:56:49 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391290 >/dev/null 2>/dev/null selfserv_9351 with PID 2391290 found at Fri Nov 28 19:56:49 CST 2025 selfserv_9351 with PID 2391290 started at Fri Nov 28 19:56:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391290 at Fri Nov 28 19:56:50 CST 2025 kill -USR1 2391290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391290 killed at Fri Nov 28 19:56:50 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391331 >/dev/null 2>/dev/null selfserv_9351 with PID 2391331 found at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 with PID 2391331 started at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1558: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2391331 at Fri Nov 28 19:56:50 CST 2025 kill -USR1 2391331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391331 killed at Fri Nov 28 19:56:50 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391372 >/dev/null 2>/dev/null selfserv_9351 with PID 2391372 found at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 with PID 2391372 started at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391372 at Fri Nov 28 19:56:50 CST 2025 kill -USR1 2391372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391372 killed at Fri Nov 28 19:56:50 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391413 >/dev/null 2>/dev/null selfserv_9351 with PID 2391413 found at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 with PID 2391413 started at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1560: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391413 at Fri Nov 28 19:56:50 CST 2025 kill -USR1 2391413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391413 killed at Fri Nov 28 19:56:50 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391458 >/dev/null 2>/dev/null selfserv_9351 with PID 2391458 found at Fri Nov 28 19:56:50 CST 2025 selfserv_9351 with PID 2391458 started at Fri Nov 28 19:56:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391458 at Fri Nov 28 19:56:51 CST 2025 kill -USR1 2391458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391458 killed at Fri Nov 28 19:56:51 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391499 >/dev/null 2>/dev/null selfserv_9351 with PID 2391499 found at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 with PID 2391499 started at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2391499 at Fri Nov 28 19:56:51 CST 2025 kill -USR1 2391499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391499 killed at Fri Nov 28 19:56:51 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391540 >/dev/null 2>/dev/null selfserv_9351 with PID 2391540 found at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 with PID 2391540 started at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391540 at Fri Nov 28 19:56:51 CST 2025 kill -USR1 2391540 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391540 killed at Fri Nov 28 19:56:51 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391581 >/dev/null 2>/dev/null selfserv_9351 with PID 2391581 found at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 with PID 2391581 started at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391581 at Fri Nov 28 19:56:51 CST 2025 kill -USR1 2391581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391581 killed at Fri Nov 28 19:56:51 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391626 >/dev/null 2>/dev/null selfserv_9351 with PID 2391626 found at Fri Nov 28 19:56:51 CST 2025 selfserv_9351 with PID 2391626 started at Fri Nov 28 19:56:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391626 at Fri Nov 28 19:56:52 CST 2025 kill -USR1 2391626 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391626 killed at Fri Nov 28 19:56:52 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391667 >/dev/null 2>/dev/null selfserv_9351 with PID 2391667 found at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 with PID 2391667 started at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1566: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2391667 at Fri Nov 28 19:56:52 CST 2025 kill -USR1 2391667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391667 killed at Fri Nov 28 19:56:52 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391708 >/dev/null 2>/dev/null selfserv_9351 with PID 2391708 found at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 with PID 2391708 started at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391708 at Fri Nov 28 19:56:52 CST 2025 kill -USR1 2391708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391708 killed at Fri Nov 28 19:56:52 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391749 >/dev/null 2>/dev/null selfserv_9351 with PID 2391749 found at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 with PID 2391749 started at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391749 at Fri Nov 28 19:56:52 CST 2025 kill -USR1 2391749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391749 killed at Fri Nov 28 19:56:52 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:56:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391791 >/dev/null 2>/dev/null selfserv_9351 with PID 2391791 found at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 with PID 2391791 started at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391791 at Fri Nov 28 19:56:53 CST 2025 kill -USR1 2391791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391791 killed at Fri Nov 28 19:56:53 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391838 >/dev/null 2>/dev/null selfserv_9351 with PID 2391838 found at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 with PID 2391838 started at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391838 at Fri Nov 28 19:56:53 CST 2025 kill -USR1 2391838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391838 killed at Fri Nov 28 19:56:53 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391885 >/dev/null 2>/dev/null selfserv_9351 with PID 2391885 found at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 with PID 2391885 started at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391885 at Fri Nov 28 19:56:53 CST 2025 kill -USR1 2391885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391885 killed at Fri Nov 28 19:56:53 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391938 >/dev/null 2>/dev/null selfserv_9351 with PID 2391938 found at Fri Nov 28 19:56:53 CST 2025 selfserv_9351 with PID 2391938 started at Fri Nov 28 19:56:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1572: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2391938 at Fri Nov 28 19:56:53 CST 2025 kill -USR1 2391938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391938 killed at Fri Nov 28 19:56:53 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2391985 >/dev/null 2>/dev/null selfserv_9351 with PID 2391985 found at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 with PID 2391985 started at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2391985 at Fri Nov 28 19:56:54 CST 2025 kill -USR1 2391985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2391985 killed at Fri Nov 28 19:56:54 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392032 >/dev/null 2>/dev/null selfserv_9351 with PID 2392032 found at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 with PID 2392032 started at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1574: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2392032 at Fri Nov 28 19:56:54 CST 2025 kill -USR1 2392032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392032 killed at Fri Nov 28 19:56:54 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392079 >/dev/null 2>/dev/null selfserv_9351 with PID 2392079 found at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 with PID 2392079 started at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392079 at Fri Nov 28 19:56:54 CST 2025 kill -USR1 2392079 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392079 killed at Fri Nov 28 19:56:54 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392132 >/dev/null 2>/dev/null selfserv_9351 with PID 2392132 found at Fri Nov 28 19:56:54 CST 2025 selfserv_9351 with PID 2392132 started at Fri Nov 28 19:56:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1576: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392132 at Fri Nov 28 19:56:55 CST 2025 kill -USR1 2392132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392132 killed at Fri Nov 28 19:56:55 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392179 >/dev/null 2>/dev/null selfserv_9351 with PID 2392179 found at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 with PID 2392179 started at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1577: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2392179 at Fri Nov 28 19:56:55 CST 2025 kill -USR1 2392179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392179 killed at Fri Nov 28 19:56:55 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392226 >/dev/null 2>/dev/null selfserv_9351 with PID 2392226 found at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 with PID 2392226 started at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1578: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2392226 at Fri Nov 28 19:56:55 CST 2025 kill -USR1 2392226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392226 killed at Fri Nov 28 19:56:55 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392273 >/dev/null 2>/dev/null selfserv_9351 with PID 2392273 found at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 with PID 2392273 started at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1579: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2392273 at Fri Nov 28 19:56:55 CST 2025 kill -USR1 2392273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392273 killed at Fri Nov 28 19:56:55 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392305 >/dev/null 2>/dev/null selfserv_9351 with PID 2392305 found at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 with PID 2392305 started at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1512: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392305 at Fri Nov 28 19:56:55 CST 2025 kill -USR1 2392305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392305 killed at Fri Nov 28 19:56:55 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:56:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392336 >/dev/null 2>/dev/null selfserv_9351 with PID 2392336 found at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 with PID 2392336 started at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1513: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2392336 at Fri Nov 28 19:56:56 CST 2025 kill -USR1 2392336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392336 killed at Fri Nov 28 19:56:56 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392367 >/dev/null 2>/dev/null selfserv_9351 with PID 2392367 found at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 with PID 2392367 started at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1514: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2392367 at Fri Nov 28 19:56:56 CST 2025 kill -USR1 2392367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392367 killed at Fri Nov 28 19:56:56 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392398 >/dev/null 2>/dev/null selfserv_9351 with PID 2392398 found at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 with PID 2392398 started at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1515: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2392398 at Fri Nov 28 19:56:56 CST 2025 kill -USR1 2392398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392398 killed at Fri Nov 28 19:56:56 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392429 >/dev/null 2>/dev/null selfserv_9351 with PID 2392429 found at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 with PID 2392429 started at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1516: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2392429 at Fri Nov 28 19:56:56 CST 2025 kill -USR1 2392429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392429 killed at Fri Nov 28 19:56:56 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392460 >/dev/null 2>/dev/null selfserv_9351 with PID 2392460 found at Fri Nov 28 19:56:56 CST 2025 selfserv_9351 with PID 2392460 started at Fri Nov 28 19:56:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1517: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2392460 at Fri Nov 28 19:56:57 CST 2025 kill -USR1 2392460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392460 killed at Fri Nov 28 19:56:57 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:56:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392491 >/dev/null 2>/dev/null selfserv_9351 with PID 2392491 found at Fri Nov 28 19:56:57 CST 2025 selfserv_9351 with PID 2392491 started at Fri Nov 28 19:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1518: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2392491 at Fri Nov 28 19:56:57 CST 2025 kill -USR1 2392491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392491 killed at Fri Nov 28 19:56:57 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:56:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:56:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392522 >/dev/null 2>/dev/null selfserv_9351 with PID 2392522 found at Fri Nov 28 19:56:57 CST 2025 selfserv_9351 with PID 2392522 started at Fri Nov 28 19:56:57 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:56:57 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:57:01 CST 2025 ssl.sh: #1519: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2392522 at Fri Nov 28 19:57:01 CST 2025 kill -USR1 2392522 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392522 killed at Fri Nov 28 19:57:01 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:57:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392598 >/dev/null 2>/dev/null selfserv_9351 with PID 2392598 found at Fri Nov 28 19:57:01 CST 2025 selfserv_9351 with PID 2392598 started at Fri Nov 28 19:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392598 at Fri Nov 28 19:57:01 CST 2025 kill -USR1 2392598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392598 killed at Fri Nov 28 19:57:01 CST 2025 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392633 >/dev/null 2>/dev/null selfserv_9351 with PID 2392633 found at Fri Nov 28 19:57:01 CST 2025 selfserv_9351 with PID 2392633 started at Fri Nov 28 19:57:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1521: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392633 at Fri Nov 28 19:57:02 CST 2025 kill -USR1 2392633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392633 killed at Fri Nov 28 19:57:02 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392697 >/dev/null 2>/dev/null selfserv_9351 with PID 2392697 found at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 with PID 2392697 started at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1522: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2392697 at Fri Nov 28 19:57:02 CST 2025 kill -USR1 2392697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392697 killed at Fri Nov 28 19:57:02 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392725 >/dev/null 2>/dev/null selfserv_9351 with PID 2392725 found at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 with PID 2392725 started at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1523: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392725 at Fri Nov 28 19:57:02 CST 2025 kill -USR1 2392725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392725 killed at Fri Nov 28 19:57:02 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392753 >/dev/null 2>/dev/null selfserv_9351 with PID 2392753 found at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 with PID 2392753 started at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1524: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2392753 at Fri Nov 28 19:57:02 CST 2025 kill -USR1 2392753 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392753 killed at Fri Nov 28 19:57:02 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392781 >/dev/null 2>/dev/null selfserv_9351 with PID 2392781 found at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 with PID 2392781 started at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392781 at Fri Nov 28 19:57:02 CST 2025 kill -USR1 2392781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392781 killed at Fri Nov 28 19:57:02 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392811 >/dev/null 2>/dev/null selfserv_9351 with PID 2392811 found at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 with PID 2392811 started at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392811 at Fri Nov 28 19:57:02 CST 2025 kill -USR1 2392811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392811 killed at Fri Nov 28 19:57:02 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392839 >/dev/null 2>/dev/null selfserv_9351 with PID 2392839 found at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 with PID 2392839 started at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1527: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392839 at Fri Nov 28 19:57:03 CST 2025 kill -USR1 2392839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392839 killed at Fri Nov 28 19:57:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392867 >/dev/null 2>/dev/null selfserv_9351 with PID 2392867 found at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 with PID 2392867 started at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1528: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392867 at Fri Nov 28 19:57:03 CST 2025 kill -USR1 2392867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392867 killed at Fri Nov 28 19:57:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392895 >/dev/null 2>/dev/null selfserv_9351 with PID 2392895 found at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 with PID 2392895 started at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1529: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392895 at Fri Nov 28 19:57:03 CST 2025 kill -USR1 2392895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392895 killed at Fri Nov 28 19:57:03 CST 2025 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392923 >/dev/null 2>/dev/null selfserv_9351 with PID 2392923 found at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 with PID 2392923 started at Fri Nov 28 19:57:03 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1530: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392923 at Fri Nov 28 19:57:03 CST 2025 kill -USR1 2392923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392923 killed at Fri Nov 28 19:57:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392952 >/dev/null 2>/dev/null selfserv_9351 with PID 2392952 found at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 with PID 2392952 started at Fri Nov 28 19:57:03 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1531: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2392952 at Fri Nov 28 19:57:03 CST 2025 kill -USR1 2392952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392952 killed at Fri Nov 28 19:57:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2392986 >/dev/null 2>/dev/null selfserv_9351 with PID 2392986 found at Fri Nov 28 19:57:03 CST 2025 selfserv_9351 with PID 2392986 started at Fri Nov 28 19:57:03 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1532: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2392986 at Fri Nov 28 19:57:04 CST 2025 kill -USR1 2392986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2392986 killed at Fri Nov 28 19:57:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2393015 >/dev/null 2>/dev/null selfserv_9351 with PID 2393015 found at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 with PID 2393015 started at Fri Nov 28 19:57:04 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1533: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2393015 at Fri Nov 28 19:57:04 CST 2025 kill -USR1 2393015 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393015 killed at Fri Nov 28 19:57:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2393044 >/dev/null 2>/dev/null selfserv_9351 with PID 2393044 found at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 with PID 2393044 started at Fri Nov 28 19:57:04 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1534: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2393044 at Fri Nov 28 19:57:04 CST 2025 kill -USR1 2393044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393044 killed at Fri Nov 28 19:57:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2393073 >/dev/null 2>/dev/null selfserv_9351 with PID 2393073 found at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 with PID 2393073 started at Fri Nov 28 19:57:04 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1535: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2393073 at Fri Nov 28 19:57:04 CST 2025 kill -USR1 2393073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393073 killed at Fri Nov 28 19:57:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2393102 >/dev/null 2>/dev/null selfserv_9351 with PID 2393102 found at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 with PID 2393102 started at Fri Nov 28 19:57:04 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1536: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2393102 at Fri Nov 28 19:57:04 CST 2025 kill -USR1 2393102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393102 killed at Fri Nov 28 19:57:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2393135 >/dev/null 2>/dev/null selfserv_9351 with PID 2393135 found at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 with PID 2393135 started at Fri Nov 28 19:57:04 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1537: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2393135 at Fri Nov 28 19:57:04 CST 2025 kill -USR1 2393135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393135 killed at Fri Nov 28 19:57:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2393166 >/dev/null 2>/dev/null selfserv_9351 with PID 2393166 found at Fri Nov 28 19:57:05 CST 2025 selfserv_9351 with PID 2393166 started at Fri Nov 28 19:57:05 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1538: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2393166 at Fri Nov 28 19:57:05 CST 2025 kill -USR1 2393166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393166 killed at Fri Nov 28 19:57:05 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:57:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2393195 >/dev/null 2>/dev/null selfserv_9351 with PID 2393195 found at Fri Nov 28 19:57:05 CST 2025 selfserv_9351 with PID 2393195 started at Fri Nov 28 19:57:05 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1563: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1564: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1565: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1566: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1567: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1568: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1569: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1570: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1571: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1572: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1573: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1574: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1575: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1576: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1577: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1578: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1579: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1580: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1581: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1582: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1583: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1584: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1585: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1586: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1587: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1588: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1589: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2393195 at Fri Nov 28 19:57:09 CST 2025 kill -USR1 2393195 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393195 killed at Fri Nov 28 19:57:09 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:57:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2393689 >/dev/null 2>/dev/null selfserv_9351 with PID 2393689 found at Fri Nov 28 19:57:09 CST 2025 selfserv_9351 with PID 2393689 started at Fri Nov 28 19:57:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1590: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1591: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1592: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1593: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1594: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1595: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1596: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1597: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1598: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1599: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1600: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1601: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1602: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1603: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1604: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1605: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1606: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1607: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1608: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1609: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1610: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1611: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1612: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1613: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1614: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1615: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1616: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1617: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1618: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1619: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1620: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1621: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1622: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1623: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1624: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1625: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1626: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1627: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1628: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1629: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1630: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1631: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1632: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1633: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1634: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1635: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1636: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1637: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1638: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1639: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1640: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1641: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1642: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1643: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1644: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1645: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1646: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1647: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1648: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1649: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1650: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1651: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1652: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1653: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1654: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1655: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1656: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1657: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1658: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1659: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1660: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1661: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1662: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1663: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1664: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1665: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2393689 at Fri Nov 28 19:57:15 CST 2025 kill -USR1 2393689 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2393689 killed at Fri Nov 28 19:57:15 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394439 >/dev/null 2>/dev/null selfserv_9351 with PID 2394439 found at Fri Nov 28 19:57:15 CST 2025 selfserv_9351 with PID 2394439 started at Fri Nov 28 19:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1666: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394439 at Fri Nov 28 19:57:15 CST 2025 kill -USR1 2394439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394439 killed at Fri Nov 28 19:57:15 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394480 >/dev/null 2>/dev/null selfserv_9351 with PID 2394480 found at Fri Nov 28 19:57:15 CST 2025 selfserv_9351 with PID 2394480 started at Fri Nov 28 19:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394480 at Fri Nov 28 19:57:15 CST 2025 kill -USR1 2394480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394480 killed at Fri Nov 28 19:57:15 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:15 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394523 >/dev/null 2>/dev/null selfserv_9351 with PID 2394523 found at Fri Nov 28 19:57:15 CST 2025 selfserv_9351 with PID 2394523 started at Fri Nov 28 19:57:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1668: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394523 at Fri Nov 28 19:57:16 CST 2025 kill -USR1 2394523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394523 killed at Fri Nov 28 19:57:16 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394564 >/dev/null 2>/dev/null selfserv_9351 with PID 2394564 found at Fri Nov 28 19:57:16 CST 2025 selfserv_9351 with PID 2394564 started at Fri Nov 28 19:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1669: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2394564 at Fri Nov 28 19:57:16 CST 2025 kill -USR1 2394564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394564 killed at Fri Nov 28 19:57:16 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394605 >/dev/null 2>/dev/null selfserv_9351 with PID 2394605 found at Fri Nov 28 19:57:16 CST 2025 selfserv_9351 with PID 2394605 started at Fri Nov 28 19:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1670: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2394605 at Fri Nov 28 19:57:16 CST 2025 kill -USR1 2394605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394605 killed at Fri Nov 28 19:57:16 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:16 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394647 >/dev/null 2>/dev/null selfserv_9351 with PID 2394647 found at Fri Nov 28 19:57:17 CST 2025 selfserv_9351 with PID 2394647 started at Fri Nov 28 19:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1671: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394647 at Fri Nov 28 19:57:17 CST 2025 kill -USR1 2394647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394647 killed at Fri Nov 28 19:57:17 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394688 >/dev/null 2>/dev/null selfserv_9351 with PID 2394688 found at Fri Nov 28 19:57:17 CST 2025 selfserv_9351 with PID 2394688 started at Fri Nov 28 19:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1672: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394688 at Fri Nov 28 19:57:17 CST 2025 kill -USR1 2394688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394688 killed at Fri Nov 28 19:57:17 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:17 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394730 >/dev/null 2>/dev/null selfserv_9351 with PID 2394730 found at Fri Nov 28 19:57:17 CST 2025 selfserv_9351 with PID 2394730 started at Fri Nov 28 19:57:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394730 at Fri Nov 28 19:57:18 CST 2025 kill -USR1 2394730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394730 killed at Fri Nov 28 19:57:18 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394771 >/dev/null 2>/dev/null selfserv_9351 with PID 2394771 found at Fri Nov 28 19:57:18 CST 2025 selfserv_9351 with PID 2394771 started at Fri Nov 28 19:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394771 at Fri Nov 28 19:57:18 CST 2025 kill -USR1 2394771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394771 killed at Fri Nov 28 19:57:18 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394812 >/dev/null 2>/dev/null selfserv_9351 with PID 2394812 found at Fri Nov 28 19:57:18 CST 2025 selfserv_9351 with PID 2394812 started at Fri Nov 28 19:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1675: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2394812 at Fri Nov 28 19:57:18 CST 2025 kill -USR1 2394812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394812 killed at Fri Nov 28 19:57:18 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394857 >/dev/null 2>/dev/null selfserv_9351 with PID 2394857 found at Fri Nov 28 19:57:19 CST 2025 selfserv_9351 with PID 2394857 started at Fri Nov 28 19:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1676: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2394857 at Fri Nov 28 19:57:19 CST 2025 kill -USR1 2394857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394857 killed at Fri Nov 28 19:57:19 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394898 >/dev/null 2>/dev/null selfserv_9351 with PID 2394898 found at Fri Nov 28 19:57:19 CST 2025 selfserv_9351 with PID 2394898 started at Fri Nov 28 19:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1677: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394898 at Fri Nov 28 19:57:19 CST 2025 kill -USR1 2394898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394898 killed at Fri Nov 28 19:57:19 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394939 >/dev/null 2>/dev/null selfserv_9351 with PID 2394939 found at Fri Nov 28 19:57:19 CST 2025 selfserv_9351 with PID 2394939 started at Fri Nov 28 19:57:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1678: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394939 at Fri Nov 28 19:57:20 CST 2025 kill -USR1 2394939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394939 killed at Fri Nov 28 19:57:20 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2394986 >/dev/null 2>/dev/null selfserv_9351 with PID 2394986 found at Fri Nov 28 19:57:20 CST 2025 selfserv_9351 with PID 2394986 started at Fri Nov 28 19:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1679: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2394986 at Fri Nov 28 19:57:20 CST 2025 kill -USR1 2394986 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2394986 killed at Fri Nov 28 19:57:20 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395027 >/dev/null 2>/dev/null selfserv_9351 with PID 2395027 found at Fri Nov 28 19:57:20 CST 2025 selfserv_9351 with PID 2395027 started at Fri Nov 28 19:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1680: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395027 at Fri Nov 28 19:57:20 CST 2025 kill -USR1 2395027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395027 killed at Fri Nov 28 19:57:20 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395073 >/dev/null 2>/dev/null selfserv_9351 with PID 2395073 found at Fri Nov 28 19:57:20 CST 2025 selfserv_9351 with PID 2395073 started at Fri Nov 28 19:57:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1681: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395073 at Fri Nov 28 19:57:21 CST 2025 kill -USR1 2395073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395073 killed at Fri Nov 28 19:57:21 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395114 >/dev/null 2>/dev/null selfserv_9351 with PID 2395114 found at Fri Nov 28 19:57:21 CST 2025 selfserv_9351 with PID 2395114 started at Fri Nov 28 19:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1682: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395114 at Fri Nov 28 19:57:21 CST 2025 kill -USR1 2395114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395114 killed at Fri Nov 28 19:57:21 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:21 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395155 >/dev/null 2>/dev/null selfserv_9351 with PID 2395155 found at Fri Nov 28 19:57:21 CST 2025 selfserv_9351 with PID 2395155 started at Fri Nov 28 19:57:21 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1683: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395155 at Fri Nov 28 19:57:22 CST 2025 kill -USR1 2395155 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395155 killed at Fri Nov 28 19:57:22 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395203 >/dev/null 2>/dev/null selfserv_9351 with PID 2395203 found at Fri Nov 28 19:57:22 CST 2025 selfserv_9351 with PID 2395203 started at Fri Nov 28 19:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1684: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395203 at Fri Nov 28 19:57:22 CST 2025 kill -USR1 2395203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395203 killed at Fri Nov 28 19:57:22 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395244 >/dev/null 2>/dev/null selfserv_9351 with PID 2395244 found at Fri Nov 28 19:57:22 CST 2025 selfserv_9351 with PID 2395244 started at Fri Nov 28 19:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1685: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395244 at Fri Nov 28 19:57:22 CST 2025 kill -USR1 2395244 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395244 killed at Fri Nov 28 19:57:22 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:22 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395285 >/dev/null 2>/dev/null selfserv_9351 with PID 2395285 found at Fri Nov 28 19:57:22 CST 2025 selfserv_9351 with PID 2395285 started at Fri Nov 28 19:57:22 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1686: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395285 at Fri Nov 28 19:57:23 CST 2025 kill -USR1 2395285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395285 killed at Fri Nov 28 19:57:23 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395327 >/dev/null 2>/dev/null selfserv_9351 with PID 2395327 found at Fri Nov 28 19:57:23 CST 2025 selfserv_9351 with PID 2395327 started at Fri Nov 28 19:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1687: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395327 at Fri Nov 28 19:57:23 CST 2025 kill -USR1 2395327 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395327 killed at Fri Nov 28 19:57:23 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395368 >/dev/null 2>/dev/null selfserv_9351 with PID 2395368 found at Fri Nov 28 19:57:23 CST 2025 selfserv_9351 with PID 2395368 started at Fri Nov 28 19:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1688: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395368 at Fri Nov 28 19:57:23 CST 2025 kill -USR1 2395368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395368 killed at Fri Nov 28 19:57:23 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:23 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395433 >/dev/null 2>/dev/null selfserv_9351 with PID 2395433 found at Fri Nov 28 19:57:23 CST 2025 selfserv_9351 with PID 2395433 started at Fri Nov 28 19:57:23 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1689: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395433 at Fri Nov 28 19:57:24 CST 2025 kill -USR1 2395433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395433 killed at Fri Nov 28 19:57:24 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395474 >/dev/null 2>/dev/null selfserv_9351 with PID 2395474 found at Fri Nov 28 19:57:24 CST 2025 selfserv_9351 with PID 2395474 started at Fri Nov 28 19:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1690: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395474 at Fri Nov 28 19:57:24 CST 2025 kill -USR1 2395474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395474 killed at Fri Nov 28 19:57:24 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395515 >/dev/null 2>/dev/null selfserv_9351 with PID 2395515 found at Fri Nov 28 19:57:24 CST 2025 selfserv_9351 with PID 2395515 started at Fri Nov 28 19:57:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1691: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395515 at Fri Nov 28 19:57:25 CST 2025 kill -USR1 2395515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395515 killed at Fri Nov 28 19:57:25 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395562 >/dev/null 2>/dev/null selfserv_9351 with PID 2395562 found at Fri Nov 28 19:57:25 CST 2025 selfserv_9351 with PID 2395562 started at Fri Nov 28 19:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1692: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395562 at Fri Nov 28 19:57:25 CST 2025 kill -USR1 2395562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395562 killed at Fri Nov 28 19:57:25 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395603 >/dev/null 2>/dev/null selfserv_9351 with PID 2395603 found at Fri Nov 28 19:57:25 CST 2025 selfserv_9351 with PID 2395603 started at Fri Nov 28 19:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1693: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395603 at Fri Nov 28 19:57:25 CST 2025 kill -USR1 2395603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395603 killed at Fri Nov 28 19:57:25 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:25 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395645 >/dev/null 2>/dev/null selfserv_9351 with PID 2395645 found at Fri Nov 28 19:57:26 CST 2025 selfserv_9351 with PID 2395645 started at Fri Nov 28 19:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1694: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395645 at Fri Nov 28 19:57:26 CST 2025 kill -USR1 2395645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395645 killed at Fri Nov 28 19:57:26 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395686 >/dev/null 2>/dev/null selfserv_9351 with PID 2395686 found at Fri Nov 28 19:57:26 CST 2025 selfserv_9351 with PID 2395686 started at Fri Nov 28 19:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1695: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395686 at Fri Nov 28 19:57:26 CST 2025 kill -USR1 2395686 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395686 killed at Fri Nov 28 19:57:26 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395727 >/dev/null 2>/dev/null selfserv_9351 with PID 2395727 found at Fri Nov 28 19:57:26 CST 2025 selfserv_9351 with PID 2395727 started at Fri Nov 28 19:57:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1696: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395727 at Fri Nov 28 19:57:27 CST 2025 kill -USR1 2395727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395727 killed at Fri Nov 28 19:57:27 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395768 >/dev/null 2>/dev/null selfserv_9351 with PID 2395768 found at Fri Nov 28 19:57:27 CST 2025 selfserv_9351 with PID 2395768 started at Fri Nov 28 19:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1697: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395768 at Fri Nov 28 19:57:27 CST 2025 kill -USR1 2395768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395768 killed at Fri Nov 28 19:57:27 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395809 >/dev/null 2>/dev/null selfserv_9351 with PID 2395809 found at Fri Nov 28 19:57:27 CST 2025 selfserv_9351 with PID 2395809 started at Fri Nov 28 19:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1698: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395809 at Fri Nov 28 19:57:27 CST 2025 kill -USR1 2395809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395809 killed at Fri Nov 28 19:57:27 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395850 >/dev/null 2>/dev/null selfserv_9351 with PID 2395850 found at Fri Nov 28 19:57:28 CST 2025 selfserv_9351 with PID 2395850 started at Fri Nov 28 19:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1699: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2395850 at Fri Nov 28 19:57:28 CST 2025 kill -USR1 2395850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395850 killed at Fri Nov 28 19:57:28 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:28 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395891 >/dev/null 2>/dev/null selfserv_9351 with PID 2395891 found at Fri Nov 28 19:57:28 CST 2025 selfserv_9351 with PID 2395891 started at Fri Nov 28 19:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1700: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395891 at Fri Nov 28 19:57:28 CST 2025 kill -USR1 2395891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395891 killed at Fri Nov 28 19:57:28 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:28 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395934 >/dev/null 2>/dev/null selfserv_9351 with PID 2395934 found at Fri Nov 28 19:57:28 CST 2025 selfserv_9351 with PID 2395934 started at Fri Nov 28 19:57:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1701: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395934 at Fri Nov 28 19:57:29 CST 2025 kill -USR1 2395934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395934 killed at Fri Nov 28 19:57:29 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2395977 >/dev/null 2>/dev/null selfserv_9351 with PID 2395977 found at Fri Nov 28 19:57:29 CST 2025 selfserv_9351 with PID 2395977 started at Fri Nov 28 19:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1702: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2395977 at Fri Nov 28 19:57:29 CST 2025 kill -USR1 2395977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2395977 killed at Fri Nov 28 19:57:29 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396018 >/dev/null 2>/dev/null selfserv_9351 with PID 2396018 found at Fri Nov 28 19:57:29 CST 2025 selfserv_9351 with PID 2396018 started at Fri Nov 28 19:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1703: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396018 at Fri Nov 28 19:57:29 CST 2025 kill -USR1 2396018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396018 killed at Fri Nov 28 19:57:29 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:29 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:29 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396065 >/dev/null 2>/dev/null selfserv_9351 with PID 2396065 found at Fri Nov 28 19:57:30 CST 2025 selfserv_9351 with PID 2396065 started at Fri Nov 28 19:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1704: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2396065 at Fri Nov 28 19:57:30 CST 2025 kill -USR1 2396065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396065 killed at Fri Nov 28 19:57:30 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396106 >/dev/null 2>/dev/null selfserv_9351 with PID 2396106 found at Fri Nov 28 19:57:30 CST 2025 selfserv_9351 with PID 2396106 started at Fri Nov 28 19:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1705: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396106 at Fri Nov 28 19:57:30 CST 2025 kill -USR1 2396106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396106 killed at Fri Nov 28 19:57:30 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396151 >/dev/null 2>/dev/null selfserv_9351 with PID 2396151 found at Fri Nov 28 19:57:30 CST 2025 selfserv_9351 with PID 2396151 started at Fri Nov 28 19:57:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1706: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396151 at Fri Nov 28 19:57:31 CST 2025 kill -USR1 2396151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396151 killed at Fri Nov 28 19:57:31 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396192 >/dev/null 2>/dev/null selfserv_9351 with PID 2396192 found at Fri Nov 28 19:57:31 CST 2025 selfserv_9351 with PID 2396192 started at Fri Nov 28 19:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1707: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396192 at Fri Nov 28 19:57:31 CST 2025 kill -USR1 2396192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396192 killed at Fri Nov 28 19:57:31 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396233 >/dev/null 2>/dev/null selfserv_9351 with PID 2396233 found at Fri Nov 28 19:57:31 CST 2025 selfserv_9351 with PID 2396233 started at Fri Nov 28 19:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1708: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2396233 at Fri Nov 28 19:57:31 CST 2025 kill -USR1 2396233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396233 killed at Fri Nov 28 19:57:31 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396278 >/dev/null 2>/dev/null selfserv_9351 with PID 2396278 found at Fri Nov 28 19:57:31 CST 2025 selfserv_9351 with PID 2396278 started at Fri Nov 28 19:57:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1709: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396278 at Fri Nov 28 19:57:32 CST 2025 kill -USR1 2396278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396278 killed at Fri Nov 28 19:57:32 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396319 >/dev/null 2>/dev/null selfserv_9351 with PID 2396319 found at Fri Nov 28 19:57:32 CST 2025 selfserv_9351 with PID 2396319 started at Fri Nov 28 19:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1710: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396319 at Fri Nov 28 19:57:32 CST 2025 kill -USR1 2396319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396319 killed at Fri Nov 28 19:57:32 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396360 >/dev/null 2>/dev/null selfserv_9351 with PID 2396360 found at Fri Nov 28 19:57:32 CST 2025 selfserv_9351 with PID 2396360 started at Fri Nov 28 19:57:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1711: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396360 at Fri Nov 28 19:57:33 CST 2025 kill -USR1 2396360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396360 killed at Fri Nov 28 19:57:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396402 >/dev/null 2>/dev/null selfserv_9351 with PID 2396402 found at Fri Nov 28 19:57:33 CST 2025 selfserv_9351 with PID 2396402 started at Fri Nov 28 19:57:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1712: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2396402 at Fri Nov 28 19:57:33 CST 2025 kill -USR1 2396402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396402 killed at Fri Nov 28 19:57:33 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396443 >/dev/null 2>/dev/null selfserv_9351 with PID 2396443 found at Fri Nov 28 19:57:33 CST 2025 selfserv_9351 with PID 2396443 started at Fri Nov 28 19:57:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1713: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396443 at Fri Nov 28 19:57:33 CST 2025 kill -USR1 2396443 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396443 killed at Fri Nov 28 19:57:33 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396489 >/dev/null 2>/dev/null selfserv_9351 with PID 2396489 found at Fri Nov 28 19:57:33 CST 2025 selfserv_9351 with PID 2396489 started at Fri Nov 28 19:57:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1714: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396489 at Fri Nov 28 19:57:34 CST 2025 kill -USR1 2396489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396489 killed at Fri Nov 28 19:57:34 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396530 >/dev/null 2>/dev/null selfserv_9351 with PID 2396530 found at Fri Nov 28 19:57:34 CST 2025 selfserv_9351 with PID 2396530 started at Fri Nov 28 19:57:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1715: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396530 at Fri Nov 28 19:57:34 CST 2025 kill -USR1 2396530 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396530 killed at Fri Nov 28 19:57:34 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396571 >/dev/null 2>/dev/null selfserv_9351 with PID 2396571 found at Fri Nov 28 19:57:34 CST 2025 selfserv_9351 with PID 2396571 started at Fri Nov 28 19:57:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1716: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2396571 at Fri Nov 28 19:57:34 CST 2025 kill -USR1 2396571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396571 killed at Fri Nov 28 19:57:34 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396618 >/dev/null 2>/dev/null selfserv_9351 with PID 2396618 found at Fri Nov 28 19:57:35 CST 2025 selfserv_9351 with PID 2396618 started at Fri Nov 28 19:57:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1717: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396618 at Fri Nov 28 19:57:35 CST 2025 kill -USR1 2396618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396618 killed at Fri Nov 28 19:57:35 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396659 >/dev/null 2>/dev/null selfserv_9351 with PID 2396659 found at Fri Nov 28 19:57:35 CST 2025 selfserv_9351 with PID 2396659 started at Fri Nov 28 19:57:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1718: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396659 at Fri Nov 28 19:57:35 CST 2025 kill -USR1 2396659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396659 killed at Fri Nov 28 19:57:35 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396701 >/dev/null 2>/dev/null selfserv_9351 with PID 2396701 found at Fri Nov 28 19:57:35 CST 2025 selfserv_9351 with PID 2396701 started at Fri Nov 28 19:57:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1719: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396701 at Fri Nov 28 19:57:36 CST 2025 kill -USR1 2396701 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396701 killed at Fri Nov 28 19:57:36 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396742 >/dev/null 2>/dev/null selfserv_9351 with PID 2396742 found at Fri Nov 28 19:57:36 CST 2025 selfserv_9351 with PID 2396742 started at Fri Nov 28 19:57:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2396742 at Fri Nov 28 19:57:36 CST 2025 kill -USR1 2396742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396742 killed at Fri Nov 28 19:57:36 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396783 >/dev/null 2>/dev/null selfserv_9351 with PID 2396783 found at Fri Nov 28 19:57:36 CST 2025 selfserv_9351 with PID 2396783 started at Fri Nov 28 19:57:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1721: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396783 at Fri Nov 28 19:57:37 CST 2025 kill -USR1 2396783 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396783 killed at Fri Nov 28 19:57:37 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396824 >/dev/null 2>/dev/null selfserv_9351 with PID 2396824 found at Fri Nov 28 19:57:37 CST 2025 selfserv_9351 with PID 2396824 started at Fri Nov 28 19:57:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1722: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396824 at Fri Nov 28 19:57:37 CST 2025 kill -USR1 2396824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396824 killed at Fri Nov 28 19:57:37 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396865 >/dev/null 2>/dev/null selfserv_9351 with PID 2396865 found at Fri Nov 28 19:57:37 CST 2025 selfserv_9351 with PID 2396865 started at Fri Nov 28 19:57:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1723: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396865 at Fri Nov 28 19:57:37 CST 2025 kill -USR1 2396865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396865 killed at Fri Nov 28 19:57:37 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:57:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396936 >/dev/null 2>/dev/null selfserv_9351 with PID 2396936 found at Fri Nov 28 19:57:37 CST 2025 selfserv_9351 with PID 2396936 started at Fri Nov 28 19:57:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1666: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396936 at Fri Nov 28 19:57:38 CST 2025 kill -USR1 2396936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396936 killed at Fri Nov 28 19:57:38 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396967 >/dev/null 2>/dev/null selfserv_9351 with PID 2396967 found at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 with PID 2396967 started at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2396967 at Fri Nov 28 19:57:38 CST 2025 kill -USR1 2396967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396967 killed at Fri Nov 28 19:57:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2396995 >/dev/null 2>/dev/null selfserv_9351 with PID 2396995 found at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 with PID 2396995 started at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1668: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2396995 at Fri Nov 28 19:57:38 CST 2025 kill -USR1 2396995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2396995 killed at Fri Nov 28 19:57:38 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397023 >/dev/null 2>/dev/null selfserv_9351 with PID 2397023 found at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 with PID 2397023 started at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1669: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397023 at Fri Nov 28 19:57:38 CST 2025 kill -USR1 2397023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397023 killed at Fri Nov 28 19:57:38 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397055 >/dev/null 2>/dev/null selfserv_9351 with PID 2397055 found at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 with PID 2397055 started at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1670: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2397055 at Fri Nov 28 19:57:38 CST 2025 kill -USR1 2397055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397055 killed at Fri Nov 28 19:57:38 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397083 >/dev/null 2>/dev/null selfserv_9351 with PID 2397083 found at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 with PID 2397083 started at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1671: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397083 at Fri Nov 28 19:57:39 CST 2025 kill -USR1 2397083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397083 killed at Fri Nov 28 19:57:39 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397111 >/dev/null 2>/dev/null selfserv_9351 with PID 2397111 found at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 with PID 2397111 started at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1672: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397111 at Fri Nov 28 19:57:39 CST 2025 kill -USR1 2397111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397111 killed at Fri Nov 28 19:57:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397139 >/dev/null 2>/dev/null selfserv_9351 with PID 2397139 found at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 with PID 2397139 started at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397139 at Fri Nov 28 19:57:39 CST 2025 kill -USR1 2397139 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397139 killed at Fri Nov 28 19:57:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397167 >/dev/null 2>/dev/null selfserv_9351 with PID 2397167 found at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 with PID 2397167 started at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397167 at Fri Nov 28 19:57:39 CST 2025 kill -USR1 2397167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397167 killed at Fri Nov 28 19:57:39 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397201 >/dev/null 2>/dev/null selfserv_9351 with PID 2397201 found at Fri Nov 28 19:57:39 CST 2025 selfserv_9351 with PID 2397201 started at Fri Nov 28 19:57:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1675: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397201 at Fri Nov 28 19:57:40 CST 2025 kill -USR1 2397201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397201 killed at Fri Nov 28 19:57:40 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397229 >/dev/null 2>/dev/null selfserv_9351 with PID 2397229 found at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 with PID 2397229 started at Fri Nov 28 19:57:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1676: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397229 at Fri Nov 28 19:57:40 CST 2025 kill -USR1 2397229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397229 killed at Fri Nov 28 19:57:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397258 >/dev/null 2>/dev/null selfserv_9351 with PID 2397258 found at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 with PID 2397258 started at Fri Nov 28 19:57:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1677: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2397258 at Fri Nov 28 19:57:40 CST 2025 kill -USR1 2397258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397258 killed at Fri Nov 28 19:57:40 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397287 >/dev/null 2>/dev/null selfserv_9351 with PID 2397287 found at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 with PID 2397287 started at Fri Nov 28 19:57:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1678: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397287 at Fri Nov 28 19:57:40 CST 2025 kill -USR1 2397287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397287 killed at Fri Nov 28 19:57:40 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397316 >/dev/null 2>/dev/null selfserv_9351 with PID 2397316 found at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 with PID 2397316 started at Fri Nov 28 19:57:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1679: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2397316 at Fri Nov 28 19:57:40 CST 2025 kill -USR1 2397316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397316 killed at Fri Nov 28 19:57:40 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397349 >/dev/null 2>/dev/null selfserv_9351 with PID 2397349 found at Fri Nov 28 19:57:40 CST 2025 selfserv_9351 with PID 2397349 started at Fri Nov 28 19:57:40 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1680: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397349 at Fri Nov 28 19:57:41 CST 2025 kill -USR1 2397349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397349 killed at Fri Nov 28 19:57:41 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397378 >/dev/null 2>/dev/null selfserv_9351 with PID 2397378 found at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 with PID 2397378 started at Fri Nov 28 19:57:41 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1681: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397378 at Fri Nov 28 19:57:41 CST 2025 kill -USR1 2397378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397378 killed at Fri Nov 28 19:57:41 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397407 >/dev/null 2>/dev/null selfserv_9351 with PID 2397407 found at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 with PID 2397407 started at Fri Nov 28 19:57:41 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1682: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397407 at Fri Nov 28 19:57:41 CST 2025 kill -USR1 2397407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397407 killed at Fri Nov 28 19:57:41 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397436 >/dev/null 2>/dev/null selfserv_9351 with PID 2397436 found at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 with PID 2397436 started at Fri Nov 28 19:57:41 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1683: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397436 at Fri Nov 28 19:57:41 CST 2025 kill -USR1 2397436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397436 killed at Fri Nov 28 19:57:41 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2397465 >/dev/null 2>/dev/null selfserv_9351 with PID 2397465 found at Fri Nov 28 19:57:41 CST 2025 selfserv_9351 with PID 2397465 started at Fri Nov 28 19:57:41 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1684: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2397465 at Fri Nov 28 19:57:41 CST 2025 kill -USR1 2397465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397465 killed at Fri Nov 28 19:57:41 CST 2025 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -fips true -force FIPS mode enabled. ssl.sh: #1685: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1686: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1687: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1688: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1689: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1690: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:57:42 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2397536 >/dev/null 2>/dev/null selfserv_9351 with PID 2397536 found at Fri Nov 28 19:57:42 CST 2025 selfserv_9351 with PID 2397536 started at Fri Nov 28 19:57:42 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1691: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1692: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1693: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1694: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1695: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1696: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1697: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1698: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1699: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1700: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1701: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1702: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1703: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1704: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1705: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1706: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1707: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1708: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1709: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1710: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1711: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1712: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1713: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1714: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1715: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1716: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1717: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1718: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1719: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1720: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1721: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1722: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1723: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1724: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1725: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1726: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1727: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1728: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1729: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1730: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1731: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1732: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1733: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1734: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1735: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1736: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1737: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1738: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1739: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1740: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1741: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2397536 at Fri Nov 28 19:57:46 CST 2025 kill -USR1 2397536 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2397536 killed at Fri Nov 28 19:57:46 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:57:46 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2398036 >/dev/null 2>/dev/null selfserv_9351 with PID 2398036 found at Fri Nov 28 19:57:46 CST 2025 selfserv_9351 with PID 2398036 started at Fri Nov 28 19:57:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1742: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1743: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1744: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1745: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1746: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1747: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1748: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1749: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1750: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1751: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1752: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1753: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1754: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1755: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1756: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1757: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1758: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1759: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1760: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1761: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1762: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1763: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1764: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1765: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1766: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1767: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1768: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1769: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1770: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1771: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1772: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1773: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1774: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1775: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1776: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1777: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1778: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1779: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1780: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1781: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1782: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1783: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1784: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1785: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1786: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1787: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1788: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1789: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1790: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1791: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1792: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1793: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1794: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1795: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1796: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1797: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1798: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1799: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1800: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1801: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1802: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1803: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1804: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1805: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1806: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1807: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1808: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1809: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1810: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1811: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1812: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1813: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1814: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1815: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1816: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1817: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2398036 at Fri Nov 28 19:57:51 CST 2025 kill -USR1 2398036 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398036 killed at Fri Nov 28 19:57:51 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:57:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2398765 >/dev/null 2>/dev/null selfserv_9351 with PID 2398765 found at Fri Nov 28 19:57:51 CST 2025 selfserv_9351 with PID 2398765 started at Fri Nov 28 19:57:51 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1818: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2398765 at Fri Nov 28 19:57:52 CST 2025 kill -USR1 2398765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398765 killed at Fri Nov 28 19:57:52 CST 2025 ssl.sh: SSL Client Authentication - server fips/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2398819 >/dev/null 2>/dev/null selfserv_9351 with PID 2398819 found at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 with PID 2398819 started at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1818: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2398819 at Fri Nov 28 19:57:52 CST 2025 kill -USR1 2398819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398819 killed at Fri Nov 28 19:57:52 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2398860 >/dev/null 2>/dev/null selfserv_9351 with PID 2398860 found at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 with PID 2398860 started at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2398860 at Fri Nov 28 19:57:52 CST 2025 kill -USR1 2398860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398860 killed at Fri Nov 28 19:57:52 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2398901 >/dev/null 2>/dev/null selfserv_9351 with PID 2398901 found at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 with PID 2398901 started at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2398901 at Fri Nov 28 19:57:52 CST 2025 kill -USR1 2398901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398901 killed at Fri Nov 28 19:57:52 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2398943 >/dev/null 2>/dev/null selfserv_9351 with PID 2398943 found at Fri Nov 28 19:57:52 CST 2025 selfserv_9351 with PID 2398943 started at Fri Nov 28 19:57:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1821: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2398943 at Fri Nov 28 19:57:53 CST 2025 kill -USR1 2398943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398943 killed at Fri Nov 28 19:57:53 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2398984 >/dev/null 2>/dev/null selfserv_9351 with PID 2398984 found at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 with PID 2398984 started at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1822: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2398984 at Fri Nov 28 19:57:53 CST 2025 kill -USR1 2398984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2398984 killed at Fri Nov 28 19:57:53 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399025 >/dev/null 2>/dev/null selfserv_9351 with PID 2399025 found at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 with PID 2399025 started at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399025 at Fri Nov 28 19:57:53 CST 2025 kill -USR1 2399025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399025 killed at Fri Nov 28 19:57:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399066 >/dev/null 2>/dev/null selfserv_9351 with PID 2399066 found at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 with PID 2399066 started at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1824: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399066 at Fri Nov 28 19:57:53 CST 2025 kill -USR1 2399066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399066 killed at Fri Nov 28 19:57:53 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:53 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399113 >/dev/null 2>/dev/null selfserv_9351 with PID 2399113 found at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 with PID 2399113 started at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399113 at Fri Nov 28 19:57:54 CST 2025 kill -USR1 2399113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399113 killed at Fri Nov 28 19:57:54 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399154 >/dev/null 2>/dev/null selfserv_9351 with PID 2399154 found at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 with PID 2399154 started at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399154 at Fri Nov 28 19:57:54 CST 2025 kill -USR1 2399154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399154 killed at Fri Nov 28 19:57:54 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399195 >/dev/null 2>/dev/null selfserv_9351 with PID 2399195 found at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 with PID 2399195 started at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1827: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399195 at Fri Nov 28 19:57:54 CST 2025 kill -USR1 2399195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399195 killed at Fri Nov 28 19:57:54 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399242 >/dev/null 2>/dev/null selfserv_9351 with PID 2399242 found at Fri Nov 28 19:57:54 CST 2025 selfserv_9351 with PID 2399242 started at Fri Nov 28 19:57:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1828: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399242 at Fri Nov 28 19:57:55 CST 2025 kill -USR1 2399242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399242 killed at Fri Nov 28 19:57:55 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399283 >/dev/null 2>/dev/null selfserv_9351 with PID 2399283 found at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 with PID 2399283 started at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1829: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399283 at Fri Nov 28 19:57:55 CST 2025 kill -USR1 2399283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399283 killed at Fri Nov 28 19:57:55 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399324 >/dev/null 2>/dev/null selfserv_9351 with PID 2399324 found at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 with PID 2399324 started at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1830: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399324 at Fri Nov 28 19:57:55 CST 2025 kill -USR1 2399324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399324 killed at Fri Nov 28 19:57:55 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399365 >/dev/null 2>/dev/null selfserv_9351 with PID 2399365 found at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 with PID 2399365 started at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399365 at Fri Nov 28 19:57:55 CST 2025 kill -USR1 2399365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399365 killed at Fri Nov 28 19:57:55 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:55 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399407 >/dev/null 2>/dev/null selfserv_9351 with PID 2399407 found at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 with PID 2399407 started at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399407 at Fri Nov 28 19:57:56 CST 2025 kill -USR1 2399407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399407 killed at Fri Nov 28 19:57:56 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399448 >/dev/null 2>/dev/null selfserv_9351 with PID 2399448 found at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 with PID 2399448 started at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1833: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399448 at Fri Nov 28 19:57:56 CST 2025 kill -USR1 2399448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399448 killed at Fri Nov 28 19:57:56 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399489 >/dev/null 2>/dev/null selfserv_9351 with PID 2399489 found at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 with PID 2399489 started at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1834: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399489 at Fri Nov 28 19:57:56 CST 2025 kill -USR1 2399489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399489 killed at Fri Nov 28 19:57:56 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399530 >/dev/null 2>/dev/null selfserv_9351 with PID 2399530 found at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 with PID 2399530 started at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1835: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399530 at Fri Nov 28 19:57:56 CST 2025 kill -USR1 2399530 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399530 killed at Fri Nov 28 19:57:56 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:56 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399571 >/dev/null 2>/dev/null selfserv_9351 with PID 2399571 found at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 with PID 2399571 started at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1836: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399571 at Fri Nov 28 19:57:57 CST 2025 kill -USR1 2399571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399571 killed at Fri Nov 28 19:57:57 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399612 >/dev/null 2>/dev/null selfserv_9351 with PID 2399612 found at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 with PID 2399612 started at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1837: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399612 at Fri Nov 28 19:57:57 CST 2025 kill -USR1 2399612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399612 killed at Fri Nov 28 19:57:57 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399653 >/dev/null 2>/dev/null selfserv_9351 with PID 2399653 found at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 with PID 2399653 started at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1838: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399653 at Fri Nov 28 19:57:57 CST 2025 kill -USR1 2399653 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399653 killed at Fri Nov 28 19:57:57 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399694 >/dev/null 2>/dev/null selfserv_9351 with PID 2399694 found at Fri Nov 28 19:57:57 CST 2025 selfserv_9351 with PID 2399694 started at Fri Nov 28 19:57:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1839: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399694 at Fri Nov 28 19:57:58 CST 2025 kill -USR1 2399694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399694 killed at Fri Nov 28 19:57:58 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399735 >/dev/null 2>/dev/null selfserv_9351 with PID 2399735 found at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 with PID 2399735 started at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1840: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399735 at Fri Nov 28 19:57:58 CST 2025 kill -USR1 2399735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399735 killed at Fri Nov 28 19:57:58 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399776 >/dev/null 2>/dev/null selfserv_9351 with PID 2399776 found at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 with PID 2399776 started at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1841: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399776 at Fri Nov 28 19:57:58 CST 2025 kill -USR1 2399776 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399776 killed at Fri Nov 28 19:57:58 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399817 >/dev/null 2>/dev/null selfserv_9351 with PID 2399817 found at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 with PID 2399817 started at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1842: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399817 at Fri Nov 28 19:57:58 CST 2025 kill -USR1 2399817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399817 killed at Fri Nov 28 19:57:58 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:57:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399862 >/dev/null 2>/dev/null selfserv_9351 with PID 2399862 found at Fri Nov 28 19:57:59 CST 2025 selfserv_9351 with PID 2399862 started at Fri Nov 28 19:57:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1843: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399862 at Fri Nov 28 19:57:59 CST 2025 kill -USR1 2399862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399862 killed at Fri Nov 28 19:57:59 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399903 >/dev/null 2>/dev/null selfserv_9351 with PID 2399903 found at Fri Nov 28 19:57:59 CST 2025 selfserv_9351 with PID 2399903 started at Fri Nov 28 19:57:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1844: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2399903 at Fri Nov 28 19:57:59 CST 2025 kill -USR1 2399903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399903 killed at Fri Nov 28 19:57:59 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:57:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:57:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2399944 >/dev/null 2>/dev/null selfserv_9351 with PID 2399944 found at Fri Nov 28 19:57:59 CST 2025 selfserv_9351 with PID 2399944 started at Fri Nov 28 19:57:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1845: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2399944 at Fri Nov 28 19:57:59 CST 2025 kill -USR1 2399944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2399944 killed at Fri Nov 28 19:57:59 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400003 >/dev/null 2>/dev/null selfserv_9351 with PID 2400003 found at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 with PID 2400003 started at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1846: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2400003 at Fri Nov 28 19:58:00 CST 2025 kill -USR1 2400003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400003 killed at Fri Nov 28 19:58:00 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400044 >/dev/null 2>/dev/null selfserv_9351 with PID 2400044 found at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 with PID 2400044 started at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1847: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400044 at Fri Nov 28 19:58:00 CST 2025 kill -USR1 2400044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400044 killed at Fri Nov 28 19:58:00 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400085 >/dev/null 2>/dev/null selfserv_9351 with PID 2400085 found at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 with PID 2400085 started at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1848: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400085 at Fri Nov 28 19:58:00 CST 2025 kill -USR1 2400085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400085 killed at Fri Nov 28 19:58:00 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400130 >/dev/null 2>/dev/null selfserv_9351 with PID 2400130 found at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 with PID 2400130 started at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1849: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400130 at Fri Nov 28 19:58:01 CST 2025 kill -USR1 2400130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400130 killed at Fri Nov 28 19:58:01 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400183 >/dev/null 2>/dev/null selfserv_9351 with PID 2400183 found at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 with PID 2400183 started at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1850: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400183 at Fri Nov 28 19:58:01 CST 2025 kill -USR1 2400183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400183 killed at Fri Nov 28 19:58:01 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400224 >/dev/null 2>/dev/null selfserv_9351 with PID 2400224 found at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 with PID 2400224 started at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1851: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2400224 at Fri Nov 28 19:58:01 CST 2025 kill -USR1 2400224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400224 killed at Fri Nov 28 19:58:01 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400265 >/dev/null 2>/dev/null selfserv_9351 with PID 2400265 found at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 with PID 2400265 started at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1852: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400265 at Fri Nov 28 19:58:01 CST 2025 kill -USR1 2400265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400265 killed at Fri Nov 28 19:58:01 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:01 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400346 >/dev/null 2>/dev/null selfserv_9351 with PID 2400346 found at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 with PID 2400346 started at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1853: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400346 at Fri Nov 28 19:58:02 CST 2025 kill -USR1 2400346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400346 killed at Fri Nov 28 19:58:02 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400387 >/dev/null 2>/dev/null selfserv_9351 with PID 2400387 found at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 with PID 2400387 started at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1854: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400387 at Fri Nov 28 19:58:02 CST 2025 kill -USR1 2400387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400387 killed at Fri Nov 28 19:58:02 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400428 >/dev/null 2>/dev/null selfserv_9351 with PID 2400428 found at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 with PID 2400428 started at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1855: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400428 at Fri Nov 28 19:58:02 CST 2025 kill -USR1 2400428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400428 killed at Fri Nov 28 19:58:02 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400471 >/dev/null 2>/dev/null selfserv_9351 with PID 2400471 found at Fri Nov 28 19:58:02 CST 2025 selfserv_9351 with PID 2400471 started at Fri Nov 28 19:58:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1856: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2400471 at Fri Nov 28 19:58:03 CST 2025 kill -USR1 2400471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400471 killed at Fri Nov 28 19:58:03 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400512 >/dev/null 2>/dev/null selfserv_9351 with PID 2400512 found at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 with PID 2400512 started at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1857: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400512 at Fri Nov 28 19:58:03 CST 2025 kill -USR1 2400512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400512 killed at Fri Nov 28 19:58:03 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400553 >/dev/null 2>/dev/null selfserv_9351 with PID 2400553 found at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 with PID 2400553 started at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1858: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400553 at Fri Nov 28 19:58:03 CST 2025 kill -USR1 2400553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400553 killed at Fri Nov 28 19:58:03 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400594 >/dev/null 2>/dev/null selfserv_9351 with PID 2400594 found at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 with PID 2400594 started at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1859: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400594 at Fri Nov 28 19:58:03 CST 2025 kill -USR1 2400594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400594 killed at Fri Nov 28 19:58:03 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400640 >/dev/null 2>/dev/null selfserv_9351 with PID 2400640 found at Fri Nov 28 19:58:03 CST 2025 selfserv_9351 with PID 2400640 started at Fri Nov 28 19:58:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1860: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2400640 at Fri Nov 28 19:58:04 CST 2025 kill -USR1 2400640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400640 killed at Fri Nov 28 19:58:04 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400681 >/dev/null 2>/dev/null selfserv_9351 with PID 2400681 found at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 with PID 2400681 started at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1861: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400681 at Fri Nov 28 19:58:04 CST 2025 kill -USR1 2400681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400681 killed at Fri Nov 28 19:58:04 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400722 >/dev/null 2>/dev/null selfserv_9351 with PID 2400722 found at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 with PID 2400722 started at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1862: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400722 at Fri Nov 28 19:58:04 CST 2025 kill -USR1 2400722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400722 killed at Fri Nov 28 19:58:04 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400763 >/dev/null 2>/dev/null selfserv_9351 with PID 2400763 found at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 with PID 2400763 started at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1863: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400763 at Fri Nov 28 19:58:04 CST 2025 kill -USR1 2400763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400763 killed at Fri Nov 28 19:58:04 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400810 >/dev/null 2>/dev/null selfserv_9351 with PID 2400810 found at Fri Nov 28 19:58:04 CST 2025 selfserv_9351 with PID 2400810 started at Fri Nov 28 19:58:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1864: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2400810 at Fri Nov 28 19:58:05 CST 2025 kill -USR1 2400810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400810 killed at Fri Nov 28 19:58:05 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400851 >/dev/null 2>/dev/null selfserv_9351 with PID 2400851 found at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 with PID 2400851 started at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1865: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400851 at Fri Nov 28 19:58:05 CST 2025 kill -USR1 2400851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400851 killed at Fri Nov 28 19:58:05 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400892 >/dev/null 2>/dev/null selfserv_9351 with PID 2400892 found at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 with PID 2400892 started at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1866: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400892 at Fri Nov 28 19:58:05 CST 2025 kill -USR1 2400892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400892 killed at Fri Nov 28 19:58:05 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400933 >/dev/null 2>/dev/null selfserv_9351 with PID 2400933 found at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 with PID 2400933 started at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1867: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2400933 at Fri Nov 28 19:58:05 CST 2025 kill -USR1 2400933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400933 killed at Fri Nov 28 19:58:05 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2400975 >/dev/null 2>/dev/null selfserv_9351 with PID 2400975 found at Fri Nov 28 19:58:05 CST 2025 selfserv_9351 with PID 2400975 started at Fri Nov 28 19:58:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1868: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2400975 at Fri Nov 28 19:58:06 CST 2025 kill -USR1 2400975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2400975 killed at Fri Nov 28 19:58:06 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401016 >/dev/null 2>/dev/null selfserv_9351 with PID 2401016 found at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 with PID 2401016 started at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1869: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401016 at Fri Nov 28 19:58:06 CST 2025 kill -USR1 2401016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401016 killed at Fri Nov 28 19:58:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401057 >/dev/null 2>/dev/null selfserv_9351 with PID 2401057 found at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 with PID 2401057 started at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1870: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401057 at Fri Nov 28 19:58:06 CST 2025 kill -USR1 2401057 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401057 killed at Fri Nov 28 19:58:06 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401098 >/dev/null 2>/dev/null selfserv_9351 with PID 2401098 found at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 with PID 2401098 started at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1871: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401098 at Fri Nov 28 19:58:06 CST 2025 kill -USR1 2401098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401098 killed at Fri Nov 28 19:58:06 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:06 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:06 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401139 >/dev/null 2>/dev/null selfserv_9351 with PID 2401139 found at Fri Nov 28 19:58:07 CST 2025 selfserv_9351 with PID 2401139 started at Fri Nov 28 19:58:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1872: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2401139 at Fri Nov 28 19:58:07 CST 2025 kill -USR1 2401139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401139 killed at Fri Nov 28 19:58:07 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401180 >/dev/null 2>/dev/null selfserv_9351 with PID 2401180 found at Fri Nov 28 19:58:07 CST 2025 selfserv_9351 with PID 2401180 started at Fri Nov 28 19:58:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1873: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401180 at Fri Nov 28 19:58:07 CST 2025 kill -USR1 2401180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401180 killed at Fri Nov 28 19:58:07 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401221 >/dev/null 2>/dev/null selfserv_9351 with PID 2401221 found at Fri Nov 28 19:58:07 CST 2025 selfserv_9351 with PID 2401221 started at Fri Nov 28 19:58:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1874: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401221 at Fri Nov 28 19:58:07 CST 2025 kill -USR1 2401221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401221 killed at Fri Nov 28 19:58:07 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:07 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401263 >/dev/null 2>/dev/null selfserv_9351 with PID 2401263 found at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 with PID 2401263 started at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1875: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401263 at Fri Nov 28 19:58:08 CST 2025 kill -USR1 2401263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401263 killed at Fri Nov 28 19:58:08 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401310 >/dev/null 2>/dev/null selfserv_9351 with PID 2401310 found at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 with PID 2401310 started at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1876: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401310 at Fri Nov 28 19:58:08 CST 2025 kill -USR1 2401310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401310 killed at Fri Nov 28 19:58:08 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401357 >/dev/null 2>/dev/null selfserv_9351 with PID 2401357 found at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 with PID 2401357 started at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1877: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401357 at Fri Nov 28 19:58:08 CST 2025 kill -USR1 2401357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401357 killed at Fri Nov 28 19:58:08 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401409 >/dev/null 2>/dev/null selfserv_9351 with PID 2401409 found at Fri Nov 28 19:58:08 CST 2025 selfserv_9351 with PID 2401409 started at Fri Nov 28 19:58:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1878: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2401409 at Fri Nov 28 19:58:09 CST 2025 kill -USR1 2401409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401409 killed at Fri Nov 28 19:58:09 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401456 >/dev/null 2>/dev/null selfserv_9351 with PID 2401456 found at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 with PID 2401456 started at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1879: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401456 at Fri Nov 28 19:58:09 CST 2025 kill -USR1 2401456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401456 killed at Fri Nov 28 19:58:09 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401503 >/dev/null 2>/dev/null selfserv_9351 with PID 2401503 found at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 with PID 2401503 started at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1880: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2401503 at Fri Nov 28 19:58:09 CST 2025 kill -USR1 2401503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401503 killed at Fri Nov 28 19:58:09 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401550 >/dev/null 2>/dev/null selfserv_9351 with PID 2401550 found at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 with PID 2401550 started at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1881: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401550 at Fri Nov 28 19:58:09 CST 2025 kill -USR1 2401550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401550 killed at Fri Nov 28 19:58:09 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401603 >/dev/null 2>/dev/null selfserv_9351 with PID 2401603 found at Fri Nov 28 19:58:09 CST 2025 selfserv_9351 with PID 2401603 started at Fri Nov 28 19:58:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1882: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401603 at Fri Nov 28 19:58:10 CST 2025 kill -USR1 2401603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401603 killed at Fri Nov 28 19:58:10 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401650 >/dev/null 2>/dev/null selfserv_9351 with PID 2401650 found at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 with PID 2401650 started at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1883: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2401650 at Fri Nov 28 19:58:10 CST 2025 kill -USR1 2401650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401650 killed at Fri Nov 28 19:58:10 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401697 >/dev/null 2>/dev/null selfserv_9351 with PID 2401697 found at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 with PID 2401697 started at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1884: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2401697 at Fri Nov 28 19:58:10 CST 2025 kill -USR1 2401697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401697 killed at Fri Nov 28 19:58:10 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401744 >/dev/null 2>/dev/null selfserv_9351 with PID 2401744 found at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 with PID 2401744 started at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1885: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2401744 at Fri Nov 28 19:58:10 CST 2025 kill -USR1 2401744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401744 killed at Fri Nov 28 19:58:10 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401779 >/dev/null 2>/dev/null selfserv_9351 with PID 2401779 found at Fri Nov 28 19:58:10 CST 2025 selfserv_9351 with PID 2401779 started at Fri Nov 28 19:58:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1818: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2401779 at Fri Nov 28 19:58:11 CST 2025 kill -USR1 2401779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401779 killed at Fri Nov 28 19:58:11 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401810 >/dev/null 2>/dev/null selfserv_9351 with PID 2401810 found at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 with PID 2401810 started at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1819: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2401810 at Fri Nov 28 19:58:11 CST 2025 kill -USR1 2401810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401810 killed at Fri Nov 28 19:58:11 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401841 >/dev/null 2>/dev/null selfserv_9351 with PID 2401841 found at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 with PID 2401841 started at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1820: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2401841 at Fri Nov 28 19:58:11 CST 2025 kill -USR1 2401841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401841 killed at Fri Nov 28 19:58:11 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401872 >/dev/null 2>/dev/null selfserv_9351 with PID 2401872 found at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 with PID 2401872 started at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1821: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2401872 at Fri Nov 28 19:58:11 CST 2025 kill -USR1 2401872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401872 killed at Fri Nov 28 19:58:11 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401907 >/dev/null 2>/dev/null selfserv_9351 with PID 2401907 found at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 with PID 2401907 started at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1822: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2401907 at Fri Nov 28 19:58:11 CST 2025 kill -USR1 2401907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401907 killed at Fri Nov 28 19:58:11 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 19:58:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401938 >/dev/null 2>/dev/null selfserv_9351 with PID 2401938 found at Fri Nov 28 19:58:12 CST 2025 selfserv_9351 with PID 2401938 started at Fri Nov 28 19:58:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1823: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2401938 at Fri Nov 28 19:58:12 CST 2025 kill -USR1 2401938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401938 killed at Fri Nov 28 19:58:12 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 19:58:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2401969 >/dev/null 2>/dev/null selfserv_9351 with PID 2401969 found at Fri Nov 28 19:58:12 CST 2025 selfserv_9351 with PID 2401969 started at Fri Nov 28 19:58:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1824: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2401969 at Fri Nov 28 19:58:12 CST 2025 kill -USR1 2401969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2401969 killed at Fri Nov 28 19:58:12 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 19:58:12 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:12 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402000 >/dev/null 2>/dev/null selfserv_9351 with PID 2402000 found at Fri Nov 28 19:58:12 CST 2025 selfserv_9351 with PID 2402000 started at Fri Nov 28 19:58:12 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 19:58:12 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 19:58:16 CST 2025 ssl.sh: #1825: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2402000 at Fri Nov 28 19:58:16 CST 2025 kill -USR1 2402000 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402000 killed at Fri Nov 28 19:58:16 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:58:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402052 >/dev/null 2>/dev/null selfserv_9351 with PID 2402052 found at Fri Nov 28 19:58:16 CST 2025 selfserv_9351 with PID 2402052 started at Fri Nov 28 19:58:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402052 at Fri Nov 28 19:58:16 CST 2025 kill -USR1 2402052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402052 killed at Fri Nov 28 19:58:16 CST 2025 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402084 >/dev/null 2>/dev/null selfserv_9351 with PID 2402084 found at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 with PID 2402084 started at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1827: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402084 at Fri Nov 28 19:58:17 CST 2025 kill -USR1 2402084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402084 killed at Fri Nov 28 19:58:17 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402112 >/dev/null 2>/dev/null selfserv_9351 with PID 2402112 found at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 with PID 2402112 started at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1828: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2402112 at Fri Nov 28 19:58:17 CST 2025 kill -USR1 2402112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402112 killed at Fri Nov 28 19:58:17 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402140 >/dev/null 2>/dev/null selfserv_9351 with PID 2402140 found at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 with PID 2402140 started at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1829: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402140 at Fri Nov 28 19:58:17 CST 2025 kill -USR1 2402140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402140 killed at Fri Nov 28 19:58:17 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402168 >/dev/null 2>/dev/null selfserv_9351 with PID 2402168 found at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 with PID 2402168 started at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1830: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2402168 at Fri Nov 28 19:58:17 CST 2025 kill -USR1 2402168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402168 killed at Fri Nov 28 19:58:17 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402196 >/dev/null 2>/dev/null selfserv_9351 with PID 2402196 found at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 with PID 2402196 started at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402196 at Fri Nov 28 19:58:17 CST 2025 kill -USR1 2402196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402196 killed at Fri Nov 28 19:58:17 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402225 >/dev/null 2>/dev/null selfserv_9351 with PID 2402225 found at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 with PID 2402225 started at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402225 at Fri Nov 28 19:58:17 CST 2025 kill -USR1 2402225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402225 killed at Fri Nov 28 19:58:17 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402253 >/dev/null 2>/dev/null selfserv_9351 with PID 2402253 found at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 with PID 2402253 started at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1833: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402253 at Fri Nov 28 19:58:18 CST 2025 kill -USR1 2402253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402253 killed at Fri Nov 28 19:58:18 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402281 >/dev/null 2>/dev/null selfserv_9351 with PID 2402281 found at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 with PID 2402281 started at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1834: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402281 at Fri Nov 28 19:58:18 CST 2025 kill -USR1 2402281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402281 killed at Fri Nov 28 19:58:18 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402309 >/dev/null 2>/dev/null selfserv_9351 with PID 2402309 found at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 with PID 2402309 started at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1835: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402309 at Fri Nov 28 19:58:18 CST 2025 kill -USR1 2402309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402309 killed at Fri Nov 28 19:58:18 CST 2025 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402337 >/dev/null 2>/dev/null selfserv_9351 with PID 2402337 found at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 with PID 2402337 started at Fri Nov 28 19:58:18 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1836: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402337 at Fri Nov 28 19:58:18 CST 2025 kill -USR1 2402337 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402337 killed at Fri Nov 28 19:58:18 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402366 >/dev/null 2>/dev/null selfserv_9351 with PID 2402366 found at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 with PID 2402366 started at Fri Nov 28 19:58:18 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1837: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2402366 at Fri Nov 28 19:58:18 CST 2025 kill -USR1 2402366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402366 killed at Fri Nov 28 19:58:18 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402399 >/dev/null 2>/dev/null selfserv_9351 with PID 2402399 found at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 with PID 2402399 started at Fri Nov 28 19:58:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1838: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402399 at Fri Nov 28 19:58:19 CST 2025 kill -USR1 2402399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402399 killed at Fri Nov 28 19:58:19 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402428 >/dev/null 2>/dev/null selfserv_9351 with PID 2402428 found at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 with PID 2402428 started at Fri Nov 28 19:58:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1839: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2402428 at Fri Nov 28 19:58:19 CST 2025 kill -USR1 2402428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402428 killed at Fri Nov 28 19:58:19 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402457 >/dev/null 2>/dev/null selfserv_9351 with PID 2402457 found at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 with PID 2402457 started at Fri Nov 28 19:58:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1840: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402457 at Fri Nov 28 19:58:19 CST 2025 kill -USR1 2402457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402457 killed at Fri Nov 28 19:58:19 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402486 >/dev/null 2>/dev/null selfserv_9351 with PID 2402486 found at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 with PID 2402486 started at Fri Nov 28 19:58:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1841: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402486 at Fri Nov 28 19:58:19 CST 2025 kill -USR1 2402486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402486 killed at Fri Nov 28 19:58:19 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402515 >/dev/null 2>/dev/null selfserv_9351 with PID 2402515 found at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 with PID 2402515 started at Fri Nov 28 19:58:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1842: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402515 at Fri Nov 28 19:58:19 CST 2025 kill -USR1 2402515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402515 killed at Fri Nov 28 19:58:19 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402550 >/dev/null 2>/dev/null selfserv_9351 with PID 2402550 found at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 with PID 2402550 started at Fri Nov 28 19:58:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1843: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402550 at Fri Nov 28 19:58:19 CST 2025 kill -USR1 2402550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402550 killed at Fri Nov 28 19:58:19 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2402579 >/dev/null 2>/dev/null selfserv_9351 with PID 2402579 found at Fri Nov 28 19:58:20 CST 2025 selfserv_9351 with PID 2402579 started at Fri Nov 28 19:58:20 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1844: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2402579 at Fri Nov 28 19:58:20 CST 2025 kill -USR1 2402579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402579 killed at Fri Nov 28 19:58:20 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9351 starting at Fri Nov 28 19:58:20 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:20 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2402608 >/dev/null 2>/dev/null selfserv_9351 with PID 2402608 found at Fri Nov 28 19:58:20 CST 2025 selfserv_9351 with PID 2402608 started at Fri Nov 28 19:58:20 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1845: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1846: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1847: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1848: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1849: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1850: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1851: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1852: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1853: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1854: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1855: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1856: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1857: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1858: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1859: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1860: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1861: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1862: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1863: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1864: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1865: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1866: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1867: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1868: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1869: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1870: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1871: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1872: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1873: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1874: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1875: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1876: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1877: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1878: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1879: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1880: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1881: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1882: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1883: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1884: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1885: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1886: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1887: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1888: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1889: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1890: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1891: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1892: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1893: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1894: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1895: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2402608 at Fri Nov 28 19:58:24 CST 2025 kill -USR1 2402608 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2402608 killed at Fri Nov 28 19:58:24 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:58:24 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2403132 >/dev/null 2>/dev/null selfserv_9351 with PID 2403132 found at Fri Nov 28 19:58:24 CST 2025 selfserv_9351 with PID 2403132 started at Fri Nov 28 19:58:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1896: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1897: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1898: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1899: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1900: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1901: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1902: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1903: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1904: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1905: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1906: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1907: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1908: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1909: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1910: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1911: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1912: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1913: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1914: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1915: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1916: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1917: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1918: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1919: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1920: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1921: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1922: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1923: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1924: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1925: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1926: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1927: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1928: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1929: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1930: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1931: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1932: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1933: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1934: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1935: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1936: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1937: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1938: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1939: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1940: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1941: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1942: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1943: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1944: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1945: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1946: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1947: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1948: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1949: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1950: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1951: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1952: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1953: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1954: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1956: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1957: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1958: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1959: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1960: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1961: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1962: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1963: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1964: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1965: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1966: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1967: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1968: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1969: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1970: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1971: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2403132 at Fri Nov 28 19:58:30 CST 2025 kill -USR1 2403132 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2403132 killed at Fri Nov 28 19:58:30 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2403873 >/dev/null 2>/dev/null selfserv_9351 with PID 2403873 found at Fri Nov 28 19:58:30 CST 2025 selfserv_9351 with PID 2403873 started at Fri Nov 28 19:58:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1972: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2403873 at Fri Nov 28 19:58:30 CST 2025 kill -USR1 2403873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2403873 killed at Fri Nov 28 19:58:30 CST 2025 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:30 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:30 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2403918 >/dev/null 2>/dev/null selfserv_9351 with PID 2403918 found at Fri Nov 28 19:58:31 CST 2025 selfserv_9351 with PID 2403918 started at Fri Nov 28 19:58:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2403918 at Fri Nov 28 19:58:31 CST 2025 kill -USR1 2403918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2403918 killed at Fri Nov 28 19:58:31 CST 2025 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2403959 >/dev/null 2>/dev/null selfserv_9351 with PID 2403959 found at Fri Nov 28 19:58:31 CST 2025 selfserv_9351 with PID 2403959 started at Fri Nov 28 19:58:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1974: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2403959 at Fri Nov 28 19:58:31 CST 2025 kill -USR1 2403959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2403959 killed at Fri Nov 28 19:58:31 CST 2025 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404004 >/dev/null 2>/dev/null selfserv_9351 with PID 2404004 found at Fri Nov 28 19:58:31 CST 2025 selfserv_9351 with PID 2404004 started at Fri Nov 28 19:58:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1975: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404004 at Fri Nov 28 19:58:32 CST 2025 kill -USR1 2404004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404004 killed at Fri Nov 28 19:58:32 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404045 >/dev/null 2>/dev/null selfserv_9351 with PID 2404045 found at Fri Nov 28 19:58:32 CST 2025 selfserv_9351 with PID 2404045 started at Fri Nov 28 19:58:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1976: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404045 at Fri Nov 28 19:58:32 CST 2025 kill -USR1 2404045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404045 killed at Fri Nov 28 19:58:32 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404086 >/dev/null 2>/dev/null selfserv_9351 with PID 2404086 found at Fri Nov 28 19:58:32 CST 2025 selfserv_9351 with PID 2404086 started at Fri Nov 28 19:58:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1977: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404086 at Fri Nov 28 19:58:32 CST 2025 kill -USR1 2404086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404086 killed at Fri Nov 28 19:58:32 CST 2025 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404128 >/dev/null 2>/dev/null selfserv_9351 with PID 2404128 found at Fri Nov 28 19:58:33 CST 2025 selfserv_9351 with PID 2404128 started at Fri Nov 28 19:58:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1978: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404128 at Fri Nov 28 19:58:33 CST 2025 kill -USR1 2404128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404128 killed at Fri Nov 28 19:58:33 CST 2025 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404169 >/dev/null 2>/dev/null selfserv_9351 with PID 2404169 found at Fri Nov 28 19:58:33 CST 2025 selfserv_9351 with PID 2404169 started at Fri Nov 28 19:58:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404169 at Fri Nov 28 19:58:33 CST 2025 kill -USR1 2404169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404169 killed at Fri Nov 28 19:58:33 CST 2025 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404210 >/dev/null 2>/dev/null selfserv_9351 with PID 2404210 found at Fri Nov 28 19:58:33 CST 2025 selfserv_9351 with PID 2404210 started at Fri Nov 28 19:58:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404210 at Fri Nov 28 19:58:34 CST 2025 kill -USR1 2404210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404210 killed at Fri Nov 28 19:58:34 CST 2025 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404256 >/dev/null 2>/dev/null selfserv_9351 with PID 2404256 found at Fri Nov 28 19:58:34 CST 2025 selfserv_9351 with PID 2404256 started at Fri Nov 28 19:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1981: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404256 at Fri Nov 28 19:58:34 CST 2025 kill -USR1 2404256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404256 killed at Fri Nov 28 19:58:34 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404297 >/dev/null 2>/dev/null selfserv_9351 with PID 2404297 found at Fri Nov 28 19:58:34 CST 2025 selfserv_9351 with PID 2404297 started at Fri Nov 28 19:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1982: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404297 at Fri Nov 28 19:58:34 CST 2025 kill -USR1 2404297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404297 killed at Fri Nov 28 19:58:34 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:34 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:34 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404344 >/dev/null 2>/dev/null selfserv_9351 with PID 2404344 found at Fri Nov 28 19:58:35 CST 2025 selfserv_9351 with PID 2404344 started at Fri Nov 28 19:58:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1983: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404344 at Fri Nov 28 19:58:35 CST 2025 kill -USR1 2404344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404344 killed at Fri Nov 28 19:58:35 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404385 >/dev/null 2>/dev/null selfserv_9351 with PID 2404385 found at Fri Nov 28 19:58:35 CST 2025 selfserv_9351 with PID 2404385 started at Fri Nov 28 19:58:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1984: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404385 at Fri Nov 28 19:58:35 CST 2025 kill -USR1 2404385 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404385 killed at Fri Nov 28 19:58:35 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404427 >/dev/null 2>/dev/null selfserv_9351 with PID 2404427 found at Fri Nov 28 19:58:35 CST 2025 selfserv_9351 with PID 2404427 started at Fri Nov 28 19:58:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1985: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404427 at Fri Nov 28 19:58:36 CST 2025 kill -USR1 2404427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404427 killed at Fri Nov 28 19:58:36 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404468 >/dev/null 2>/dev/null selfserv_9351 with PID 2404468 found at Fri Nov 28 19:58:36 CST 2025 selfserv_9351 with PID 2404468 started at Fri Nov 28 19:58:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1986: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404468 at Fri Nov 28 19:58:36 CST 2025 kill -USR1 2404468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404468 killed at Fri Nov 28 19:58:36 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404509 >/dev/null 2>/dev/null selfserv_9351 with PID 2404509 found at Fri Nov 28 19:58:36 CST 2025 selfserv_9351 with PID 2404509 started at Fri Nov 28 19:58:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1987: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404509 at Fri Nov 28 19:58:36 CST 2025 kill -USR1 2404509 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404509 killed at Fri Nov 28 19:58:36 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404550 >/dev/null 2>/dev/null selfserv_9351 with PID 2404550 found at Fri Nov 28 19:58:37 CST 2025 selfserv_9351 with PID 2404550 started at Fri Nov 28 19:58:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1988: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404550 at Fri Nov 28 19:58:37 CST 2025 kill -USR1 2404550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404550 killed at Fri Nov 28 19:58:37 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404591 >/dev/null 2>/dev/null selfserv_9351 with PID 2404591 found at Fri Nov 28 19:58:37 CST 2025 selfserv_9351 with PID 2404591 started at Fri Nov 28 19:58:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1989: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404591 at Fri Nov 28 19:58:37 CST 2025 kill -USR1 2404591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404591 killed at Fri Nov 28 19:58:37 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:37 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404632 >/dev/null 2>/dev/null selfserv_9351 with PID 2404632 found at Fri Nov 28 19:58:37 CST 2025 selfserv_9351 with PID 2404632 started at Fri Nov 28 19:58:37 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1990: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404632 at Fri Nov 28 19:58:38 CST 2025 kill -USR1 2404632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404632 killed at Fri Nov 28 19:58:38 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404673 >/dev/null 2>/dev/null selfserv_9351 with PID 2404673 found at Fri Nov 28 19:58:38 CST 2025 selfserv_9351 with PID 2404673 started at Fri Nov 28 19:58:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1991: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404673 at Fri Nov 28 19:58:38 CST 2025 kill -USR1 2404673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404673 killed at Fri Nov 28 19:58:38 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404714 >/dev/null 2>/dev/null selfserv_9351 with PID 2404714 found at Fri Nov 28 19:58:38 CST 2025 selfserv_9351 with PID 2404714 started at Fri Nov 28 19:58:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1992: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404714 at Fri Nov 28 19:58:38 CST 2025 kill -USR1 2404714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404714 killed at Fri Nov 28 19:58:38 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:38 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404759 >/dev/null 2>/dev/null selfserv_9351 with PID 2404759 found at Fri Nov 28 19:58:38 CST 2025 selfserv_9351 with PID 2404759 started at Fri Nov 28 19:58:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1993: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404759 at Fri Nov 28 19:58:39 CST 2025 kill -USR1 2404759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404759 killed at Fri Nov 28 19:58:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404800 >/dev/null 2>/dev/null selfserv_9351 with PID 2404800 found at Fri Nov 28 19:58:39 CST 2025 selfserv_9351 with PID 2404800 started at Fri Nov 28 19:58:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1994: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2404800 at Fri Nov 28 19:58:39 CST 2025 kill -USR1 2404800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404800 killed at Fri Nov 28 19:58:39 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:39 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404841 >/dev/null 2>/dev/null selfserv_9351 with PID 2404841 found at Fri Nov 28 19:58:39 CST 2025 selfserv_9351 with PID 2404841 started at Fri Nov 28 19:58:39 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1995: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404841 at Fri Nov 28 19:58:40 CST 2025 kill -USR1 2404841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404841 killed at Fri Nov 28 19:58:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404888 >/dev/null 2>/dev/null selfserv_9351 with PID 2404888 found at Fri Nov 28 19:58:40 CST 2025 selfserv_9351 with PID 2404888 started at Fri Nov 28 19:58:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1996: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404888 at Fri Nov 28 19:58:40 CST 2025 kill -USR1 2404888 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404888 killed at Fri Nov 28 19:58:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404929 >/dev/null 2>/dev/null selfserv_9351 with PID 2404929 found at Fri Nov 28 19:58:40 CST 2025 selfserv_9351 with PID 2404929 started at Fri Nov 28 19:58:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1997: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404929 at Fri Nov 28 19:58:40 CST 2025 kill -USR1 2404929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404929 killed at Fri Nov 28 19:58:40 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2404974 >/dev/null 2>/dev/null selfserv_9351 with PID 2404974 found at Fri Nov 28 19:58:41 CST 2025 selfserv_9351 with PID 2404974 started at Fri Nov 28 19:58:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1998: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2404974 at Fri Nov 28 19:58:41 CST 2025 kill -USR1 2404974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2404974 killed at Fri Nov 28 19:58:41 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405015 >/dev/null 2>/dev/null selfserv_9351 with PID 2405015 found at Fri Nov 28 19:58:41 CST 2025 selfserv_9351 with PID 2405015 started at Fri Nov 28 19:58:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1999: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405015 at Fri Nov 28 19:58:41 CST 2025 kill -USR1 2405015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405015 killed at Fri Nov 28 19:58:41 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405060 >/dev/null 2>/dev/null selfserv_9351 with PID 2405060 found at Fri Nov 28 19:58:42 CST 2025 selfserv_9351 with PID 2405060 started at Fri Nov 28 19:58:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2000: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405060 at Fri Nov 28 19:58:42 CST 2025 kill -USR1 2405060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405060 killed at Fri Nov 28 19:58:42 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405101 >/dev/null 2>/dev/null selfserv_9351 with PID 2405101 found at Fri Nov 28 19:58:42 CST 2025 selfserv_9351 with PID 2405101 started at Fri Nov 28 19:58:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2001: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405101 at Fri Nov 28 19:58:42 CST 2025 kill -USR1 2405101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405101 killed at Fri Nov 28 19:58:42 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405143 >/dev/null 2>/dev/null selfserv_9351 with PID 2405143 found at Fri Nov 28 19:58:42 CST 2025 selfserv_9351 with PID 2405143 started at Fri Nov 28 19:58:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2002: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405143 at Fri Nov 28 19:58:43 CST 2025 kill -USR1 2405143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405143 killed at Fri Nov 28 19:58:43 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405184 >/dev/null 2>/dev/null selfserv_9351 with PID 2405184 found at Fri Nov 28 19:58:43 CST 2025 selfserv_9351 with PID 2405184 started at Fri Nov 28 19:58:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2003: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405184 at Fri Nov 28 19:58:43 CST 2025 kill -USR1 2405184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405184 killed at Fri Nov 28 19:58:43 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:43 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405225 >/dev/null 2>/dev/null selfserv_9351 with PID 2405225 found at Fri Nov 28 19:58:43 CST 2025 selfserv_9351 with PID 2405225 started at Fri Nov 28 19:58:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2004: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405225 at Fri Nov 28 19:58:44 CST 2025 kill -USR1 2405225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405225 killed at Fri Nov 28 19:58:44 CST 2025 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405271 >/dev/null 2>/dev/null selfserv_9351 with PID 2405271 found at Fri Nov 28 19:58:44 CST 2025 selfserv_9351 with PID 2405271 started at Fri Nov 28 19:58:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2005: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405271 at Fri Nov 28 19:58:44 CST 2025 kill -USR1 2405271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405271 killed at Fri Nov 28 19:58:44 CST 2025 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405312 >/dev/null 2>/dev/null selfserv_9351 with PID 2405312 found at Fri Nov 28 19:58:44 CST 2025 selfserv_9351 with PID 2405312 started at Fri Nov 28 19:58:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2006: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405312 at Fri Nov 28 19:58:44 CST 2025 kill -USR1 2405312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405312 killed at Fri Nov 28 19:58:44 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:44 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405359 >/dev/null 2>/dev/null selfserv_9351 with PID 2405359 found at Fri Nov 28 19:58:44 CST 2025 selfserv_9351 with PID 2405359 started at Fri Nov 28 19:58:44 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2007: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405359 at Fri Nov 28 19:58:45 CST 2025 kill -USR1 2405359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405359 killed at Fri Nov 28 19:58:45 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405400 >/dev/null 2>/dev/null selfserv_9351 with PID 2405400 found at Fri Nov 28 19:58:45 CST 2025 selfserv_9351 with PID 2405400 started at Fri Nov 28 19:58:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2008: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405400 at Fri Nov 28 19:58:45 CST 2025 kill -USR1 2405400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405400 killed at Fri Nov 28 19:58:45 CST 2025 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:45 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405441 >/dev/null 2>/dev/null selfserv_9351 with PID 2405441 found at Fri Nov 28 19:58:45 CST 2025 selfserv_9351 with PID 2405441 started at Fri Nov 28 19:58:45 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2009: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405441 at Fri Nov 28 19:58:46 CST 2025 kill -USR1 2405441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405441 killed at Fri Nov 28 19:58:46 CST 2025 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405483 >/dev/null 2>/dev/null selfserv_9351 with PID 2405483 found at Fri Nov 28 19:58:46 CST 2025 selfserv_9351 with PID 2405483 started at Fri Nov 28 19:58:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2010: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405483 at Fri Nov 28 19:58:46 CST 2025 kill -USR1 2405483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405483 killed at Fri Nov 28 19:58:46 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405524 >/dev/null 2>/dev/null selfserv_9351 with PID 2405524 found at Fri Nov 28 19:58:46 CST 2025 selfserv_9351 with PID 2405524 started at Fri Nov 28 19:58:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2011: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405524 at Fri Nov 28 19:58:46 CST 2025 kill -USR1 2405524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405524 killed at Fri Nov 28 19:58:46 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:46 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405565 >/dev/null 2>/dev/null selfserv_9351 with PID 2405565 found at Fri Nov 28 19:58:46 CST 2025 selfserv_9351 with PID 2405565 started at Fri Nov 28 19:58:46 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2012: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405565 at Fri Nov 28 19:58:47 CST 2025 kill -USR1 2405565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405565 killed at Fri Nov 28 19:58:47 CST 2025 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405606 >/dev/null 2>/dev/null selfserv_9351 with PID 2405606 found at Fri Nov 28 19:58:47 CST 2025 selfserv_9351 with PID 2405606 started at Fri Nov 28 19:58:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2013: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405606 at Fri Nov 28 19:58:47 CST 2025 kill -USR1 2405606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405606 killed at Fri Nov 28 19:58:47 CST 2025 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:47 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405647 >/dev/null 2>/dev/null selfserv_9351 with PID 2405647 found at Fri Nov 28 19:58:47 CST 2025 selfserv_9351 with PID 2405647 started at Fri Nov 28 19:58:47 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2014: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405647 at Fri Nov 28 19:58:48 CST 2025 kill -USR1 2405647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405647 killed at Fri Nov 28 19:58:48 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405688 >/dev/null 2>/dev/null selfserv_9351 with PID 2405688 found at Fri Nov 28 19:58:48 CST 2025 selfserv_9351 with PID 2405688 started at Fri Nov 28 19:58:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2015: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405688 at Fri Nov 28 19:58:48 CST 2025 kill -USR1 2405688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405688 killed at Fri Nov 28 19:58:48 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405729 >/dev/null 2>/dev/null selfserv_9351 with PID 2405729 found at Fri Nov 28 19:58:48 CST 2025 selfserv_9351 with PID 2405729 started at Fri Nov 28 19:58:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2016: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405729 at Fri Nov 28 19:58:48 CST 2025 kill -USR1 2405729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405729 killed at Fri Nov 28 19:58:48 CST 2025 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:48 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:48 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405774 >/dev/null 2>/dev/null selfserv_9351 with PID 2405774 found at Fri Nov 28 19:58:49 CST 2025 selfserv_9351 with PID 2405774 started at Fri Nov 28 19:58:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2017: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405774 at Fri Nov 28 19:58:49 CST 2025 kill -USR1 2405774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405774 killed at Fri Nov 28 19:58:49 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405815 >/dev/null 2>/dev/null selfserv_9351 with PID 2405815 found at Fri Nov 28 19:58:49 CST 2025 selfserv_9351 with PID 2405815 started at Fri Nov 28 19:58:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2018: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405815 at Fri Nov 28 19:58:49 CST 2025 kill -USR1 2405815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405815 killed at Fri Nov 28 19:58:49 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:49 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405856 >/dev/null 2>/dev/null selfserv_9351 with PID 2405856 found at Fri Nov 28 19:58:49 CST 2025 selfserv_9351 with PID 2405856 started at Fri Nov 28 19:58:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2019: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405856 at Fri Nov 28 19:58:50 CST 2025 kill -USR1 2405856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405856 killed at Fri Nov 28 19:58:50 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405903 >/dev/null 2>/dev/null selfserv_9351 with PID 2405903 found at Fri Nov 28 19:58:50 CST 2025 selfserv_9351 with PID 2405903 started at Fri Nov 28 19:58:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2020: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405903 at Fri Nov 28 19:58:50 CST 2025 kill -USR1 2405903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405903 killed at Fri Nov 28 19:58:50 CST 2025 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405944 >/dev/null 2>/dev/null selfserv_9351 with PID 2405944 found at Fri Nov 28 19:58:50 CST 2025 selfserv_9351 with PID 2405944 started at Fri Nov 28 19:58:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2021: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2405944 at Fri Nov 28 19:58:50 CST 2025 kill -USR1 2405944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405944 killed at Fri Nov 28 19:58:50 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2405989 >/dev/null 2>/dev/null selfserv_9351 with PID 2405989 found at Fri Nov 28 19:58:50 CST 2025 selfserv_9351 with PID 2405989 started at Fri Nov 28 19:58:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2022: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2405989 at Fri Nov 28 19:58:51 CST 2025 kill -USR1 2405989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2405989 killed at Fri Nov 28 19:58:51 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406030 >/dev/null 2>/dev/null selfserv_9351 with PID 2406030 found at Fri Nov 28 19:58:51 CST 2025 selfserv_9351 with PID 2406030 started at Fri Nov 28 19:58:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2023: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406030 at Fri Nov 28 19:58:51 CST 2025 kill -USR1 2406030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406030 killed at Fri Nov 28 19:58:51 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406071 >/dev/null 2>/dev/null selfserv_9351 with PID 2406071 found at Fri Nov 28 19:58:51 CST 2025 selfserv_9351 with PID 2406071 started at Fri Nov 28 19:58:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2024: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406071 at Fri Nov 28 19:58:52 CST 2025 kill -USR1 2406071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406071 killed at Fri Nov 28 19:58:52 CST 2025 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406116 >/dev/null 2>/dev/null selfserv_9351 with PID 2406116 found at Fri Nov 28 19:58:52 CST 2025 selfserv_9351 with PID 2406116 started at Fri Nov 28 19:58:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2025: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406116 at Fri Nov 28 19:58:52 CST 2025 kill -USR1 2406116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406116 killed at Fri Nov 28 19:58:52 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:58:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406157 >/dev/null 2>/dev/null selfserv_9351 with PID 2406157 found at Fri Nov 28 19:58:52 CST 2025 selfserv_9351 with PID 2406157 started at Fri Nov 28 19:58:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2026: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2406157 at Fri Nov 28 19:58:53 CST 2025 kill -USR1 2406157 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406157 killed at Fri Nov 28 19:58:53 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406199 >/dev/null 2>/dev/null selfserv_9351 with PID 2406199 found at Fri Nov 28 19:58:53 CST 2025 selfserv_9351 with PID 2406199 started at Fri Nov 28 19:58:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2027: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406199 at Fri Nov 28 19:58:53 CST 2025 kill -USR1 2406199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406199 killed at Fri Nov 28 19:58:53 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406240 >/dev/null 2>/dev/null selfserv_9351 with PID 2406240 found at Fri Nov 28 19:58:53 CST 2025 selfserv_9351 with PID 2406240 started at Fri Nov 28 19:58:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2028: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406240 at Fri Nov 28 19:58:53 CST 2025 kill -USR1 2406240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406240 killed at Fri Nov 28 19:58:53 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:58:53 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:53 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406287 >/dev/null 2>/dev/null selfserv_9351 with PID 2406287 found at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 with PID 2406287 started at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2029: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406287 at Fri Nov 28 19:58:54 CST 2025 kill -USR1 2406287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406287 killed at Fri Nov 28 19:58:54 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406358 >/dev/null 2>/dev/null selfserv_9351 with PID 2406358 found at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 with PID 2406358 started at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1972: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406358 at Fri Nov 28 19:58:54 CST 2025 kill -USR1 2406358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406358 killed at Fri Nov 28 19:58:54 CST 2025 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406389 >/dev/null 2>/dev/null selfserv_9351 with PID 2406389 found at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 with PID 2406389 started at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406389 at Fri Nov 28 19:58:54 CST 2025 kill -USR1 2406389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406389 killed at Fri Nov 28 19:58:54 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406423 >/dev/null 2>/dev/null selfserv_9351 with PID 2406423 found at Fri Nov 28 19:58:54 CST 2025 selfserv_9351 with PID 2406423 started at Fri Nov 28 19:58:54 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1974: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2406423 at Fri Nov 28 19:58:55 CST 2025 kill -USR1 2406423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406423 killed at Fri Nov 28 19:58:55 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406451 >/dev/null 2>/dev/null selfserv_9351 with PID 2406451 found at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 with PID 2406451 started at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1975: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406451 at Fri Nov 28 19:58:55 CST 2025 kill -USR1 2406451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406451 killed at Fri Nov 28 19:58:55 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406479 >/dev/null 2>/dev/null selfserv_9351 with PID 2406479 found at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 with PID 2406479 started at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1976: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2406479 at Fri Nov 28 19:58:55 CST 2025 kill -USR1 2406479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406479 killed at Fri Nov 28 19:58:55 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406507 >/dev/null 2>/dev/null selfserv_9351 with PID 2406507 found at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 with PID 2406507 started at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1977: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406507 at Fri Nov 28 19:58:55 CST 2025 kill -USR1 2406507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406507 killed at Fri Nov 28 19:58:55 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406535 >/dev/null 2>/dev/null selfserv_9351 with PID 2406535 found at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 with PID 2406535 started at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1978: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406535 at Fri Nov 28 19:58:55 CST 2025 kill -USR1 2406535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406535 killed at Fri Nov 28 19:58:55 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:55 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:55 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406564 >/dev/null 2>/dev/null selfserv_9351 with PID 2406564 found at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 with PID 2406564 started at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406564 at Fri Nov 28 19:58:56 CST 2025 kill -USR1 2406564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406564 killed at Fri Nov 28 19:58:56 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406592 >/dev/null 2>/dev/null selfserv_9351 with PID 2406592 found at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 with PID 2406592 started at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406592 at Fri Nov 28 19:58:56 CST 2025 kill -USR1 2406592 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406592 killed at Fri Nov 28 19:58:56 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406620 >/dev/null 2>/dev/null selfserv_9351 with PID 2406620 found at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 with PID 2406620 started at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1981: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406620 at Fri Nov 28 19:58:56 CST 2025 kill -USR1 2406620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406620 killed at Fri Nov 28 19:58:56 CST 2025 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406648 >/dev/null 2>/dev/null selfserv_9351 with PID 2406648 found at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 with PID 2406648 started at Fri Nov 28 19:58:56 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1982: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406648 at Fri Nov 28 19:58:56 CST 2025 kill -USR1 2406648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406648 killed at Fri Nov 28 19:58:56 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406677 >/dev/null 2>/dev/null selfserv_9351 with PID 2406677 found at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 with PID 2406677 started at Fri Nov 28 19:58:56 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1983: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2406677 at Fri Nov 28 19:58:56 CST 2025 kill -USR1 2406677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406677 killed at Fri Nov 28 19:58:56 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:56 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:56 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406706 >/dev/null 2>/dev/null selfserv_9351 with PID 2406706 found at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 with PID 2406706 started at Fri Nov 28 19:58:57 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1984: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406706 at Fri Nov 28 19:58:57 CST 2025 kill -USR1 2406706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406706 killed at Fri Nov 28 19:58:57 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406735 >/dev/null 2>/dev/null selfserv_9351 with PID 2406735 found at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 with PID 2406735 started at Fri Nov 28 19:58:57 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1985: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2406735 at Fri Nov 28 19:58:57 CST 2025 kill -USR1 2406735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406735 killed at Fri Nov 28 19:58:57 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406764 >/dev/null 2>/dev/null selfserv_9351 with PID 2406764 found at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 with PID 2406764 started at Fri Nov 28 19:58:57 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1986: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406764 at Fri Nov 28 19:58:57 CST 2025 kill -USR1 2406764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406764 killed at Fri Nov 28 19:58:57 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406793 >/dev/null 2>/dev/null selfserv_9351 with PID 2406793 found at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 with PID 2406793 started at Fri Nov 28 19:58:57 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1987: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406793 at Fri Nov 28 19:58:57 CST 2025 kill -USR1 2406793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406793 killed at Fri Nov 28 19:58:57 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406822 >/dev/null 2>/dev/null selfserv_9351 with PID 2406822 found at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 with PID 2406822 started at Fri Nov 28 19:58:57 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1988: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406822 at Fri Nov 28 19:58:57 CST 2025 kill -USR1 2406822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406822 killed at Fri Nov 28 19:58:57 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:57 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:57 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406851 >/dev/null 2>/dev/null selfserv_9351 with PID 2406851 found at Fri Nov 28 19:58:58 CST 2025 selfserv_9351 with PID 2406851 started at Fri Nov 28 19:58:58 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1989: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406851 at Fri Nov 28 19:58:58 CST 2025 kill -USR1 2406851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406851 killed at Fri Nov 28 19:58:58 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 19:58:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2406880 >/dev/null 2>/dev/null selfserv_9351 with PID 2406880 found at Fri Nov 28 19:58:58 CST 2025 selfserv_9351 with PID 2406880 started at Fri Nov 28 19:58:58 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1990: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2406880 at Fri Nov 28 19:58:58 CST 2025 kill -USR1 2406880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406880 killed at Fri Nov 28 19:58:58 CST 2025 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -fips false -force FIPS mode disabled. ssl.sh: #1991: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1992: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1993: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1994: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1995: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1996: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -fips true -force FIPS mode enabled. ssl.sh: #1997: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #1998: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1999: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -fips true -force FIPS mode enabled. ssl.sh: #2000: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #2001: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #2002: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:58:58 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:58:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2406983 >/dev/null 2>/dev/null selfserv_9351 with PID 2406983 found at Fri Nov 28 19:58:58 CST 2025 selfserv_9351 with PID 2406983 started at Fri Nov 28 19:58:58 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2003: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2004: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2005: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2006: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2007: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2008: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2009: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2010: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2011: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2012: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2013: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2014: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2015: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2016: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2017: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2018: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2019: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2020: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2021: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2022: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2023: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2024: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2025: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2026: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2027: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2028: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2029: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2030: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2031: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2032: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2033: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2034: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2035: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2036: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2037: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2038: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2039: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2040: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2041: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2042: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2043: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2044: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2045: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2046: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2047: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2048: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2049: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2050: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2051: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2052: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2053: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2406983 at Fri Nov 28 19:59:03 CST 2025 kill -USR1 2406983 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2406983 killed at Fri Nov 28 19:59:03 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 19:59:03 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2407551 >/dev/null 2>/dev/null selfserv_9351 with PID 2407551 found at Fri Nov 28 19:59:03 CST 2025 selfserv_9351 with PID 2407551 started at Fri Nov 28 19:59:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2054: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2055: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2056: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2057: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2058: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2059: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2060: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2061: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2062: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2063: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2064: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2065: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2066: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2067: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2068: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2069: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2070: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2071: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2072: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2073: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2074: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2075: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2076: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2077: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2078: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2079: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2080: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2081: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2082: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2083: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2084: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2085: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2086: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2087: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2088: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2089: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2090: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2091: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2092: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2093: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2094: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2095: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2096: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2097: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2098: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2099: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2100: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2101: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2102: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2103: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2104: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2105: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2106: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2107: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2108: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2109: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2110: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2111: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2112: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2113: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2114: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2115: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2116: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2117: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2118: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2119: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2120: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2121: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2122: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2123: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2124: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2125: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2126: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2127: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2128: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2129: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2407551 at Fri Nov 28 19:59:10 CST 2025 kill -USR1 2407551 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2407551 killed at Fri Nov 28 19:59:10 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 19:59:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408282 >/dev/null 2>/dev/null selfserv_9351 with PID 2408282 found at Fri Nov 28 19:59:10 CST 2025 selfserv_9351 with PID 2408282 started at Fri Nov 28 19:59:10 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2130: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2408282 at Fri Nov 28 19:59:10 CST 2025 kill -USR1 2408282 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408282 killed at Fri Nov 28 19:59:10 CST 2025 ssl.sh: SSL Client Authentication - server normal/client fips =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:59:10 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:10 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408352 >/dev/null 2>/dev/null selfserv_9351 with PID 2408352 found at Fri Nov 28 19:59:11 CST 2025 selfserv_9351 with PID 2408352 started at Fri Nov 28 19:59:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2130: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2408352 at Fri Nov 28 19:59:11 CST 2025 kill -USR1 2408352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408352 killed at Fri Nov 28 19:59:11 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:59:11 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408393 >/dev/null 2>/dev/null selfserv_9351 with PID 2408393 found at Fri Nov 28 19:59:11 CST 2025 selfserv_9351 with PID 2408393 started at Fri Nov 28 19:59:11 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2131: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2408393 at Fri Nov 28 19:59:35 CST 2025 kill -USR1 2408393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408393 killed at Fri Nov 28 19:59:35 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:59:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408540 >/dev/null 2>/dev/null selfserv_9351 with PID 2408540 found at Fri Nov 28 19:59:35 CST 2025 selfserv_9351 with PID 2408540 started at Fri Nov 28 19:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2132: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2408540 at Fri Nov 28 19:59:35 CST 2025 kill -USR1 2408540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408540 killed at Fri Nov 28 19:59:35 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:59:35 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408594 >/dev/null 2>/dev/null selfserv_9351 with PID 2408594 found at Fri Nov 28 19:59:35 CST 2025 selfserv_9351 with PID 2408594 started at Fri Nov 28 19:59:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2133: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2408594 at Fri Nov 28 19:59:36 CST 2025 kill -USR1 2408594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408594 killed at Fri Nov 28 19:59:36 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 19:59:36 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408635 >/dev/null 2>/dev/null selfserv_9351 with PID 2408635 found at Fri Nov 28 19:59:36 CST 2025 selfserv_9351 with PID 2408635 started at Fri Nov 28 19:59:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2134: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2408635 at Fri Nov 28 19:59:59 CST 2025 kill -USR1 2408635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408635 killed at Fri Nov 28 19:59:59 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 19:59:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408743 >/dev/null 2>/dev/null selfserv_9351 with PID 2408743 found at Fri Nov 28 19:59:59 CST 2025 selfserv_9351 with PID 2408743 started at Fri Nov 28 19:59:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2408743 at Fri Nov 28 19:59:59 CST 2025 kill -USR1 2408743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408743 killed at Fri Nov 28 19:59:59 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 19:59:59 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 19:59:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408809 >/dev/null 2>/dev/null selfserv_9351 with PID 2408809 found at Fri Nov 28 19:59:59 CST 2025 selfserv_9351 with PID 2408809 started at Fri Nov 28 19:59:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2136: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2408809 at Fri Nov 28 20:00:00 CST 2025 kill -USR1 2408809 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408809 killed at Fri Nov 28 20:00:00 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:00:00 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2408856 >/dev/null 2>/dev/null selfserv_9351 with PID 2408856 found at Fri Nov 28 20:00:00 CST 2025 selfserv_9351 with PID 2408856 started at Fri Nov 28 20:00:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2137: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2408856 at Fri Nov 28 20:00:24 CST 2025 kill -USR1 2408856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2408856 killed at Fri Nov 28 20:00:24 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409071 >/dev/null 2>/dev/null selfserv_9351 with PID 2409071 found at Fri Nov 28 20:00:24 CST 2025 selfserv_9351 with PID 2409071 started at Fri Nov 28 20:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2138: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2409071 at Fri Nov 28 20:00:24 CST 2025 kill -USR1 2409071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409071 killed at Fri Nov 28 20:00:24 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409124 >/dev/null 2>/dev/null selfserv_9351 with PID 2409124 found at Fri Nov 28 20:00:24 CST 2025 selfserv_9351 with PID 2409124 started at Fri Nov 28 20:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2139: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409124 at Fri Nov 28 20:00:24 CST 2025 kill -USR1 2409124 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409124 killed at Fri Nov 28 20:00:24 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:00:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409171 >/dev/null 2>/dev/null selfserv_9351 with PID 2409171 found at Fri Nov 28 20:00:24 CST 2025 selfserv_9351 with PID 2409171 started at Fri Nov 28 20:00:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2140: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409171 at Fri Nov 28 20:00:49 CST 2025 kill -USR1 2409171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409171 killed at Fri Nov 28 20:00:49 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:00:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409279 >/dev/null 2>/dev/null selfserv_9351 with PID 2409279 found at Fri Nov 28 20:00:49 CST 2025 selfserv_9351 with PID 2409279 started at Fri Nov 28 20:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2141: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2409279 at Fri Nov 28 20:00:49 CST 2025 kill -USR1 2409279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409279 killed at Fri Nov 28 20:00:49 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:00:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409332 >/dev/null 2>/dev/null selfserv_9351 with PID 2409332 found at Fri Nov 28 20:00:49 CST 2025 selfserv_9351 with PID 2409332 started at Fri Nov 28 20:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2142: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409332 at Fri Nov 28 20:00:49 CST 2025 kill -USR1 2409332 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409332 killed at Fri Nov 28 20:00:49 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:00:49 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409379 >/dev/null 2>/dev/null selfserv_9351 with PID 2409379 found at Fri Nov 28 20:00:49 CST 2025 selfserv_9351 with PID 2409379 started at Fri Nov 28 20:00:49 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2143: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409379 at Fri Nov 28 20:01:13 CST 2025 kill -USR1 2409379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409379 killed at Fri Nov 28 20:01:13 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:01:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409566 >/dev/null 2>/dev/null selfserv_9351 with PID 2409566 found at Fri Nov 28 20:01:13 CST 2025 selfserv_9351 with PID 2409566 started at Fri Nov 28 20:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2144: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2409566 at Fri Nov 28 20:01:13 CST 2025 kill -USR1 2409566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409566 killed at Fri Nov 28 20:01:13 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:01:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409611 >/dev/null 2>/dev/null selfserv_9351 with PID 2409611 found at Fri Nov 28 20:01:13 CST 2025 selfserv_9351 with PID 2409611 started at Fri Nov 28 20:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2145: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2409611 at Fri Nov 28 20:01:13 CST 2025 kill -USR1 2409611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409611 killed at Fri Nov 28 20:01:13 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:01:13 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409656 >/dev/null 2>/dev/null selfserv_9351 with PID 2409656 found at Fri Nov 28 20:01:13 CST 2025 selfserv_9351 with PID 2409656 started at Fri Nov 28 20:01:13 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2146: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409656 at Fri Nov 28 20:01:14 CST 2025 kill -USR1 2409656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409656 killed at Fri Nov 28 20:01:14 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:01:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409706 >/dev/null 2>/dev/null selfserv_9351 with PID 2409706 found at Fri Nov 28 20:01:14 CST 2025 selfserv_9351 with PID 2409706 started at Fri Nov 28 20:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2147: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2409706 at Fri Nov 28 20:01:14 CST 2025 kill -USR1 2409706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409706 killed at Fri Nov 28 20:01:14 CST 2025 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:01:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409755 >/dev/null 2>/dev/null selfserv_9351 with PID 2409755 found at Fri Nov 28 20:01:14 CST 2025 selfserv_9351 with PID 2409755 started at Fri Nov 28 20:01:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2148: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409755 at Fri Nov 28 20:01:38 CST 2025 kill -USR1 2409755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409755 killed at Fri Nov 28 20:01:38 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409891 >/dev/null 2>/dev/null selfserv_9351 with PID 2409891 found at Fri Nov 28 20:01:38 CST 2025 selfserv_9351 with PID 2409891 started at Fri Nov 28 20:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2149: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2409891 at Fri Nov 28 20:01:38 CST 2025 kill -USR1 2409891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409891 killed at Fri Nov 28 20:01:38 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:01:38 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2409944 >/dev/null 2>/dev/null selfserv_9351 with PID 2409944 found at Fri Nov 28 20:01:38 CST 2025 selfserv_9351 with PID 2409944 started at Fri Nov 28 20:01:38 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2150: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2409944 at Fri Nov 28 20:02:02 CST 2025 kill -USR1 2409944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2409944 killed at Fri Nov 28 20:02:02 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:02:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:02:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410086 >/dev/null 2>/dev/null selfserv_9351 with PID 2410086 found at Fri Nov 28 20:02:02 CST 2025 selfserv_9351 with PID 2410086 started at Fri Nov 28 20:02:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2151: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410086 at Fri Nov 28 20:02:02 CST 2025 kill -USR1 2410086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410086 killed at Fri Nov 28 20:02:02 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:02:02 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:02:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410135 >/dev/null 2>/dev/null selfserv_9351 with PID 2410135 found at Fri Nov 28 20:02:02 CST 2025 selfserv_9351 with PID 2410135 started at Fri Nov 28 20:02:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2152: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2410135 at Fri Nov 28 20:02:26 CST 2025 kill -USR1 2410135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410135 killed at Fri Nov 28 20:02:26 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:02:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:02:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410316 >/dev/null 2>/dev/null selfserv_9351 with PID 2410316 found at Fri Nov 28 20:02:26 CST 2025 selfserv_9351 with PID 2410316 started at Fri Nov 28 20:02:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2153: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410316 at Fri Nov 28 20:02:26 CST 2025 kill -USR1 2410316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410316 killed at Fri Nov 28 20:02:26 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:02:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:02:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410365 >/dev/null 2>/dev/null selfserv_9351 with PID 2410365 found at Fri Nov 28 20:02:27 CST 2025 selfserv_9351 with PID 2410365 started at Fri Nov 28 20:02:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2154: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2410365 at Fri Nov 28 20:02:51 CST 2025 kill -USR1 2410365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410365 killed at Fri Nov 28 20:02:51 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:02:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:02:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410482 >/dev/null 2>/dev/null selfserv_9351 with PID 2410482 found at Fri Nov 28 20:02:51 CST 2025 selfserv_9351 with PID 2410482 started at Fri Nov 28 20:02:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410482 at Fri Nov 28 20:02:51 CST 2025 kill -USR1 2410482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410482 killed at Fri Nov 28 20:02:51 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:02:51 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:02:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410531 >/dev/null 2>/dev/null selfserv_9351 with PID 2410531 found at Fri Nov 28 20:02:51 CST 2025 selfserv_9351 with PID 2410531 started at Fri Nov 28 20:02:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2156: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2410531 at Fri Nov 28 20:03:14 CST 2025 kill -USR1 2410531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410531 killed at Fri Nov 28 20:03:14 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:03:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410708 >/dev/null 2>/dev/null selfserv_9351 with PID 2410708 found at Fri Nov 28 20:03:14 CST 2025 selfserv_9351 with PID 2410708 started at Fri Nov 28 20:03:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2157: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410708 at Fri Nov 28 20:03:14 CST 2025 kill -USR1 2410708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410708 killed at Fri Nov 28 20:03:14 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:03:14 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:14 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410755 >/dev/null 2>/dev/null selfserv_9351 with PID 2410755 found at Fri Nov 28 20:03:15 CST 2025 selfserv_9351 with PID 2410755 started at Fri Nov 28 20:03:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2158: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410755 at Fri Nov 28 20:03:15 CST 2025 kill -USR1 2410755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410755 killed at Fri Nov 28 20:03:15 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:03:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410796 >/dev/null 2>/dev/null selfserv_9351 with PID 2410796 found at Fri Nov 28 20:03:15 CST 2025 selfserv_9351 with PID 2410796 started at Fri Nov 28 20:03:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2159: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410796 at Fri Nov 28 20:03:15 CST 2025 kill -USR1 2410796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410796 killed at Fri Nov 28 20:03:15 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 20:03:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410843 >/dev/null 2>/dev/null selfserv_9351 with PID 2410843 found at Fri Nov 28 20:03:15 CST 2025 selfserv_9351 with PID 2410843 started at Fri Nov 28 20:03:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2160: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410843 at Fri Nov 28 20:03:15 CST 2025 kill -USR1 2410843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410843 killed at Fri Nov 28 20:03:15 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 20:03:15 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:15 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410892 >/dev/null 2>/dev/null selfserv_9351 with PID 2410892 found at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 with PID 2410892 started at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2161: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410892 at Fri Nov 28 20:03:16 CST 2025 kill -USR1 2410892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410892 killed at Fri Nov 28 20:03:16 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410939 >/dev/null 2>/dev/null selfserv_9351 with PID 2410939 found at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 with PID 2410939 started at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2162: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2410939 at Fri Nov 28 20:03:16 CST 2025 kill -USR1 2410939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410939 killed at Fri Nov 28 20:03:16 CST 2025 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2410986 >/dev/null 2>/dev/null selfserv_9351 with PID 2410986 found at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 with PID 2410986 started at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2163: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2410986 at Fri Nov 28 20:03:16 CST 2025 kill -USR1 2410986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2410986 killed at Fri Nov 28 20:03:16 CST 2025 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9351 starting at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411034 >/dev/null 2>/dev/null selfserv_9351 with PID 2411034 found at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 with PID 2411034 started at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2164: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2411034 at Fri Nov 28 20:03:16 CST 2025 kill -USR1 2411034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411034 killed at Fri Nov 28 20:03:16 CST 2025 ssl.sh: TLS Server hello response without SNI ---- selfserv_9351 starting at Fri Nov 28 20:03:16 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:16 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411081 >/dev/null 2>/dev/null selfserv_9351 with PID 2411081 found at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 with PID 2411081 started at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2165: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411081 at Fri Nov 28 20:03:17 CST 2025 kill -USR1 2411081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411081 killed at Fri Nov 28 20:03:17 CST 2025 ssl.sh: TLS Server hello response with SNI ---- selfserv_9351 starting at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411128 >/dev/null 2>/dev/null selfserv_9351 with PID 2411128 found at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 with PID 2411128 started at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2166: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411128 at Fri Nov 28 20:03:17 CST 2025 kill -USR1 2411128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411128 killed at Fri Nov 28 20:03:17 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9351 starting at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411175 >/dev/null 2>/dev/null selfserv_9351 with PID 2411175 found at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 with PID 2411175 started at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2167: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2411175 at Fri Nov 28 20:03:17 CST 2025 kill -USR1 2411175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411175 killed at Fri Nov 28 20:03:17 CST 2025 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9351 starting at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411223 >/dev/null 2>/dev/null selfserv_9351 with PID 2411223 found at Fri Nov 28 20:03:17 CST 2025 selfserv_9351 with PID 2411223 started at Fri Nov 28 20:03:17 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2168: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2411223 at Fri Nov 28 20:03:18 CST 2025 kill -USR1 2411223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411223 killed at Fri Nov 28 20:03:18 CST 2025 ssl.sh: TLS Server response with alert ---- selfserv_9351 starting at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411270 >/dev/null 2>/dev/null selfserv_9351 with PID 2411270 found at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 with PID 2411270 started at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2169: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2411270 at Fri Nov 28 20:03:18 CST 2025 kill -USR1 2411270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411270 killed at Fri Nov 28 20:03:18 CST 2025 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9351 starting at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411301 >/dev/null 2>/dev/null selfserv_9351 with PID 2411301 found at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 with PID 2411301 started at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2130: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411301 at Fri Nov 28 20:03:18 CST 2025 kill -USR1 2411301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411301 killed at Fri Nov 28 20:03:18 CST 2025 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9351 starting at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411332 >/dev/null 2>/dev/null selfserv_9351 with PID 2411332 found at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 with PID 2411332 started at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2131: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9351 with PID 2411332 at Fri Nov 28 20:03:18 CST 2025 kill -USR1 2411332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411332 killed at Fri Nov 28 20:03:18 CST 2025 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9351 starting at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411367 >/dev/null 2>/dev/null selfserv_9351 with PID 2411367 found at Fri Nov 28 20:03:18 CST 2025 selfserv_9351 with PID 2411367 started at Fri Nov 28 20:03:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2132: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2411367 at Fri Nov 28 20:03:19 CST 2025 kill -USR1 2411367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411367 killed at Fri Nov 28 20:03:19 CST 2025 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9351 starting at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411398 >/dev/null 2>/dev/null selfserv_9351 with PID 2411398 found at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 with PID 2411398 started at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2133: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2411398 at Fri Nov 28 20:03:19 CST 2025 kill -USR1 2411398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411398 killed at Fri Nov 28 20:03:19 CST 2025 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9351 starting at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411429 >/dev/null 2>/dev/null selfserv_9351 with PID 2411429 found at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 with PID 2411429 started at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2134: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2411429 at Fri Nov 28 20:03:19 CST 2025 kill -USR1 2411429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411429 killed at Fri Nov 28 20:03:19 CST 2025 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9351 starting at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411460 >/dev/null 2>/dev/null selfserv_9351 with PID 2411460 found at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 with PID 2411460 started at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2135: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2411460 at Fri Nov 28 20:03:19 CST 2025 kill -USR1 2411460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411460 killed at Fri Nov 28 20:03:19 CST 2025 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9351 starting at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411491 >/dev/null 2>/dev/null selfserv_9351 with PID 2411491 found at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 with PID 2411491 started at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #2136: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9351 with PID 2411491 at Fri Nov 28 20:03:19 CST 2025 kill -USR1 2411491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411491 killed at Fri Nov 28 20:03:19 CST 2025 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9351 starting at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 -D -p 9351 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411528 >/dev/null 2>/dev/null selfserv_9351 with PID 2411528 found at Fri Nov 28 20:03:19 CST 2025 selfserv_9351 with PID 2411528 started at Fri Nov 28 20:03:19 CST 2025 strsclnt -4 -q -p 9351 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Fri Nov 28 20:03:19 CST 2025 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Fri Nov 28 20:03:24 CST 2025 ssl.sh: #2137: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9351 with PID 2411528 at Fri Nov 28 20:03:24 CST 2025 kill -USR1 2411528 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411528 killed at Fri Nov 28 20:03:24 CST 2025 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 20:03:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411603 >/dev/null 2>/dev/null selfserv_9351 with PID 2411603 found at Fri Nov 28 20:03:24 CST 2025 selfserv_9351 with PID 2411603 started at Fri Nov 28 20:03:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2138: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411603 at Fri Nov 28 20:03:24 CST 2025 kill -USR1 2411603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411603 killed at Fri Nov 28 20:03:24 CST 2025 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411634 >/dev/null 2>/dev/null selfserv_9351 with PID 2411634 found at Fri Nov 28 20:03:24 CST 2025 selfserv_9351 with PID 2411634 started at Fri Nov 28 20:03:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2139: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411634 at Fri Nov 28 20:03:24 CST 2025 kill -USR1 2411634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411634 killed at Fri Nov 28 20:03:24 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:24 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:24 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411668 >/dev/null 2>/dev/null selfserv_9351 with PID 2411668 found at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 with PID 2411668 started at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2140: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2411668 at Fri Nov 28 20:03:25 CST 2025 kill -USR1 2411668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411668 killed at Fri Nov 28 20:03:25 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411696 >/dev/null 2>/dev/null selfserv_9351 with PID 2411696 found at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 with PID 2411696 started at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2141: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411696 at Fri Nov 28 20:03:25 CST 2025 kill -USR1 2411696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411696 killed at Fri Nov 28 20:03:25 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411724 >/dev/null 2>/dev/null selfserv_9351 with PID 2411724 found at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 with PID 2411724 started at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2142: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2411724 at Fri Nov 28 20:03:25 CST 2025 kill -USR1 2411724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411724 killed at Fri Nov 28 20:03:25 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411752 >/dev/null 2>/dev/null selfserv_9351 with PID 2411752 found at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 with PID 2411752 started at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2143: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411752 at Fri Nov 28 20:03:25 CST 2025 kill -USR1 2411752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411752 killed at Fri Nov 28 20:03:25 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411780 >/dev/null 2>/dev/null selfserv_9351 with PID 2411780 found at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 with PID 2411780 started at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2144: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411780 at Fri Nov 28 20:03:25 CST 2025 kill -USR1 2411780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411780 killed at Fri Nov 28 20:03:25 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411809 >/dev/null 2>/dev/null selfserv_9351 with PID 2411809 found at Fri Nov 28 20:03:25 CST 2025 selfserv_9351 with PID 2411809 started at Fri Nov 28 20:03:25 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2145: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411809 at Fri Nov 28 20:03:26 CST 2025 kill -USR1 2411809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411809 killed at Fri Nov 28 20:03:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411837 >/dev/null 2>/dev/null selfserv_9351 with PID 2411837 found at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 with PID 2411837 started at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2146: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411837 at Fri Nov 28 20:03:26 CST 2025 kill -USR1 2411837 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411837 killed at Fri Nov 28 20:03:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411865 >/dev/null 2>/dev/null selfserv_9351 with PID 2411865 found at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 with PID 2411865 started at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2147: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411865 at Fri Nov 28 20:03:26 CST 2025 kill -USR1 2411865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411865 killed at Fri Nov 28 20:03:26 CST 2025 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411893 >/dev/null 2>/dev/null selfserv_9351 with PID 2411893 found at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 with PID 2411893 started at Fri Nov 28 20:03:26 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2148: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411893 at Fri Nov 28 20:03:26 CST 2025 kill -USR1 2411893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411893 killed at Fri Nov 28 20:03:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411922 >/dev/null 2>/dev/null selfserv_9351 with PID 2411922 found at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 with PID 2411922 started at Fri Nov 28 20:03:26 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2149: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2411922 at Fri Nov 28 20:03:26 CST 2025 kill -USR1 2411922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411922 killed at Fri Nov 28 20:03:26 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411951 >/dev/null 2>/dev/null selfserv_9351 with PID 2411951 found at Fri Nov 28 20:03:26 CST 2025 selfserv_9351 with PID 2411951 started at Fri Nov 28 20:03:26 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2150: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2411951 at Fri Nov 28 20:03:27 CST 2025 kill -USR1 2411951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411951 killed at Fri Nov 28 20:03:27 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2411980 >/dev/null 2>/dev/null selfserv_9351 with PID 2411980 found at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 with PID 2411980 started at Fri Nov 28 20:03:27 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2151: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2411980 at Fri Nov 28 20:03:27 CST 2025 kill -USR1 2411980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2411980 killed at Fri Nov 28 20:03:27 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2412009 >/dev/null 2>/dev/null selfserv_9351 with PID 2412009 found at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 with PID 2412009 started at Fri Nov 28 20:03:27 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2152: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2412009 at Fri Nov 28 20:03:27 CST 2025 kill -USR1 2412009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412009 killed at Fri Nov 28 20:03:27 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2412038 >/dev/null 2>/dev/null selfserv_9351 with PID 2412038 found at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 with PID 2412038 started at Fri Nov 28 20:03:27 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2153: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2412038 at Fri Nov 28 20:03:27 CST 2025 kill -USR1 2412038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412038 killed at Fri Nov 28 20:03:27 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2412067 >/dev/null 2>/dev/null selfserv_9351 with PID 2412067 found at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 with PID 2412067 started at Fri Nov 28 20:03:27 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2154: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2412067 at Fri Nov 28 20:03:27 CST 2025 kill -USR1 2412067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412067 killed at Fri Nov 28 20:03:27 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2412096 >/dev/null 2>/dev/null selfserv_9351 with PID 2412096 found at Fri Nov 28 20:03:27 CST 2025 selfserv_9351 with PID 2412096 started at Fri Nov 28 20:03:27 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2155: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2412096 at Fri Nov 28 20:03:28 CST 2025 kill -USR1 2412096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412096 killed at Fri Nov 28 20:03:28 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:03:28 CST 2025 selfserv_9351 -D -p 9351 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2412125 >/dev/null 2>/dev/null selfserv_9351 with PID 2412125 found at Fri Nov 28 20:03:28 CST 2025 selfserv_9351 with PID 2412125 started at Fri Nov 28 20:03:28 CST 2025 strsclnt -4 -q -p 9351 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2156: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2412125 at Fri Nov 28 20:03:28 CST 2025 kill -USR1 2412125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412125 killed at Fri Nov 28 20:03:28 CST 2025 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9351 starting at Fri Nov 28 20:03:28 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:28 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2412154 >/dev/null 2>/dev/null selfserv_9351 with PID 2412154 found at Fri Nov 28 20:03:28 CST 2025 selfserv_9351 with PID 2412154 started at Fri Nov 28 20:03:28 CST 2025 egrep: warning: egrep is obsolescent; using grep -E ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2157: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2158: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2159: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2160: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2161: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2162: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2163: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2164: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2165: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2166: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2167: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2168: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2169: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2170: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2171: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2172: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2173: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2174: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2175: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2176: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2177: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2178: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2179: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2180: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2181: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2182: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2183: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2184: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2185: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2186: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2187: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2188: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2189: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2190: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2191: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2192: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2193: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2194: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2195: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2196: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2197: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2198: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2199: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2200: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2201: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2202: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2203: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2204: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2205: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2206: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2207: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9351 with PID 2412154 at Fri Nov 28 20:03:33 CST 2025 kill -USR1 2412154 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412154 killed at Fri Nov 28 20:03:33 CST 2025 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9351 starting at Fri Nov 28 20:03:33 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 2412660 >/dev/null 2>/dev/null selfserv_9351 with PID 2412660 found at Fri Nov 28 20:03:33 CST 2025 selfserv_9351 with PID 2412660 started at Fri Nov 28 20:03:33 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2208: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2209: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2210: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2211: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2212: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2213: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2214: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2215: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2216: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2217: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2218: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2219: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2220: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2221: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2222: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2223: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2224: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2225: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2226: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2227: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2228: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2229: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2230: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2231: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2232: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2233: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2234: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2235: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2236: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2237: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2238: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2239: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2240: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2241: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2242: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2243: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2244: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2245: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2246: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2247: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2248: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2249: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2250: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2251: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2252: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2253: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2254: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2255: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2256: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2257: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2258: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2259: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2260: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2261: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2262: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2263: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2264: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2265: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2266: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2267: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2268: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2269: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2270: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2271: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2272: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2273: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2274: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2275: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2276: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2277: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2278: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2279: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2280: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2281: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2282: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9351 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9351 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2283: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2412660 at Fri Nov 28 20:03:40 CST 2025 kill -USR1 2412660 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2412660 killed at Fri Nov 28 20:03:40 CST 2025 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== egrep: warning: egrep is obsolescent; using grep -E ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:03:40 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413418 >/dev/null 2>/dev/null selfserv_9351 with PID 2413418 found at Fri Nov 28 20:03:40 CST 2025 selfserv_9351 with PID 2413418 started at Fri Nov 28 20:03:40 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2284: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2413418 at Fri Nov 28 20:03:41 CST 2025 kill -USR1 2413418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413418 killed at Fri Nov 28 20:03:41 CST 2025 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:03:41 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:03:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413463 >/dev/null 2>/dev/null selfserv_9351 with PID 2413463 found at Fri Nov 28 20:03:41 CST 2025 selfserv_9351 with PID 2413463 started at Fri Nov 28 20:03:41 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2285: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2413463 at Fri Nov 28 20:04:07 CST 2025 kill -USR1 2413463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413463 killed at Fri Nov 28 20:04:07 CST 2025 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:04:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413645 >/dev/null 2>/dev/null selfserv_9351 with PID 2413645 found at Fri Nov 28 20:04:07 CST 2025 selfserv_9351 with PID 2413645 started at Fri Nov 28 20:04:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2286: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2413645 at Fri Nov 28 20:04:07 CST 2025 kill -USR1 2413645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413645 killed at Fri Nov 28 20:04:07 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:04:07 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:07 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413699 >/dev/null 2>/dev/null selfserv_9351 with PID 2413699 found at Fri Nov 28 20:04:08 CST 2025 selfserv_9351 with PID 2413699 started at Fri Nov 28 20:04:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2287: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2413699 at Fri Nov 28 20:04:08 CST 2025 kill -USR1 2413699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413699 killed at Fri Nov 28 20:04:08 CST 2025 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:04:08 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413740 >/dev/null 2>/dev/null selfserv_9351 with PID 2413740 found at Fri Nov 28 20:04:08 CST 2025 selfserv_9351 with PID 2413740 started at Fri Nov 28 20:04:08 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2288: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2413740 at Fri Nov 28 20:04:31 CST 2025 kill -USR1 2413740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413740 killed at Fri Nov 28 20:04:31 CST 2025 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:04:31 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413889 >/dev/null 2>/dev/null selfserv_9351 with PID 2413889 found at Fri Nov 28 20:04:31 CST 2025 selfserv_9351 with PID 2413889 started at Fri Nov 28 20:04:31 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2413889 at Fri Nov 28 20:04:32 CST 2025 kill -USR1 2413889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413889 killed at Fri Nov 28 20:04:32 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:04:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413942 >/dev/null 2>/dev/null selfserv_9351 with PID 2413942 found at Fri Nov 28 20:04:32 CST 2025 selfserv_9351 with PID 2413942 started at Fri Nov 28 20:04:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2290: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2413942 at Fri Nov 28 20:04:32 CST 2025 kill -USR1 2413942 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413942 killed at Fri Nov 28 20:04:32 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:04:32 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2413984 >/dev/null 2>/dev/null selfserv_9351 with PID 2413984 found at Fri Nov 28 20:04:32 CST 2025 selfserv_9351 with PID 2413984 started at Fri Nov 28 20:04:32 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2291: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2413984 at Fri Nov 28 20:04:58 CST 2025 kill -USR1 2413984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2413984 killed at Fri Nov 28 20:04:58 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:04:58 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:58 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414104 >/dev/null 2>/dev/null selfserv_9351 with PID 2414104 found at Fri Nov 28 20:04:59 CST 2025 selfserv_9351 with PID 2414104 started at Fri Nov 28 20:04:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2292: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2414104 at Fri Nov 28 20:04:59 CST 2025 kill -USR1 2414104 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414104 killed at Fri Nov 28 20:04:59 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:04:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414157 >/dev/null 2>/dev/null selfserv_9351 with PID 2414157 found at Fri Nov 28 20:04:59 CST 2025 selfserv_9351 with PID 2414157 started at Fri Nov 28 20:04:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2293: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2414157 at Fri Nov 28 20:04:59 CST 2025 kill -USR1 2414157 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414157 killed at Fri Nov 28 20:04:59 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:04:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:04:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414216 >/dev/null 2>/dev/null selfserv_9351 with PID 2414216 found at Fri Nov 28 20:05:00 CST 2025 selfserv_9351 with PID 2414216 started at Fri Nov 28 20:05:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2294: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2414216 at Fri Nov 28 20:05:26 CST 2025 kill -USR1 2414216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414216 killed at Fri Nov 28 20:05:26 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:05:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414428 >/dev/null 2>/dev/null selfserv_9351 with PID 2414428 found at Fri Nov 28 20:05:26 CST 2025 selfserv_9351 with PID 2414428 started at Fri Nov 28 20:05:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2295: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2414428 at Fri Nov 28 20:05:26 CST 2025 kill -USR1 2414428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414428 killed at Fri Nov 28 20:05:26 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:05:26 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414481 >/dev/null 2>/dev/null selfserv_9351 with PID 2414481 found at Fri Nov 28 20:05:26 CST 2025 selfserv_9351 with PID 2414481 started at Fri Nov 28 20:05:26 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2296: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2414481 at Fri Nov 28 20:05:27 CST 2025 kill -USR1 2414481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414481 killed at Fri Nov 28 20:05:27 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:05:27 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414522 >/dev/null 2>/dev/null selfserv_9351 with PID 2414522 found at Fri Nov 28 20:05:27 CST 2025 selfserv_9351 with PID 2414522 started at Fri Nov 28 20:05:27 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2297: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2414522 at Fri Nov 28 20:05:50 CST 2025 kill -USR1 2414522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414522 killed at Fri Nov 28 20:05:50 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:05:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414635 >/dev/null 2>/dev/null selfserv_9351 with PID 2414635 found at Fri Nov 28 20:05:50 CST 2025 selfserv_9351 with PID 2414635 started at Fri Nov 28 20:05:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2298: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2414635 at Fri Nov 28 20:05:50 CST 2025 kill -USR1 2414635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414635 killed at Fri Nov 28 20:05:50 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:05:50 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:50 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414684 >/dev/null 2>/dev/null selfserv_9351 with PID 2414684 found at Fri Nov 28 20:05:51 CST 2025 selfserv_9351 with PID 2414684 started at Fri Nov 28 20:05:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2299: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2414684 at Fri Nov 28 20:05:51 CST 2025 kill -USR1 2414684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414684 killed at Fri Nov 28 20:05:51 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9351 starting at Fri Nov 28 20:05:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414729 >/dev/null 2>/dev/null selfserv_9351 with PID 2414729 found at Fri Nov 28 20:05:51 CST 2025 selfserv_9351 with PID 2414729 started at Fri Nov 28 20:05:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2300: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2414729 at Fri Nov 28 20:05:51 CST 2025 kill -USR1 2414729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414729 killed at Fri Nov 28 20:05:51 CST 2025 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:05:51 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:51 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414778 >/dev/null 2>/dev/null selfserv_9351 with PID 2414778 found at Fri Nov 28 20:05:52 CST 2025 selfserv_9351 with PID 2414778 started at Fri Nov 28 20:05:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2301: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2414778 at Fri Nov 28 20:05:52 CST 2025 kill -USR1 2414778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414778 killed at Fri Nov 28 20:05:52 CST 2025 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:05:52 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:05:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2414827 >/dev/null 2>/dev/null selfserv_9351 with PID 2414827 found at Fri Nov 28 20:05:52 CST 2025 selfserv_9351 with PID 2414827 started at Fri Nov 28 20:05:52 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2302: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2414827 at Fri Nov 28 20:06:18 CST 2025 kill -USR1 2414827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2414827 killed at Fri Nov 28 20:06:18 CST 2025 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:06:18 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:06:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415014 >/dev/null 2>/dev/null selfserv_9351 with PID 2415014 found at Fri Nov 28 20:06:18 CST 2025 selfserv_9351 with PID 2415014 started at Fri Nov 28 20:06:18 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2303: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415014 at Fri Nov 28 20:06:19 CST 2025 kill -USR1 2415014 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415014 killed at Fri Nov 28 20:06:19 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:06:19 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:06:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415063 >/dev/null 2>/dev/null selfserv_9351 with PID 2415063 found at Fri Nov 28 20:06:19 CST 2025 selfserv_9351 with PID 2415063 started at Fri Nov 28 20:06:19 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2304: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2415063 at Fri Nov 28 20:06:42 CST 2025 kill -USR1 2415063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415063 killed at Fri Nov 28 20:06:42 CST 2025 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:06:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:06:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415206 >/dev/null 2>/dev/null selfserv_9351 with PID 2415206 found at Fri Nov 28 20:06:42 CST 2025 selfserv_9351 with PID 2415206 started at Fri Nov 28 20:06:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2305: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415206 at Fri Nov 28 20:06:42 CST 2025 kill -USR1 2415206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415206 killed at Fri Nov 28 20:06:42 CST 2025 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:06:42 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:06:42 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415256 >/dev/null 2>/dev/null selfserv_9351 with PID 2415256 found at Fri Nov 28 20:06:43 CST 2025 selfserv_9351 with PID 2415256 started at Fri Nov 28 20:06:43 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2306: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2415256 at Fri Nov 28 20:07:09 CST 2025 kill -USR1 2415256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415256 killed at Fri Nov 28 20:07:09 CST 2025 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:07:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:07:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415439 >/dev/null 2>/dev/null selfserv_9351 with PID 2415439 found at Fri Nov 28 20:07:09 CST 2025 selfserv_9351 with PID 2415439 started at Fri Nov 28 20:07:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2307: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415439 at Fri Nov 28 20:07:09 CST 2025 kill -USR1 2415439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415439 killed at Fri Nov 28 20:07:09 CST 2025 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:07:09 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:07:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415488 >/dev/null 2>/dev/null selfserv_9351 with PID 2415488 found at Fri Nov 28 20:07:09 CST 2025 selfserv_9351 with PID 2415488 started at Fri Nov 28 20:07:09 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2308: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2415488 at Fri Nov 28 20:07:35 CST 2025 kill -USR1 2415488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415488 killed at Fri Nov 28 20:07:35 CST 2025 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:07:35 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:07:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415644 >/dev/null 2>/dev/null selfserv_9351 with PID 2415644 found at Fri Nov 28 20:07:35 CST 2025 selfserv_9351 with PID 2415644 started at Fri Nov 28 20:07:35 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415644 at Fri Nov 28 20:07:36 CST 2025 kill -USR1 2415644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415644 killed at Fri Nov 28 20:07:36 CST 2025 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9351 starting at Fri Nov 28 20:07:36 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:07:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415693 >/dev/null 2>/dev/null selfserv_9351 with PID 2415693 found at Fri Nov 28 20:07:36 CST 2025 selfserv_9351 with PID 2415693 started at Fri Nov 28 20:07:36 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2310: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2415693 at Fri Nov 28 20:07:59 CST 2025 kill -USR1 2415693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415693 killed at Fri Nov 28 20:07:59 CST 2025 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:07:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:07:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415801 >/dev/null 2>/dev/null selfserv_9351 with PID 2415801 found at Fri Nov 28 20:07:59 CST 2025 selfserv_9351 with PID 2415801 started at Fri Nov 28 20:07:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2311: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415801 at Fri Nov 28 20:07:59 CST 2025 kill -USR1 2415801 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415801 killed at Fri Nov 28 20:07:59 CST 2025 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:07:59 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:07:59 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415860 >/dev/null 2>/dev/null selfserv_9351 with PID 2415860 found at Fri Nov 28 20:08:00 CST 2025 selfserv_9351 with PID 2415860 started at Fri Nov 28 20:08:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2312: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415860 at Fri Nov 28 20:08:00 CST 2025 kill -USR1 2415860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415860 killed at Fri Nov 28 20:08:00 CST 2025 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9351 starting at Fri Nov 28 20:08:00 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.2120400\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415901 >/dev/null 2>/dev/null selfserv_9351 with PID 2415901 found at Fri Nov 28 20:08:00 CST 2025 selfserv_9351 with PID 2415901 started at Fri Nov 28 20:08:00 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2313: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415901 at Fri Nov 28 20:08:00 CST 2025 kill -USR1 2415901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415901 killed at Fri Nov 28 20:08:00 CST 2025 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9351 starting at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2415976 >/dev/null 2>/dev/null selfserv_9351 with PID 2415976 found at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 with PID 2415976 started at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2284: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2415976 at Fri Nov 28 20:08:01 CST 2025 kill -USR1 2415976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2415976 killed at Fri Nov 28 20:08:01 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416007 >/dev/null 2>/dev/null selfserv_9351 with PID 2416007 found at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 with PID 2416007 started at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2285: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416007 at Fri Nov 28 20:08:01 CST 2025 kill -USR1 2416007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416007 killed at Fri Nov 28 20:08:01 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416035 >/dev/null 2>/dev/null selfserv_9351 with PID 2416035 found at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 with PID 2416035 started at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2286: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2416035 at Fri Nov 28 20:08:01 CST 2025 kill -USR1 2416035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416035 killed at Fri Nov 28 20:08:01 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416075 >/dev/null 2>/dev/null selfserv_9351 with PID 2416075 found at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 with PID 2416075 started at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2287: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416075 at Fri Nov 28 20:08:01 CST 2025 kill -USR1 2416075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416075 killed at Fri Nov 28 20:08:01 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:01 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:01 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416107 >/dev/null 2>/dev/null selfserv_9351 with PID 2416107 found at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 with PID 2416107 started at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2288: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9351 with PID 2416107 at Fri Nov 28 20:08:02 CST 2025 kill -USR1 2416107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416107 killed at Fri Nov 28 20:08:02 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416135 >/dev/null 2>/dev/null selfserv_9351 with PID 2416135 found at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 with PID 2416135 started at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416135 at Fri Nov 28 20:08:02 CST 2025 kill -USR1 2416135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416135 killed at Fri Nov 28 20:08:02 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416163 >/dev/null 2>/dev/null selfserv_9351 with PID 2416163 found at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 with PID 2416163 started at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2290: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416163 at Fri Nov 28 20:08:02 CST 2025 kill -USR1 2416163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416163 killed at Fri Nov 28 20:08:02 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416227 >/dev/null 2>/dev/null selfserv_9351 with PID 2416227 found at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 with PID 2416227 started at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2291: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416227 at Fri Nov 28 20:08:02 CST 2025 kill -USR1 2416227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416227 killed at Fri Nov 28 20:08:02 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416257 >/dev/null 2>/dev/null selfserv_9351 with PID 2416257 found at Fri Nov 28 20:08:02 CST 2025 selfserv_9351 with PID 2416257 started at Fri Nov 28 20:08:02 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2292: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416257 at Fri Nov 28 20:08:03 CST 2025 kill -USR1 2416257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416257 killed at Fri Nov 28 20:08:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416285 >/dev/null 2>/dev/null selfserv_9351 with PID 2416285 found at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 with PID 2416285 started at Fri Nov 28 20:08:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2293: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416285 at Fri Nov 28 20:08:03 CST 2025 kill -USR1 2416285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416285 killed at Fri Nov 28 20:08:03 CST 2025 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416313 >/dev/null 2>/dev/null selfserv_9351 with PID 2416313 found at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 with PID 2416313 started at Fri Nov 28 20:08:03 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2294: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416313 at Fri Nov 28 20:08:03 CST 2025 kill -USR1 2416313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416313 killed at Fri Nov 28 20:08:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416342 >/dev/null 2>/dev/null selfserv_9351 with PID 2416342 found at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 with PID 2416342 started at Fri Nov 28 20:08:03 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2295: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2416342 at Fri Nov 28 20:08:03 CST 2025 kill -USR1 2416342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416342 killed at Fri Nov 28 20:08:03 CST 2025 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416371 >/dev/null 2>/dev/null selfserv_9351 with PID 2416371 found at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 with PID 2416371 started at Fri Nov 28 20:08:03 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2296: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416371 at Fri Nov 28 20:08:03 CST 2025 kill -USR1 2416371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416371 killed at Fri Nov 28 20:08:03 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:03 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:03 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416405 >/dev/null 2>/dev/null selfserv_9351 with PID 2416405 found at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 with PID 2416405 started at Fri Nov 28 20:08:04 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2297: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9351 with PID 2416405 at Fri Nov 28 20:08:04 CST 2025 kill -USR1 2416405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416405 killed at Fri Nov 28 20:08:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416434 >/dev/null 2>/dev/null selfserv_9351 with PID 2416434 found at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 with PID 2416434 started at Fri Nov 28 20:08:04 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2298: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416434 at Fri Nov 28 20:08:04 CST 2025 kill -USR1 2416434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416434 killed at Fri Nov 28 20:08:04 CST 2025 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416463 >/dev/null 2>/dev/null selfserv_9351 with PID 2416463 found at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 with PID 2416463 started at Fri Nov 28 20:08:04 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2299: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416463 at Fri Nov 28 20:08:04 CST 2025 kill -USR1 2416463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416463 killed at Fri Nov 28 20:08:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416492 >/dev/null 2>/dev/null selfserv_9351 with PID 2416492 found at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 with PID 2416492 started at Fri Nov 28 20:08:04 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2300: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416492 at Fri Nov 28 20:08:04 CST 2025 kill -USR1 2416492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416492 killed at Fri Nov 28 20:08:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:04 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416527 >/dev/null 2>/dev/null selfserv_9351 with PID 2416527 found at Fri Nov 28 20:08:04 CST 2025 selfserv_9351 with PID 2416527 started at Fri Nov 28 20:08:04 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2301: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416527 at Fri Nov 28 20:08:04 CST 2025 kill -USR1 2416527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416527 killed at Fri Nov 28 20:08:04 CST 2025 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9351 starting at Fri Nov 28 20:08:05 CST 2025 selfserv_9351 -D -p 9351 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.2120400\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9351 at Fri Nov 28 20:08:05 CST 2025 tstclnt -4 -p 9351 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat kill -0 2416556 >/dev/null 2>/dev/null selfserv_9351 with PID 2416556 found at Fri Nov 28 20:08:05 CST 2025 selfserv_9351 with PID 2416556 started at Fri Nov 28 20:08:05 CST 2025 strsclnt -4 -q -p 9351 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.112/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2302: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9351 with PID 2416556 at Fri Nov 28 20:08:05 CST 2025 kill -USR1 2416556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9351 -b -p 9351 2>/dev/null; selfserv_9351 with PID 2416556 killed at Fri Nov 28 20:08:05 CST 2025 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -fips false -force FIPS mode disabled. ssl.sh: #2303: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #2304: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2305: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2306: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.112/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #2307: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2308: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Fri Nov 28 20:08:05 CST 2025 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64=1 NSS_CYCLES="" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec" NSS_SSL_TESTS="crl iopr policy normal_normal fips_normal normal_fips" NSS_SSL_RUN="cov auth stapling signed_cert_timestamps scheme" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= NSS_DISABLE_HW_AES= NSS_DISABLE_HW_SHA1= NSS_DISABLE_HW_SHA2= NSS_DISABLE_PCLMUL= NSS_DISABLE_AVX= NSS_DISABLE_ARM_NEON= NSS_DISABLE_SSSE3= Tests summary: -------------- Passed: 17664 Failed: 0 Failed with core: 0 ASan failures: 0 Unknown status: 0 + popd ~/build/BUILD/nss-3.112 + killall selfserv_9351 selfserv_9351: no process found + : + RPM_EC=0 ++ jobs -p + exit 0 Processing files: nss-3.112-2.oc9.aarch64 Executing(%license): /bin/sh -e /var/tmp/rpm-tmp.odrwn6 + umask 022 + cd /builddir/build/BUILD + cd nss-3.112 + LICENSEDIR=/builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss + export LC_ALL=C + LC_ALL=C + export LICENSEDIR + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss + cp -pr nss/COPYING /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss + RPM_EC=0 ++ jobs -p + exit 0 Provides: config(nss) = 3.112-2.oc9 libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.10.2)(64bit) libnss3.so(NSS_3.101)(64bit) libnss3.so(NSS_3.107)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.1)(64bit) libnss3.so(NSS_3.11.2)(64bit) libnss3.so(NSS_3.11.7)(64bit) libnss3.so(NSS_3.11.9)(64bit) libnss3.so(NSS_3.110)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.1)(64bit) libnss3.so(NSS_3.12.10)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.4)(64bit) libnss3.so(NSS_3.12.5)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.12.7)(64bit) libnss3.so(NSS_3.12.9)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.13.2)(64bit) libnss3.so(NSS_3.14)(64bit) libnss3.so(NSS_3.14.1)(64bit) libnss3.so(NSS_3.14.3)(64bit) libnss3.so(NSS_3.15)(64bit) libnss3.so(NSS_3.15.4)(64bit) libnss3.so(NSS_3.16.1)(64bit) libnss3.so(NSS_3.16.2)(64bit) libnss3.so(NSS_3.18)(64bit) libnss3.so(NSS_3.19)(64bit) libnss3.so(NSS_3.19.1)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.2.1)(64bit) libnss3.so(NSS_3.21)(64bit) libnss3.so(NSS_3.22)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.3.1)(64bit) libnss3.so(NSS_3.30)(64bit) libnss3.so(NSS_3.31)(64bit) libnss3.so(NSS_3.33)(64bit) libnss3.so(NSS_3.34)(64bit) libnss3.so(NSS_3.39)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.43)(64bit) libnss3.so(NSS_3.44)(64bit) libnss3.so(NSS_3.45)(64bit) libnss3.so(NSS_3.47)(64bit) libnss3.so(NSS_3.5)(64bit) libnss3.so(NSS_3.52)(64bit) libnss3.so(NSS_3.53)(64bit) libnss3.so(NSS_3.55)(64bit) libnss3.so(NSS_3.58)(64bit) libnss3.so(NSS_3.59)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.62)(64bit) libnss3.so(NSS_3.65)(64bit) libnss3.so(NSS_3.66)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.7.1)(64bit) libnss3.so(NSS_3.77)(64bit) libnss3.so(NSS_3.79)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnss3.so(NSS_OpenCloudOS)(64bit) libsmime3.so()(64bit) libsmime3.so(NSS_3.10)(64bit) libsmime3.so(NSS_3.101)(64bit) libsmime3.so(NSS_3.12.10)(64bit) libsmime3.so(NSS_3.12.2)(64bit) libsmime3.so(NSS_3.13)(64bit) libsmime3.so(NSS_3.15)(64bit) libsmime3.so(NSS_3.16)(64bit) libsmime3.so(NSS_3.18)(64bit) libsmime3.so(NSS_3.2)(64bit) libsmime3.so(NSS_3.2.1)(64bit) libsmime3.so(NSS_3.3)(64bit) libsmime3.so(NSS_3.4)(64bit) libsmime3.so(NSS_3.4.1)(64bit) libsmime3.so(NSS_3.6)(64bit) libsmime3.so(NSS_3.7)(64bit) libsmime3.so(NSS_3.7.2)(64bit) libsmime3.so(NSS_3.8)(64bit) libsmime3.so(NSS_3.89)(64bit) libsmime3.so(NSS_3.9)(64bit) libsmime3.so(NSS_3.9.3)(64bit) libsmime3.so(NSS_3.99)(64bit) libssl3.so()(64bit) libssl3.so(NSS_3.11.4)(64bit) libssl3.so(NSS_3.11.8)(64bit) libssl3.so(NSS_3.12.10)(64bit) libssl3.so(NSS_3.12.6)(64bit) libssl3.so(NSS_3.13)(64bit) libssl3.so(NSS_3.13.2)(64bit) libssl3.so(NSS_3.14)(64bit) libssl3.so(NSS_3.15)(64bit) libssl3.so(NSS_3.15.4)(64bit) libssl3.so(NSS_3.2)(64bit) libssl3.so(NSS_3.2.1)(64bit) libssl3.so(NSS_3.20)(64bit) libssl3.so(NSS_3.21)(64bit) libssl3.so(NSS_3.22)(64bit) libssl3.so(NSS_3.23)(64bit) libssl3.so(NSS_3.24)(64bit) libssl3.so(NSS_3.27)(64bit) libssl3.so(NSS_3.28)(64bit) libssl3.so(NSS_3.30)(64bit) libssl3.so(NSS_3.30.0.1)(64bit) libssl3.so(NSS_3.33)(64bit) libssl3.so(NSS_3.4)(64bit) libssl3.so(NSS_3.7.4)(64bit) libssl3.so(NSS_3.77)(64bit) libssl3.so(NSS_3.80)(64bit) nss = 3.112-2.oc9 nss(aarch-64) = 3.112-2.oc9 Requires(interp): /bin/sh /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /bin/sh Requires(posttrans): /bin/sh /usr/bin/update-crypto-policies Requires: ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libnspr4.so()(64bit) libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.101)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.1)(64bit) libnss3.so(NSS_3.11.2)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.14)(64bit) libnss3.so(NSS_3.14.3)(64bit) libnss3.so(NSS_3.15)(64bit) libnss3.so(NSS_3.19.1)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.21)(64bit) libnss3.so(NSS_3.22)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.3.1)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.52)(64bit) libnss3.so(NSS_3.58)(64bit) libnss3.so(NSS_3.59)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.62)(64bit) libnss3.so(NSS_3.65)(64bit) libnss3.so(NSS_3.66)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.77)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.101)(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.5)(64bit) libnssutil3.so(NSSUTIL_3.13)(64bit) libnssutil3.so(NSSUTIL_3.14)(64bit) libnssutil3.so(NSSUTIL_3.15)(64bit) libnssutil3.so(NSSUTIL_3.17.1)(64bit) libnssutil3.so(NSSUTIL_3.21)(64bit) libnssutil3.so(NSSUTIL_3.24)(64bit) libnssutil3.so(NSSUTIL_3.25)(64bit) libnssutil3.so(NSSUTIL_3.31)(64bit) libnssutil3.so(NSSUTIL_3.38)(64bit) libnssutil3.so(NSSUTIL_3.39)(64bit) libnssutil3.so(NSSUTIL_3.59)(64bit) libnssutil3.so(NSSUTIL_3.82)(64bit) libnssutil3.so(NSSUTIL_3.94)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) rtld(GNU_HASH) Processing files: nss-tools-3.112-2.oc9.aarch64 Provides: nss-tools = 3.112-2.oc9 nss-tools(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libc.so.6(GLIBC_2.34)(64bit) libnspr4.so()(64bit) libnss3.so()(64bit) libnss3.so(NSS_3.10)(64bit) libnss3.so(NSS_3.11)(64bit) libnss3.so(NSS_3.11.7)(64bit) libnss3.so(NSS_3.12)(64bit) libnss3.so(NSS_3.12.1)(64bit) libnss3.so(NSS_3.12.3)(64bit) libnss3.so(NSS_3.12.6)(64bit) libnss3.so(NSS_3.12.9)(64bit) libnss3.so(NSS_3.13)(64bit) libnss3.so(NSS_3.14)(64bit) libnss3.so(NSS_3.14.1)(64bit) libnss3.so(NSS_3.15)(64bit) libnss3.so(NSS_3.16.1)(64bit) libnss3.so(NSS_3.16.2)(64bit) libnss3.so(NSS_3.18)(64bit) libnss3.so(NSS_3.2)(64bit) libnss3.so(NSS_3.21)(64bit) libnss3.so(NSS_3.3)(64bit) libnss3.so(NSS_3.30)(64bit) libnss3.so(NSS_3.31)(64bit) libnss3.so(NSS_3.33)(64bit) libnss3.so(NSS_3.34)(64bit) libnss3.so(NSS_3.39)(64bit) libnss3.so(NSS_3.4)(64bit) libnss3.so(NSS_3.5)(64bit) libnss3.so(NSS_3.6)(64bit) libnss3.so(NSS_3.7)(64bit) libnss3.so(NSS_3.8)(64bit) libnss3.so(NSS_3.9)(64bit) libnss3.so(NSS_3.9.2)(64bit) libnss3.so(NSS_3.9.3)(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.101)(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.7)(64bit) libnssutil3.so(NSSUTIL_3.15)(64bit) libnssutil3.so(NSSUTIL_3.24)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libsmime3.so()(64bit) libsmime3.so(NSS_3.10)(64bit) libsmime3.so(NSS_3.2)(64bit) libsmime3.so(NSS_3.3)(64bit) libsmime3.so(NSS_3.4)(64bit) libsmime3.so(NSS_3.6)(64bit) libsmime3.so(NSS_3.9.3)(64bit) libssl3.so()(64bit) libssl3.so(NSS_3.12.6)(64bit) libssl3.so(NSS_3.13.2)(64bit) libssl3.so(NSS_3.14)(64bit) libssl3.so(NSS_3.15)(64bit) libssl3.so(NSS_3.15.4)(64bit) libssl3.so(NSS_3.2)(64bit) libssl3.so(NSS_3.20)(64bit) libssl3.so(NSS_3.22)(64bit) libssl3.so(NSS_3.24)(64bit) libssl3.so(NSS_3.27)(64bit) libssl3.so(NSS_3.28)(64bit) libssl3.so(NSS_3.33)(64bit) libssl3.so(NSS_3.4)(64bit) libssl3.so(NSS_3.7.4)(64bit) libssl3.so(NSS_3.80)(64bit) libz.so.1()(64bit) libz.so.1(ZLIB_1.2.0)(64bit) rtld(GNU_HASH) Processing files: nss-sysinit-3.112-2.oc9.aarch64 Provides: libnsssysinit.so()(64bit) libnsssysinit.so(NSS_3.15)(64bit) nss-sysinit = 3.112-2.oc9 nss-sysinit(aarch-64) = 3.112-2.oc9 nss-system-init Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /usr/bin/sh ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libc.so.6(GLIBC_2.33)(64bit) libnspr4.so()(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.14)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) rtld(GNU_HASH) Processing files: nss-devel-3.112-2.oc9.aarch64 Provides: nss-devel = 3.112-2.oc9 nss-devel(aarch-64) = 3.112-2.oc9 nss-static = 3.112-2.oc9 pkgconfig(nss) = 3.112 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /usr/bin/pkg-config /usr/bin/sh pkgconfig(nspr) >= 4.36 pkgconfig(nss-util) >= 3.112 Processing files: nss-pkcs11-devel-3.112-2.oc9.aarch64 Provides: nss-pkcs11-devel = 3.112-2.oc9 nss-pkcs11-devel(aarch-64) = 3.112-2.oc9 nss-pkcs11-devel-static = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-util-3.112-2.oc9.aarch64 Executing(%license): /bin/sh -e /var/tmp/rpm-tmp.5KK679 + umask 022 + cd /builddir/build/BUILD + cd nss-3.112 + LICENSEDIR=/builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss-util + export LC_ALL=C + LC_ALL=C + export LICENSEDIR + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss-util + cp -pr nss/COPYING /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss-util + RPM_EC=0 ++ jobs -p + exit 0 Provides: libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.101)(64bit) libnssutil3.so(NSSUTIL_3.108)(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.5)(64bit) libnssutil3.so(NSSUTIL_3.12.7)(64bit) libnssutil3.so(NSSUTIL_3.13)(64bit) libnssutil3.so(NSSUTIL_3.14)(64bit) libnssutil3.so(NSSUTIL_3.15)(64bit) libnssutil3.so(NSSUTIL_3.17.1)(64bit) libnssutil3.so(NSSUTIL_3.21)(64bit) libnssutil3.so(NSSUTIL_3.24)(64bit) libnssutil3.so(NSSUTIL_3.25)(64bit) libnssutil3.so(NSSUTIL_3.31)(64bit) libnssutil3.so(NSSUTIL_3.33)(64bit) libnssutil3.so(NSSUTIL_3.38)(64bit) libnssutil3.so(NSSUTIL_3.39)(64bit) libnssutil3.so(NSSUTIL_3.59)(64bit) libnssutil3.so(NSSUTIL_3.82)(64bit) libnssutil3.so(NSSUTIL_3.90)(64bit) libnssutil3.so(NSSUTIL_3.94)(64bit) nss-util = 3.112-2.oc9 nss-util(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libc.so.6(GLIBC_2.25)(64bit) libc.so.6(GLIBC_2.33)(64bit) libnspr4.so()(64bit) libplc4.so()(64bit) libplds4.so()(64bit) rtld(GNU_HASH) Processing files: nss-util-devel-3.112-2.oc9.aarch64 Provides: nss-util-devel = 3.112-2.oc9 nss-util-devel(aarch-64) = 3.112-2.oc9 pkgconfig(nss-util) = 3.112 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /usr/bin/pkg-config /usr/bin/sh pkgconfig(nspr) >= 4.36 Processing files: nss-softokn-3.112-2.oc9.aarch64 Provides: libsoftokn3.so()(64bit) libsoftokn3.so(NSS_3.4)(64bit) libsoftokn3.so(NSS_3.52)(64bit) nss-softokn = 3.112-2.oc9 nss-softokn(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libc.so.6(GLIBC_2.33)(64bit) libc.so.6(GLIBC_2.34)(64bit) libnspr4.so()(64bit) libnssutil3.so()(64bit) libnssutil3.so(NSSUTIL_3.12)(64bit) libnssutil3.so(NSSUTIL_3.12.3)(64bit) libnssutil3.so(NSSUTIL_3.12.5)(64bit) libnssutil3.so(NSSUTIL_3.13)(64bit) libnssutil3.so(NSSUTIL_3.14)(64bit) libnssutil3.so(NSSUTIL_3.15)(64bit) libnssutil3.so(NSSUTIL_3.17.1)(64bit) libnssutil3.so(NSSUTIL_3.94)(64bit) libplc4.so()(64bit) libplds4.so()(64bit) libsqlite3.so.0()(64bit) rtld(GNU_HASH) Processing files: nss-softokn-devel-3.112-2.oc9.aarch64 Provides: nss-softokn-devel = 3.112-2.oc9 nss-softokn-devel(aarch-64) = 3.112-2.oc9 pkgconfig(nss-softokn) = 3.112 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /usr/bin/pkg-config /usr/bin/sh pkgconfig(nspr) >= 4.36 pkgconfig(nss-util) >= 3.112 Processing files: nss-softokn-freebl-3.112-2.oc9.aarch64 Executing(%license): /bin/sh -e /var/tmp/rpm-tmp.KwrONH + umask 022 + cd /builddir/build/BUILD + cd nss-3.112 + LICENSEDIR=/builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss-softokn-freebl + export LC_ALL=C + LC_ALL=C + export LICENSEDIR + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss-softokn-freebl + cp -pr nss/COPYING /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64/usr/share/licenses/nss-softokn-freebl + RPM_EC=0 ++ jobs -p + exit 0 Provides: libfreebl3.so()(64bit) libfreebl3.so(NSSRAWHASH_3.12.3)(64bit) libfreebl3.so(NSSprivate_3.11)(64bit) libfreeblpriv3.so()(64bit) libfreeblpriv3.so(NSSprivate_3.11)(64bit) libfreeblpriv3.so(NSSprivate_3.16)(64bit) nss-softokn-freebl = 3.112-2.oc9 nss-softokn-freebl(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /usr/bin/bash ld-linux-aarch64.so.1()(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libc.so.6()(64bit) libc.so.6(GLIBC_2.17)(64bit) libc.so.6(GLIBC_2.25)(64bit) libc.so.6(GLIBC_2.34)(64bit) rtld(GNU_HASH) Processing files: nss-softokn-freebl-devel-3.112-2.oc9.aarch64 Provides: nss-softokn-freebl-devel = 3.112-2.oc9 nss-softokn-freebl-devel(aarch-64) = 3.112-2.oc9 nss-softokn-freebl-static = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debugsource-3.112-2.oc9.aarch64 Provides: nss-debugsource = 3.112-2.oc9 nss-debugsource(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.112-2.oc9.aarch64 Provides: debuginfo(build-id) = 229293c1c88ae0d6190460d6b3384aa98dfd3fac debuginfo(build-id) = 45fb3fc0ffc5b43828fbaa3e4d9741dbcc734950 debuginfo(build-id) = e00f31c8def7dda8769c3c370f149a932c2642e2 libnss3.so-3.112-2.oc9.aarch64.debug()(64bit) libsmime3.so-3.112-2.oc9.aarch64.debug()(64bit) libssl3.so-3.112-2.oc9.aarch64.debug()(64bit) nss-debuginfo = 3.112-2.oc9 nss-debuginfo(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: nss-debugsource(aarch-64) = 3.112-2.oc9 Processing files: nss-tools-debuginfo-3.112-2.oc9.aarch64 Provides: debuginfo(build-id) = 017e104548bc119701974fc64be723e0c813d16b debuginfo(build-id) = 0990b47d335821e2f2d94ca8f5fa4fb1fa3919bc debuginfo(build-id) = 0b32753069302897b3befb89a8e2b593f07c18fa debuginfo(build-id) = 10fdb43ead02b6fd4ed97ba8d8eded53efe25b01 debuginfo(build-id) = 3058c421201c0770dd2c197fd17516d4c7363521 debuginfo(build-id) = 30f09ad94c925332bee9858be8f27ddd32ad0016 debuginfo(build-id) = 592793dc6ee93c27a17d0ddd19995499ed34800d debuginfo(build-id) = 6950944ca14a1638d46af539ef10bac4fad71902 debuginfo(build-id) = 771f240304ba4fa911f7a5383972c0584f962c12 debuginfo(build-id) = 7dba1738c1cb28a838fe8b8edb14576515b25ad3 debuginfo(build-id) = 888802ae502d625b53b2bc7e7ecd63d0aa9d73f5 debuginfo(build-id) = 8be37203a7ef54ebf23d6a3eddacc848d0ed0bad debuginfo(build-id) = 8eb0133c083107c4c0943af474769c9965a254c6 debuginfo(build-id) = 96a700ace17e1ead4cbf5851ff3c0d6e1a2952f0 debuginfo(build-id) = a55d8d4631e22daee0ea0aefa02fcb9fd1e04008 debuginfo(build-id) = b5436ae8f208f4b50c22bbc0acbde8b5eddac355 debuginfo(build-id) = bae9ade79dad92303d7d37ebf76e4f8f93cbaed4 debuginfo(build-id) = be209d0b3ff9b3c826d18c4caf3901679cbcda72 debuginfo(build-id) = c6ba7e94fe7b70b82057b33b2ce99ed15219197f debuginfo(build-id) = df5cae1d8a3c71d5682654ad810bf7e81101807b debuginfo(build-id) = e2cf38a81d6fb59bb83d8e952a3d428c287738d4 nss-tools-debuginfo = 3.112-2.oc9 nss-tools-debuginfo(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: nss-debugsource(aarch-64) = 3.112-2.oc9 Processing files: nss-sysinit-debuginfo-3.112-2.oc9.aarch64 Provides: debuginfo(build-id) = 82551a535b6a2146718599cfd68e4aeb4aacb917 libnsssysinit.so-3.112-2.oc9.aarch64.debug()(64bit) nss-sysinit-debuginfo = 3.112-2.oc9 nss-sysinit-debuginfo(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: nss-debugsource(aarch-64) = 3.112-2.oc9 Processing files: nss-util-debuginfo-3.112-2.oc9.aarch64 Provides: debuginfo(build-id) = 3727ac1c228b0831b4a8dcaca44b3d39be2bb981 libnssutil3.so-3.112-2.oc9.aarch64.debug()(64bit) nss-util-debuginfo = 3.112-2.oc9 nss-util-debuginfo(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: nss-debugsource(aarch-64) = 3.112-2.oc9 Processing files: nss-softokn-debuginfo-3.112-2.oc9.aarch64 Provides: debuginfo(build-id) = 0bb89fc24f64c2e35eda187a7d5a9d6ba8fa00f4 debuginfo(build-id) = c4a8967b56c2e3c4e16feecfbe40b9d880c8112a debuginfo(build-id) = d50e7a98c3c07eab0a496fd1c0e329b93896bfd3 debuginfo(build-id) = d55b9915db5f115a1fc5e244a9f8105540c0f48f debuginfo(build-id) = e7404ef9197362b71a08492c774f04f33748e899 debuginfo(build-id) = f259b21a44385e1feb8d2ab0946e777cea86272d libsoftokn3.so-3.112-2.oc9.aarch64.debug()(64bit) nss-softokn-debuginfo = 3.112-2.oc9 nss-softokn-debuginfo(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: nss-debugsource(aarch-64) = 3.112-2.oc9 Processing files: nss-softokn-freebl-debuginfo-3.112-2.oc9.aarch64 Provides: debuginfo(build-id) = 5c80aff34dd0b1550cb9bd61c276762fc8728ac9 debuginfo(build-id) = ff1df7f6dd0a5effbebf77162b939035780d84f2 libfreebl3.so-3.112-2.oc9.aarch64.debug()(64bit) libfreeblpriv3.so-3.112-2.oc9.aarch64.debug()(64bit) nss-softokn-freebl-debuginfo = 3.112-2.oc9 nss-softokn-freebl-debuginfo(aarch-64) = 3.112-2.oc9 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Recommends: nss-debugsource(aarch-64) = 3.112-2.oc9 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.112-2.oc9.aarch64 Wrote: /builddir/build/RPMS/nss-softokn-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-softokn-freebl-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-tools-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-util-debuginfo-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-devel-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-util-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-sysinit-debuginfo-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-softokn-freebl-devel-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-softokn-devel-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-util-devel-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-softokn-freebl-debuginfo-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-softokn-debuginfo-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-tools-debuginfo-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.112-2.oc9.aarch64.rpm Wrote: /builddir/build/RPMS/nss-debugsource-3.112-2.oc9.aarch64.rpm Child return code was: 0